ACM Transactions on Privacy and Security

Papers
(The TQCC of ACM Transactions on Privacy and Security is 6. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
Secure Selections on Encrypted Multi-writer Streams87
Towards Better Understanding of User Authorization Query Problem via Multi-variable Complexity Analysis33
Secure and Reliable Network Updates31
Security Implications of the Morello Platform: An Empirical Threat Model-Based Analysis30
TLS-MHSA: An Efficient Detection Model for Encrypted Malicious Traffic based on Multi-Head Self-Attention Mechanism28
Deep PackGen: A Deep Reinforcement Learning Framework for Adversarial Network Packet Generation27
Dimensional Robustness Certification for Deep Neural Networks in Network Intrusion Detection Systems24
A Secret Sharing-Inspired Robust Distributed Backdoor Attack to Federated Learning24
Binsec/Rel: Symbolic Binary Analyzer for Security with Applications to Constant-Time and Secret-Erasure22
Flexible Mechanisms for Remote Attestation22
Bi-objective Optimization in Role Mining18
Site Inspector: Improving Browser Communication of Website Security Information18
#PrettyFlyForAWiFi17
SPArch: A Hardware-oriented Sketch-based Architecture for High-speed Network Flow Measurements17
CBAs: Character-level Backdoor Attacks against Chinese Pre-trained Language Models17
Information Leakage Games: Exploring Information as a Utility Function16
symbSODA: Configurable and Verifiable Orchestration Automation for Active Malware Deception15
Differentially Private Real-Time Release of Sequential Data14
Spoofing Against Spoofing: Toward Caller ID Verification in Heterogeneous Telecommunication Systems13
PredicTor: A Global, Machine Learning Approach to Tor Path Selection13
An Experimental Assessment of Inconsistencies in Memory Forensics12
Valued Authorization Policy Existence Problem: Theory and Experiments12
C3PO: C loud-based C onfidentiality-preserving C ontinuous Query P r 12
A Decentralized Private Data Marketplace using Blockchain and Secure Multi-Party Computation12
Improving Unlinkability of Attribute-based Authentication through Game Theory11
Adversarial Attack and Defense for Commercial Black-box Chinese-English Speech Recognition Systems11
Fraud Detection under Siege: Practical Poisoning Attacks and Defense Strategies11
So Near and Yet So Far – Symbolic Verification of Distance-Bounding Protocols10
CySecBERT : A Domain-Adapted Language Model for the Cybersecurity Domain9
What Users Want From Cloud Deletion and the Information They Need: A Participatory Action Study9
Semi-Supervised Classification of Malware Families Under Extreme Class Imbalance via Hierarchical Non-Negative Matrix Factorization with Automatic Model Selection9
Performance and Usability Evaluation of Brainwave Authentication Techniques with Consumer Devices8
Assessment Framework for the Identification and Evaluation of Main Features for Distributed Usage Control Solutions8
Generating Quality Threat Intelligence Leveraging OSINT and a Cyber Threat Unified Taxonomy8
ZTA-IoT: A Novel Architecture for Zero-Trust in IoT Systems and an Ensuing Usage Control Model8
Sphinx-in-the-Head: Group Signatures from Symmetric Primitives7
B 3 : Backdoor Attacks against Black-box Machine Learning Models7
A Comparison of Systemic and Systematic Risks of Malware Encounters in Consumer and Enterprise Environments7
Balancing Security and Privacy in Genomic Range Queries7
AutoFR: Automated Filter Rule Generation for Adblocking6
Euler : Detecting Network Lateral Movement via Scalable Temporal Link Prediction6
Computation on Encrypted Data Using Dataflow Authentication6
A Lightweight Privacy-Aware Continuous Authentication Protocol-PACA6
Optimal Packet Camouflage Against Traffic Analysis6
End-to-End Security for Distributed Event-driven Enclave Applications on Heterogeneous TEEs6
RansomShield: A Visualization Approach to Defending Mobile Systems Against Ransomware6
Risk Prediction of IoT Devices Based on Vulnerability Analysis6
Cyber Threat Intelligence meets the Analytic Tradecraft6
SoK: Human-centered Phishing Susceptibility6
0.024444103240967