Ieee Security & Privacy

Ieee Security & Privacy

IEEE 安全与隐私

  • 4区 中科院分区
  • Q2 JCR分区

高引用文章

文章名称 引用次数
A First Look at Identity Management Schemes on the Blockchain 30
Blockchain Access Privacy: Challenges and Directions 21
Cybersecurity in an Era with Quantum Computers Will We Be Ready? 13
Ethics and Privacy in Al and Big Data: Implementing Responsible Research and Innovation 12
Enslaving the Algorithm: From a Right to an Explanation to a Right to Better Decisions? 10
Privacy-Preserving Machine Learning: Threats and Solutions 9
Toward Fairness of Cryptocurrency Payments 9
IoT Goes Nuclear: Creating a Zigbee Chain Reaction 9
Toward a Cybersecurity Certification Framework for the Internet of Things 6
Cyber Deception: Overview and the Road Ahead 6
Privacy and Civilian Drone Use: The Need for Further Regulation 6
Privacy-Aware Restricted Areas for Unmanned Aerial Systems 5
How Deep Learning Is Making Information Security More Intelligent 5
Public Auditing for Trusted Cloud Storage Services 5
When the Crypto in Cryptocurrencies Breaks: Bitcoin Security under Broken Primitives 4
The Internet of Things Promises New Benefits and Risks A Systematic Analysis of Adoption Dynamics of IoT Products 4
Protecting against Ransomware: A New Line of Research or Restating Classic Ideas? 4
Scoping the Cyber Security Body of Knowledge 4
Making Multivariant Programming Practical and Inexpensive 4
Defending from Stealthy Botnets Using Moving Target Defenses 4
Safe Machine Learning and Defeating Adversarial Attacks 3
AI and the Ethics of Automating Consent 3
Cyberphysical Security for the Masses A Survey of the Internet Protocol Suite for Internet of Things Security 3
The KISS Principle in Software-Defined Networking: A Framework for Secure Communications 3
The Privacy Paradox of Adolescent Online Safety: A Matter of Risk Prevention or Risk Resilience? 3
Digital Investigation of PDF Files Unveiling Traces of Embedded Malware 3
Self-Sovereign Digital Identity A Paradigm Shift for Identity 3
Did App Privacy Improve After the GDPR? 3
A Cognitive Protection System for the Internet of Things 2
Emerging Threats in Internet of Things Voice Services 2
Blockchain-Based Distributed Cloud Storage Digital Forensics: Where's the Beef? 2
PQChain: Strategic Design Decisions for Distributed Ledger Technologies against Future Threats 2
Tyranny of the Majority: On the (Im)possibility of Correctness of Smart Contracts 2
When Is an Algorithm Transparent? Predictive Analytics, Privacy, and Public Policy 2
A Harm-Reduction Framework for Algorithmic Fairness 2
What Can Political Philosophy Teach Us about Algorithmic Fairness? 2
Stealing, Spying, and Abusing: Consequences of Attacks on Internet of Things Devices 2
Quantum Computing: Codebreaking and Beyond 2
Mechanical Phish: Resilient Autonomous Hacking 2
Quantum Key Distribution and Its Applications 2
Xandra: An Autonomous Cyber Battle System for the Cyber Grand Challenge 2
Individualizing Cybersecurity Lab Exercises with Labtainers 2
The Mayhem Cyber Reasoning System 1
Effects of a Honeypot on the Cyber Grand Challenge Final Event 1
Quantum Cryptanalysis: Shor, Grover, and Beyond 1
Flow-Based Compromise Detection:Lessons Learned 1
Arya: Operating System Support for Securely Augmenting Reality 1
Verifiable Classroom Voting in Practice 1
Toward Continual Measurement of Global Network-Level Censorship 1
Proactively Protecting Against the Singularity: Ethical Decision Making in AI 1