ACM Transactions on Privacy and Security

Papers
(The TQCC of ACM Transactions on Privacy and Security is 8. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-09-01 to 2025-09-01.)
ArticleCitations
Secure Selections on Encrypted Multi-writer Streams94
Deep PackGen: A Deep Reinforcement Learning Framework for Adversarial Network Packet Generation37
Secure and Reliable Network Updates37
Security Implications of the Morello Platform: An Empirical Threat Model-Based Analysis33
Privacy-Preserving Training of Support Vector Machines via Secure Multiparty Computation33
TLS-MHSA: An Efficient Detection Model for Encrypted Malicious Traffic based on Multi-Head Self-Attention Mechanism30
Site Inspector: Improving Browser Communication of Website Security Information30
Dimensional Robustness Certification for Deep Neural Networks in Network Intrusion Detection Systems28
Flexible Mechanisms for Remote Attestation27
Binsec/Rel: Symbolic Binary Analyzer for Security with Applications to Constant-Time and Secret-Erasure24
A Secret Sharing-Inspired Robust Distributed Backdoor Attack to Federated Learning24
CBAs: Character-level Backdoor Attacks against Chinese Pre-trained Language Models23
symbSODA: Configurable and Verifiable Orchestration Automation for Active Malware Deception21
#PrettyFlyForAWiFi21
Information Leakage Games: Exploring Information as a Utility Function20
Differentially Private Real-Time Release of Sequential Data20
Bi-objective Optimization in Role Mining20
SPArch: A Hardware-oriented Sketch-based Architecture for High-speed Network Flow Measurements19
Spoofing Against Spoofing: Toward Caller ID Verification in Heterogeneous Telecommunication Systems19
A Decentralized Private Data Marketplace using Blockchain and Secure Multi-Party Computation19
PredicTor: A Global, Machine Learning Approach to Tor Path Selection16
An Experimental Assessment of Inconsistencies in Memory Forensics15
Generalizable Multi-Model Fusion for Multi-Class DoS Detection Using Cognitive Diversity and Rank-Score Analysis15
Valued Authorization Policy Existence Problem: Theory and Experiments14
Fraud Detection under Siege: Practical Poisoning Attacks and Defense Strategies13
C3PO: C loud-based C onfidentiality-preserving C ontinuous Query P r 13
Adversarial Attack and Defense for Commercial Black-box Chinese-English Speech Recognition Systems12
Improving Unlinkability of Attribute-based Authentication through Game Theory12
So Near and Yet So Far – Symbolic Verification of Distance-Bounding Protocols12
What Users Want From Cloud Deletion and the Information They Need: A Participatory Action Study11
CySecBERT : A Domain-Adapted Language Model for the Cybersecurity Domain11
FairQuanti: Enhancing Fairness in Deep Neural Network Quantization via Neuron Role Contribution11
Performance and Usability Evaluation of Brainwave Authentication Techniques with Consumer Devices11
Semi-Supervised Classification of Malware Families Under Extreme Class Imbalance via Hierarchical Non-Negative Matrix Factorization with Automatic Model Selection10
Generating Quality Threat Intelligence Leveraging OSINT and a Cyber Threat Unified Taxonomy10
Assessment Framework for the Identification and Evaluation of Main Features for Distributed Usage Control Solutions9
Balancing Security and Privacy in Genomic Range Queries9
A Lightweight Privacy-Aware Continuous Authentication Protocol-PACA8
A Comparison of Systemic and Systematic Risks of Malware Encounters in Consumer and Enterprise Environments8
ZTA-IoT: A Novel Architecture for Zero-Trust in IoT Systems and an Ensuing Usage Control Model8
MGAN: A Multi-view Graph Adaptive Network for Robust Malicious Traffic Detection8
Sphinx-in-the-Head: Group Signatures from Symmetric Primitives8
Swarm: A Distributed Ledger-based Framework to Enhance Air Traffic Control Security Using ADS-B Protocol8
B 3 : Backdoor Attacks against Black-box Machine Learning Models8
0.050103902816772