ACM Transactions on Privacy and Security

Papers
(The median citation count of ACM Transactions on Privacy and Security is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-09-01 to 2025-09-01.)
ArticleCitations
Secure Selections on Encrypted Multi-writer Streams94
Deep PackGen: A Deep Reinforcement Learning Framework for Adversarial Network Packet Generation37
Secure and Reliable Network Updates37
Security Implications of the Morello Platform: An Empirical Threat Model-Based Analysis33
Privacy-Preserving Training of Support Vector Machines via Secure Multiparty Computation33
TLS-MHSA: An Efficient Detection Model for Encrypted Malicious Traffic based on Multi-Head Self-Attention Mechanism30
Site Inspector: Improving Browser Communication of Website Security Information30
Dimensional Robustness Certification for Deep Neural Networks in Network Intrusion Detection Systems28
Flexible Mechanisms for Remote Attestation27
Binsec/Rel: Symbolic Binary Analyzer for Security with Applications to Constant-Time and Secret-Erasure24
A Secret Sharing-Inspired Robust Distributed Backdoor Attack to Federated Learning24
CBAs: Character-level Backdoor Attacks against Chinese Pre-trained Language Models23
symbSODA: Configurable and Verifiable Orchestration Automation for Active Malware Deception21
#PrettyFlyForAWiFi21
Information Leakage Games: Exploring Information as a Utility Function20
Differentially Private Real-Time Release of Sequential Data20
Bi-objective Optimization in Role Mining20
SPArch: A Hardware-oriented Sketch-based Architecture for High-speed Network Flow Measurements19
Spoofing Against Spoofing: Toward Caller ID Verification in Heterogeneous Telecommunication Systems19
A Decentralized Private Data Marketplace using Blockchain and Secure Multi-Party Computation19
PredicTor: A Global, Machine Learning Approach to Tor Path Selection16
An Experimental Assessment of Inconsistencies in Memory Forensics15
Generalizable Multi-Model Fusion for Multi-Class DoS Detection Using Cognitive Diversity and Rank-Score Analysis15
Valued Authorization Policy Existence Problem: Theory and Experiments14
Fraud Detection under Siege: Practical Poisoning Attacks and Defense Strategies13
C3PO: C loud-based C onfidentiality-preserving C ontinuous Query P r 13
Improving Unlinkability of Attribute-based Authentication through Game Theory12
So Near and Yet So Far – Symbolic Verification of Distance-Bounding Protocols12
Adversarial Attack and Defense for Commercial Black-box Chinese-English Speech Recognition Systems12
FairQuanti: Enhancing Fairness in Deep Neural Network Quantization via Neuron Role Contribution11
Performance and Usability Evaluation of Brainwave Authentication Techniques with Consumer Devices11
What Users Want From Cloud Deletion and the Information They Need: A Participatory Action Study11
CySecBERT : A Domain-Adapted Language Model for the Cybersecurity Domain11
Semi-Supervised Classification of Malware Families Under Extreme Class Imbalance via Hierarchical Non-Negative Matrix Factorization with Automatic Model Selection10
Generating Quality Threat Intelligence Leveraging OSINT and a Cyber Threat Unified Taxonomy10
Assessment Framework for the Identification and Evaluation of Main Features for Distributed Usage Control Solutions9
Balancing Security and Privacy in Genomic Range Queries9
A Lightweight Privacy-Aware Continuous Authentication Protocol-PACA8
A Comparison of Systemic and Systematic Risks of Malware Encounters in Consumer and Enterprise Environments8
ZTA-IoT: A Novel Architecture for Zero-Trust in IoT Systems and an Ensuing Usage Control Model8
MGAN: A Multi-view Graph Adaptive Network for Robust Malicious Traffic Detection8
Sphinx-in-the-Head: Group Signatures from Symmetric Primitives8
Swarm: A Distributed Ledger-based Framework to Enhance Air Traffic Control Security Using ADS-B Protocol8
B 3 : Backdoor Attacks against Black-box Machine Learning Models8
Risk Prediction of IoT Devices Based on Vulnerability Analysis7
AutoFR: Automated Filter Rule Generation for Adblocking7
Euler : Detecting Network Lateral Movement via Scalable Temporal Link Prediction7
Cyber Threat Intelligence meets the Analytic Tradecraft7
RansomShield: A Visualization Approach to Defending Mobile Systems Against Ransomware7
Computation on Encrypted Data Using Dataflow Authentication6
SoK: Human-centered Phishing Susceptibility6
Measures of Information Leakage for Incomplete Statistical Information: Application to a Binary Privacy Mechanism6
Boost Your Immunity: VACCINE for Preventing a Novel Stealthy Slice Selection Attack in 5G and Beyond6
On the Security of Smartphone Unlock PINs6
Accountable Private Set Cardinality for Distributed Measurement6
