ACM Transactions on Privacy and Security

Papers
(The H4-Index of ACM Transactions on Privacy and Security is 20. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Privacy-Preserving Training of Support Vector Machines via Secure Multiparty Computation53
Security Implications of the Morello Platform: An Empirical Threat Model-Based Analysis50
TLS-MHSA: An Efficient Detection Model for Encrypted Malicious Traffic based on Multi-Head Self-Attention Mechanism49
Secure and Reliable Network Updates43
Swarm Learning: A Survey of Concepts, Applications, and Trends39
Site Inspector: Improving Browser Communication of Website Security Information38
Deep PackGen: A Deep Reinforcement Learning Framework for Adversarial Network Packet Generation38
A Secret Sharing-Inspired Robust Distributed Backdoor Attack to Federated Learning35
Binsec/Rel: Symbolic Binary Analyzer for Security with Applications to Constant-Time and Secret-Erasure32
Dimensional Robustness Certification for Deep Neural Networks in Network Intrusion Detection Systems30
AXECC: Benchmarking the Privacy and Accessibility Impact of Browser Extensions28
symbSODA: Configurable and Verifiable Orchestration Automation for Active Malware Deception27
CBAs: Character-level Backdoor Attacks against Chinese Pre-trained Language Models26
SPArch: A Hardware-oriented Sketch-based Architecture for High-speed Network Flow Measurements26
Differentially Private Real-Time Release of Sequential Data24
Bi-objective Optimization in Role Mining23
Spoofing Against Spoofing: Toward Caller ID Verification in Heterogeneous Telecommunication Systems22
PredicTor: A Global, Machine Learning Approach to Tor Path Selection21
VFLGAN-TS: Vertical Federated Learning-based Generative Adversarial Networks for Publication of Vertically Partitioned Time-series Data20
A Decentralized Private Data Marketplace using Blockchain and Secure Multi-Party Computation20
An Experimental Assessment of Inconsistencies in Memory Forensics20
0.025867938995361