ACM Transactions on Privacy and Security

Papers
(The median citation count of ACM Transactions on Privacy and Security is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Privacy-Preserving Training of Support Vector Machines via Secure Multiparty Computation53
Security Implications of the Morello Platform: An Empirical Threat Model-Based Analysis50
TLS-MHSA: An Efficient Detection Model for Encrypted Malicious Traffic based on Multi-Head Self-Attention Mechanism49
Secure and Reliable Network Updates43
Swarm Learning: A Survey of Concepts, Applications, and Trends39
Site Inspector: Improving Browser Communication of Website Security Information38
Deep PackGen: A Deep Reinforcement Learning Framework for Adversarial Network Packet Generation38
A Secret Sharing-Inspired Robust Distributed Backdoor Attack to Federated Learning35
Binsec/Rel: Symbolic Binary Analyzer for Security with Applications to Constant-Time and Secret-Erasure32
Dimensional Robustness Certification for Deep Neural Networks in Network Intrusion Detection Systems30
AXECC: Benchmarking the Privacy and Accessibility Impact of Browser Extensions28
symbSODA: Configurable and Verifiable Orchestration Automation for Active Malware Deception27
CBAs: Character-level Backdoor Attacks against Chinese Pre-trained Language Models26
SPArch: A Hardware-oriented Sketch-based Architecture for High-speed Network Flow Measurements26
Differentially Private Real-Time Release of Sequential Data24
Bi-objective Optimization in Role Mining23
Spoofing Against Spoofing: Toward Caller ID Verification in Heterogeneous Telecommunication Systems22
PredicTor: A Global, Machine Learning Approach to Tor Path Selection21
VFLGAN-TS: Vertical Federated Learning-based Generative Adversarial Networks for Publication of Vertically Partitioned Time-series Data20
A Decentralized Private Data Marketplace using Blockchain and Secure Multi-Party Computation20
An Experimental Assessment of Inconsistencies in Memory Forensics20
Valued Authorization Policy Existence Problem: Theory and Experiments19
Generalizable Multi-Model Fusion for Multi-Class DoS Detection Using Cognitive Diversity and Rank-Score Analysis18
Fraud Detection under Siege: Practical Poisoning Attacks and Defense Strategies17
VoiceFormer: Fusing Non-Acoustic Motion Sensors for High-Fidelity Voice Synthesis in Mobile Devices16
Adversarial Attack and Defense for Commercial Black-box Chinese-English Speech Recognition Systems16
A Policy-Based Conjunctive Scheme for Digital Forgetting of Co-Owned Data14
Exploring Visual Explanations for Defending Federated Learning against Poisoning Attacks: Enhancing LayerCAM with Autoencoders14
FairQuanti: Enhancing Fairness in Deep Neural Network Quantization via Neuron Role Contribution13
CySecBERT : A Domain-Adapted Language Model for the Cybersecurity Domain12
Generating Quality Threat Intelligence Leveraging OSINT and a Cyber Threat Unified Taxonomy12
Semi-Supervised Classification of Malware Families Under Extreme Class Imbalance via Hierarchical Non-Negative Matrix Factorization with Automatic Model Selection12
So Near and Yet So Far – Symbolic Verification of Distance-Bounding Protocols12
Performance and Usability Evaluation of Brainwave Authentication Techniques with Consumer Devices12
What Users Want From Cloud Deletion and the Information They Need: A Participatory Action Study12
Assessment Framework for the Identification and Evaluation of Main Features for Distributed Usage Control Solutions11
B 3 : Backdoor Attacks against Black-box Machine Learning Models11
Privacy Against Agnostic Inference Attacks in Vertical Federated Learning11
ZTA-IoT: A Novel Architecture for Zero-Trust in IoT Systems and an Ensuing Usage Control Model10
MGAN: A Multi-view Graph Adaptive Network for Robust Malicious Traffic Detection10
Balancing Security and Privacy in Genomic Range Queries10
Swarm: A Distributed Ledger-based Framework to Enhance Air Traffic Control Security Using ADS-B Protocol10
Sphinx-in-the-Head: Group Signatures from Symmetric Primitives9
Robust Large-Scale Detection of Living-Off-the-Land Reverse Shells via Data Synthesis9
A Comparison of Systemic and Systematic Risks of Malware Encounters in Consumer and Enterprise Environments9
Identifying Fraudulent Users in E-commerce Applications through Spatiotemporal Fusion and Selective Aggregation8
Cyber Threat Intelligence meets the Analytic Tradecraft8
Euler : Detecting Network Lateral Movement via Scalable Temporal Link Prediction8
SoK: Human-centered Phishing Susceptibility8
AutoFR: Automated Filter Rule Generation for Adblocking8
RansomShield: A Visualization Approach to Defending Mobile Systems Against Ransomware8
End-to-End Security for Distributed Event-driven Enclave Applications on Heterogeneous TEEs8