End-to-End Security for Distributed Event-driven Enclave Applications on Heterogeneous TEEs6
Privacy Policies across the Ages: Content of Privacy Policies 1996–20216
Formal Security Analysis of the OpenID FAPI 2.0 Family of Protocols: Accompanying a Standardization Process5
Intriguing Properties of Adversarial ML Attacks in the Problem Space [Extended Version]5
Revisiting the Security of Biometric Authentication Systems Against Statistical Attacks5
End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient, Portable, and Blind Cloud Storage5
Quantifying and Exploiting Adversarial Vulnerability: Gradient-Based Input Pre-Filtering for Enhanced Performance in Black-Box Attacks5
Level Up with ML Vulnerability Identification: Leveraging Domain Constraints in Feature Space for Robust Android Malware Detection5
InkFiltration: Using Inkjet Printers for Acoustic Data Exfiltration from Air-Gapped Networks5
Performance Enhancement of Intrusion Detection System in Cloud by Using Boruta Algorithm4
A Novel Hybrid Approach for Multi-Dimensional Data Anonymization for Apache Spark4
Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud4
Is Bitcoin Future as Secure as We Think? Analysis of Bitcoin Vulnerability to Bribery Attacks Launched through Large Transactions4
Flexichain: Flexible Payment Channel Network to Defend Against Channel Exhaustion Attack4
Privacy-preserving Resilient Consensus for Multi-agent Systems in a General Topology Structure4
Specifying and Verifying Information Flow Control in SELinux Configurations4
Assessing Cyber Risk in Cyber-Physical Systems Using the ATT&CK Framework4
Comprehensive Kernel Safety in the Spectre Era: Mitigations and Performance Evaluation4
Learning Relationship-Based Access Control Policies from Black-Box Systems4
The Dark Side of Native Code on Android4
Constrained Proximity Attacks on Mobile Targets3
Resilience-by-design in Adaptive Multi-agent Traffic Control Systems3
Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches3
ZT-SDN: An ML-Powered Zero-Trust Architecture for Software-Defined Networks3
A Metric Differential Privacy Mechanism for Sentence Embeddings3
Attack Detection Using Item Vector Shift in Matrix Factorisation Recommenders3
Cheesecloth: Zero-Knowledge Proofs of Real-World Vulnerabilities3
OptiClass : An Optimized Classifier for Application Layer Protocols Using Bit Level Signatures3
Assessing and Mitigating the Privacy Implications of Eye Tracking on Handheld Mobile Devices3
Design, Development, and Evaluation of a Cybersecurity, Privacy, and Digital Literacy Game for Tweens3
A Novel Cross-Network Embedding for Anchor Link Prediction with Social Adversarial Attacks2
Understanding Information Disclosure from Secure Computation Output: A Comprehensive Study of Average Salary Computation2
Uncovering CWE-CVE-CPE Relations with Threat Knowledge Graphs2
DP-Poison: Poisoning Federated Learning under the Cover of Differential Privacy2
Stateful Protocol Composition in Isabelle/HOL2
ThermoSecure: Investigating the Effectiveness of AI-Driven Thermal Attacks on Commonly Used Computer Keyboards2
Revisiting GPS Spoofing in Phasor Measurement: Real-World Exploitation and Practical Detection in Power Grids2
X-squatter: AI Multilingual Generation of Cross-Language Sound-squatting2
Beyond the Screen: Exploring Privacy Boundaries through Automated User Profiling2
Paralinguistic Privacy Protection at the Edge2
DELM: Deep Ensemble Learning Model for Anomaly Detection in Malicious Network Traffic-based Adaptive Feature Aggregation and Network Optimization2
Multi-Stage Enhanced Zero Trust Intrusion Detection System for Unknown Attack Detection in Internet of Things and Traditional Networks2
MRAAC: A Multi-stage Risk-aware Adaptive Authentication and Access Control Framework for Android2
EI-MTD: Moving Target Defense for Edge Intelligence against Adversarial Attacks2
PEBASI: A Privacy preserving, Efficient Biometric Authentication Scheme based on Irises2
The Effect of Domain Terms on Password Security2
VulANalyzeR: Explainable Binary Vulnerability Detection with Multi-task Learning and Attentional Graph Convolution2
Pump Up Password Security! Evaluating and Enhancing Risk-Based Authentication on a Real-World Large-Scale Online Service2
“Sign in with ... Privacy ”: Timely Disclosure of Privacy Differences among Web SSO Login Options2
Privacy-preserving Decentralized Federated Learning over Time-varying Communication Graph2
Contact Discovery in Mobile Messengers: Low-cost Attacks, Quantitative Analyses, and Efficient Mitigations2
Incentivizing Secure Software Development: The Role of Voluntary Audit and Liability Waiver2
0.057385921478271