ACM Transactions on Privacy and Security

Papers
(The median citation count of ACM Transactions on Privacy and Security is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
Attack Detection Using Item Vector Shift in Matrix Factorisation Recommenders69
Secure Selections on Encrypted Multi-writer Streams33
Category-Based Administrative Access Control Policies29
Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage28
Towards Better Understanding of User Authorization Query Problem via Multi-variable Complexity Analysis28
Two-factor Password-authenticated Key Exchange with End-to-end Security24
Large-scale and Robust Code Authorship Identification with Deep Feature Learning24
So Near and Yet So Far – Symbolic Verification of Distance-Bounding Protocols23
OptiClass : An Optimized Classifier for Application Layer Protocols Using Bit Level Signatures20
Formal Security Analysis of the OpenID FAPI 2.0 Family of Protocols: Accompanying a Standardization Process19
Pump Up Password Security! Evaluating and Enhancing Risk-Based Authentication on a Real-World Large-Scale Online Service18
Improving Unlinkability of Attribute-based Authentication through Game Theory18
Privacy-Preserving Decision Trees Training and Prediction18
Uncovering CWE-CVE-CPE Relations with Threat Knowledge Graphs16
Secure and Reliable Network Updates16
In the Land of MMUs: Multiarchitecture OS-Agnostic Virtual Memory Forensics16
Resilience-by-design in Adaptive Multi-agent Traffic Control Systems15
What Users Want From Cloud Deletion and the Information They Need: A Participatory Action Study15
Semi-Supervised Classification of Malware Families Under Extreme Class Imbalance via Hierarchical Non-Negative Matrix Factorization with Automatic Model Selection14
End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage13
Deep PackGen: A Deep Reinforcement Learning Framework for Adversarial Network Packet Generation13
Eyes See Hazy while Algorithms Recognize Who You Are13
ZT-SDN: An ML-Powered Zero-Trust Architecture for Software-Defined Networks13
TLS-MHSA: An Efficient Detection Model for Encrypted Malicious Traffic based on Multi-Head Self-Attention Mechanism12
Generating Quality Threat Intelligence Leveraging OSINT and a Cyber Threat Unified Taxonomy12
CySecBERT : A Domain-Adapted Language Model for the Cybersecurity Domain12
Design, Development, and Evaluation of a Cybersecurity, Privacy, and Digital Literacy Game for Tweens11
Performance and Usability Evaluation of Brainwave Authentication Techniques with Consumer Devices10
Sound-based Two-factor Authentication: Vulnerabilities and Redesign10
Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches9
Level Up with ML Vulnerability Identification: Leveraging Domain Constraints in Feature Space for Robust Android Malware Detection9
DeepMark: A Scalable and Robust Framework for DeepFake Video Detection9
Time Series Analysis Neural Networks for Detecting False Data Injection Attacks of Different Rates on Power Grid State Estimation8
Beyond the Screen: Exploring Privacy Boundaries through Automated User Profiling8
DELM: Deep Ensemble Learning Model for Anomaly Detection in Malicious Network Traffic-based Adaptive Feature Aggregation and Network Optimization8
A Secret Sharing-Inspired Robust Distributed Backdoor Attack to Federated Learning8
FENCE: Feasible Evasion Attacks on Neural Networks in Constrained Environments7
A Systematic Analysis of the Capital One Data Breach: Critical Lessons Learned7
Quantifying and Exploiting Adversarial Vulnerability: Gradient-Based Input Pre-Filtering for Enhanced Performance in Black-Box Attacks7
HotFuzz: Discovering Temporal and Spatial Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing7
Lightbox: Sensor Attack Detection for Photoelectric Sensors via Spectrum Fingerprinting7
Automated Security Assessments of Amazon Web Services Environments6
InkFiltration: Using Inkjet Printers for Acoustic Data Exfiltration from Air-Gapped Networks6
System Auditing for Real-Time Systems6
Flexible Mechanisms for Remote Attestation6
Forward Security with Crash Recovery for Secure Logs6
VeriBin: A Malware Authorship Verification Approach for APT Tracking through Explainable and Functionality-Debiasing Adversarial Representation Learning6
Revisiting the Security of Biometric Authentication Systems Against Statistical Attacks5
On Detecting and Measuring Exploitable JavaScript Functions in Real-world Applications5
Hidden in Plain Sight: Exploring Privacy Risks of Mobile Augmented Reality Applications5
Paralinguistic Privacy Protection at the Edge5
Balancing Security and Privacy in Genomic Range Queries5
Binsec/Rel: Symbolic Binary Analyzer for Security with Applications to Constant-Time and Secret-Erasure5
DP-Poison: Poisoning Federated Learning under the Cover of Differential Privacy4
Combining Cyber Security Intelligence to Refine Automotive Cyber Threats4
B 3 : Backdoor Attacks against Black-box Machine Learning Models4
A Novel Cross-Network Embedding for Anchor Link Prediction with Social Adversarial Attacks4
Beyond Gradients: Exploiting Adversarial Priors in Model Inversion Attacks4
Assessment Framework for the Identification and Evaluation of Main Features for Distributed Usage Control Solutions4
Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: An Empirical Study4
VulANalyzeR: Explainable Binary Vulnerability Detection with Multi-task Learning and Attentional Graph Convolution3
Mechanized Proofs of Adversarial Complexity and Application to Universal Composability3
Bi-objective Optimization in Role Mining3
A Lightweight Privacy-Aware Continuous Authentication Protocol-PACA3
CBAs: Character-level Backdoor Attacks against Chinese Pre-trained Language Models3
Site Inspector: Improving Browser Communication of Website Security Information3
Stateful Protocol Composition in Isabelle/HOL3
Understanding Information Disclosure from Secure Computation Output: A Comprehensive Study of Average Salary Computation3
Friendly Fire3
ZTA-IoT: A Novel Architecture for Zero-Trust in IoT Systems and an Ensuing Usage Control Model3
A Comparison of Systemic and Systematic Risks of Malware Encounters in Consumer and Enterprise Environments3
ZPredict: ML-Based IPID Side-channel Measurements3
symbSODA: Configurable and Verifiable Orchestration Automation for Active Malware Deception3
Information Leakage Games: Exploring Information as a Utility Function3
PEBASI: A Privacy preserving, Efficient Biometric Authentication Scheme based on Irises2
PRShare: A Framework for Privacy-preserving, Interorganizational Data Sharing2
Assessing Cyber Risk in Cyber-Physical Systems Using the ATT&CK Framework2
Energy Efficient and Secure Neural Network–based Disease Detection Framework for Mobile Healthcare Network2
Sphinx-in-the-Head: Group Signatures from Symmetric Primitives2
Is Bitcoin Future as Secure as We Think? Analysis of Bitcoin Vulnerability to Bribery Attacks Launched through Large Transactions2
Differentially Private Real-Time Release of Sequential Data2
Multi-Stage Enhanced Zero Trust Intrusion Detection System for Unknown Attack Detection in Internet of Things and Traditional Networks2
Privacy Analysis of Query-Set-Size Control2
The Effect of Domain Terms on Password Security2
SPArch: A Hardware-oriented Sketch-based Architecture for High-speed Network Flow Measurements2
Optimal Packet Camouflage Against Traffic Analysis2
#PrettyFlyForAWiFi2
Backdoor Attacks in Peer-to-Peer Federated Learning2
Privacy-preserving Decentralized Federated Learning over Time-varying Communication Graph2
0.16730189323425