Boost Your Immunity: VACCINE for Preventing a Novel Stealthy Slice Selection Attack in 5G and Beyond7
Evaluating Honeyfile Realism and Enticement Metrics7
Accountable Private Set Cardinality for Distributed Measurement7
Computation on Encrypted Data Using Dataflow Authentication7
Risk Prediction of IoT Devices Based on Vulnerability Analysis7
Measures of Information Leakage for Incomplete Statistical Information: Application to a Binary Privacy Mechanism7
TIMESAFE: Timing Interruption Monitoring and Security Assessment for Fronthaul Environments.6
VPT: Privacy Preserving Energy Trading and Block Mining Mechanism for Blockchain Based Virtual Power Plants6
End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage6
Privacy Policies across the Ages: Content of Privacy Policies 1996–20216
Intriguing Properties of Adversarial ML Attacks in the Problem Space [Extended Version]6
InkFiltration: Using Inkjet Printers for Acoustic Data Exfiltration from Air-Gapped Networks5
Resilient Dynamic Analysis for Windows Malware Technique Discovery against Behavior Obfuscation5
Formal Security Analysis of the OpenID FAPI 2.0 Family of Protocols: Accompanying a Standardization Process5
Quantifying and Exploiting Adversarial Vulnerability: Gradient-Based Input Pre-Filtering for Enhanced Performance in Black-Box Attacks5
Is Bitcoin Future as Secure as We Think? Analysis of Bitcoin Vulnerability to Bribery Attacks Launched through Large Transactions5
TV-AVN: Training Verdict Based on Random Forest for Misbehavior Detection in Autonomous Vehicle Networks5
Level Up with ML Vulnerability Identification: Leveraging Domain Constraints in Feature Space for Robust Android Malware Detection5
Revisiting the Security of Biometric Authentication Systems Against Statistical Attacks5
Integrating Remote Quantum Random Number Generator as a Shared Resource into GNU/Linux via D-Bus4
Rectifying Multi-Attack Adversarial Perturbations in Deep Neural Network based Image Classifier4
Comprehensive Kernel Safety in the Spectre Era: Mitigations and Performance Evaluation4
SatIQ: Extensible and Stable Satellite Authentication using Hardware Fingerprinting4
Learning Relationship-Based Access Control Policies from Black-Box Systems4
Specifying and Verifying Information Flow Control in SELinux Configurations4
Cheesecloth: Zero-Knowledge Proofs of Real-World Vulnerabilities4
Performance Enhancement of Intrusion Detection System in Cloud by Using Boruta Algorithm4
Flexichain: Flexible Payment Channel Network to Defend Against Channel Exhaustion Attack4
Toward a Robust Detection of PowerShell Malware against Code Mixing and Obfuscation by Using Sentence Transformer and Similarity Learning4
A Metric Differential Privacy Mechanism for Sentence Embeddings4
Resilience-by-design in Adaptive Multi-agent Traffic Control Systems4
Assessing Cyber Risk in Cyber-Physical Systems Using the ATT&CK Framework4
A Formal Lens on Android Permissions System: Modeling, Verification, and Exploitation Using LLMs and Model Checking4
Privacy-preserving Resilient Consensus for Multi-agent Systems in a General Topology Structure4
The Dark Side of Native Code on Android4
The Effect of Domain Terms on Password Security3
PEBASI: A Privacy preserving, Efficient Biometric Authentication Scheme based on Irises3
Attack Detection Using Item Vector Shift in Matrix Factorisation Recommenders3
Uncovering CWE-CVE-CPE Relations with Threat Knowledge Graphs3
ZT-SDN: An ML-Powered Zero-Trust Architecture for Software-Defined Networks3
VulANalyzeR: Explainable Binary Vulnerability Detection with Multi-task Learning and Attentional Graph Convolution3
Stateful Protocol Composition in Isabelle/HOL3
Multi-Stage Enhanced Zero Trust Intrusion Detection System for Unknown Attack Detection in Internet of Things and Traditional Networks3
A Novel Cross-Network Embedding for Anchor Link Prediction with Social Adversarial Attacks3
Pump Up Password Security! Evaluating and Enhancing Risk-Based Authentication on a Real-World Large-Scale Online Service3
OptiClass : An Optimized Classifier for Application Layer Protocols Using Bit Level Signatures3
DP-Poison: Poisoning Federated Learning under the Cover of Differential Privacy3
Understanding Information Disclosure from Secure Computation Output: A Comprehensive Study of Average Salary Computation3
Revisiting GPS Spoofing in Phasor Measurement: Real-World Exploitation and Practical Detection in Power Grids3
Beyond the Screen: Exploring Privacy Boundaries through Automated User Profiling3
Assessing and Mitigating the Privacy Implications of Eye Tracking on Handheld Mobile Devices3
DELM: Deep Ensemble Learning Model for Anomaly Detection in Malicious Network Traffic-based Adaptive Feature Aggregation and Network Optimization3
Paralinguistic Privacy Protection at the Edge3
0.67096304893494