ACM Transactions on Privacy and Security

Papers
(The median citation count of ACM Transactions on Privacy and Security is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Adversarial EXEmples69
On Generating Network Traffic Datasets with Synthetic Attacks for Intrusion Detection40
Maat24
MOTION – A Framework for Mixed-Protocol Multi-Party Computation21
The Android Platform Security Model21
An Extensive Formal Analysis of Multi-factor Authentication Protocols21
Assessing Cyber Risk in Cyber-Physical Systems Using the ATT&CK Framework21
Design, Development, and Evaluation of a Cybersecurity, Privacy, and Digital Literacy Game for Tweens20
A Deep Dive Inside DREBIN: An Explorative Analysis beyond Android Malware Detection Scores19
Privacy-Preserving Decision Trees Training and Prediction18
Dealing with Security Alert Flooding: Using Machine Learning for Domain-independent Alert Aggregation18
Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage15
FENCE: Feasible Evasion Attacks on Neural Networks in Constrained Environments14
Euler : Detecting Network Lateral Movement via Scalable Temporal Link Prediction14
A Large-Scale Analysis of the Semantic Password Model and Linguistic Patterns in Passwords13
Pump Up Password Security! Evaluating and Enhancing Risk-Based Authentication on a Real-World Large-Scale Online Service13
Attack Context Embedded Data Driven Trust Diagnostics in Smart Metering Infrastructure13
Analyzing Dynamic Code13
Privacy Policies across the Ages: Content of Privacy Policies 1996–202113
Flexible Mechanisms for Remote Attestation13
A Systematic Analysis of the Capital One Data Breach: Critical Lessons Learned12
Security Best Practices: A Critical Analysis Using IoT as a Case Study10
Adaptive Cyber Defense Against Multi-Stage Attacks Using Learning-Based POMDP10
SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems10
EI-MTD: Moving Target Defense for Edge Intelligence against Adversarial Attacks9
Optimal Packet Camouflage Against Traffic Analysis9
SoK: Human-centered Phishing Susceptibility9
Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches9
On the Security of Smartphone Unlock PINs9
Systematic Mutation-Based Evaluation of the Soundness of Security-Focused Android Static Analysis Techniques9
Generating Quality Threat Intelligence Leveraging OSINT and a Cyber Threat Unified Taxonomy9
Friendly Fire8
One Size Does Not Fit All8
Vulnerabilities of Unattended Face Verification Systems to Facial Components-based Presentation Attacks: An Empirical Study8
Two-factor Password-authenticated Key Exchange with End-to-end Security8
Risk Prediction of IoT Devices Based on Vulnerability Analysis8
Hidden in Plain Sight: Exploring Privacy Risks of Mobile Augmented Reality Applications8
A Solicitous Approach to Smart Contract Verification7
TLS-MHSA: An Efficient Detection Model for Encrypted Malicious Traffic based on Multi-Head Self-Attention Mechanism7
AutoProfile: Towards Automated Profile Generation for Memory Analysis6
A Novel Hybrid Approach for Multi-Dimensional Data Anonymization for Apache Spark6
Industrial Control Systems Security via Runtime Enforcement6
A Lightweight Privacy-Aware Continuous Authentication Protocol-PACA6
Exploiting Mixed Binaries6
Large-scale and Robust Code Authorship Identification with Deep Feature Learning6
“So if Mr Blue Head here clicks the link...” Risk Thinking in Cyber Security Decision Making5
A Multi-view Approach to Preserve Privacy and Utility in Network Trace Anonymization5
InkFiltration: Using Inkjet Printers for Acoustic Data Exfiltration from Air-Gapped Networks5
Beyond Gradients: Exploiting Adversarial Priors in Model Inversion Attacks5
Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud5
RansomShield: A Visualization Approach to Defending Mobile Systems Against Ransomware5
VulANalyzeR: Explainable Binary Vulnerability Detection with Multi-task Learning and Attentional Graph Convolution5
Secure and Reliable Network Updates5
ThermoSecure: Investigating the Effectiveness of AI-Driven Thermal Attacks on Commonly Used Computer Keyboards5
Privacy-preserving Decentralized Federated Learning over Time-varying Communication Graph5
Binsec/Rel: Symbolic Binary Analyzer for Security with Applications to Constant-Time and Secret-Erasure5
Designing Strong Privacy Metrics Suites Using Evolutionary Optimization4
Dynamic Binary Translation for SGX Enclaves4
HotFuzz: Discovering Temporal and Spatial Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing4
A Vulnerability Assessment Framework for Privacy-preserving Record Linkage4
CySecBERT : A Domain-Adapted Language Model for the Cybersecurity Domain4
PRShare: A Framework for Privacy-preserving, Interorganizational Data Sharing3
Combining Cyber Security Intelligence to Refine Automotive Cyber Threats3
Paralinguistic Privacy Protection at the Edge3
Performance and Usability Evaluation of Brainwave Authentication Techniques with Consumer Devices3
Privacy-preserving Resilient Consensus for Multi-agent Systems in a General Topology Structure3
Differentially Private Real-Time Release of Sequential Data3
B 3 : Backdoor Attacks against Black-box Machine Learning Models3
Revisiting the Security of Biometric Authentication Systems Against Statistical Attacks3
Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations3
A Novel Cross-Network Embedding for Anchor Link Prediction with Social Adversarial Attacks3
Balancing Security and Privacy in Genomic Range Queries3
Semi-Supervised Classification of Malware Families Under Extreme Class Imbalance via Hierarchical Non-Negative Matrix Factorization with Automatic Model Selection3
0.02300500869751