522(top 1%)
papers
8.6K(top 1%)
citations
42(top 1%)
h-index
74(top 1%)
g-index
671
all documents
10.0K
doc citations
1.4K
citing journals

Top Articles

#TitleJournalYearCitations
1A Proof of Security of Yao’s Protocol for Two-Party ComputationJournal of Cryptology2009472
2Computational methods in authorship attributionJournal of the Association for Information Science and Technology2009364
3An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious AdversariesLecture Notes in Computer Science2007260
4Mining the Biomedical Literature in the Genomic Era: An OverviewJournal of Computational Biology2003203
5Universally Composable Password-Based Key ExchangeLecture Notes in Computer Science2005169
6Evaluating practical negotiating agents: Results and analysis of the 2011 international competitionArtificial Intelligence2013137
7GENIUS: AN INTEGRATED ENVIRONMENT FOR SUPPORTING THE DESIGN OF GENERIC AUTOMATED NEGOTIATORSComputational Intelligence2014135
8Efficient high-throughput SARS-CoV-2 testing to detect asymptomatic carriersScience Advances2020135
9An Algorithm for Approximate Tandem RepeatsJournal of Computational Biology2001134
10DeepSign: Deep learning for automatic malware signature generation and classification2015121
11Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries2007121
12Determining if two documents are written by the same authorJournal of the Association for Information Science and Technology2014117
13Security Against Covert Adversaries: Efficient Protocols for Realistic AdversariesJournal of Cryptology2010115
14THE IMPORTANCE OF NEUTRAL EXAMPLES FOR LEARNING SENTIMENTComputational Intelligence2006112
15Bidding in sealed-bid and English multi-attribute auctionsDecision Support Systems2006107
16A statistical theory for quantitative association rules1999104
17Secure Two-Party Computation via Cut-and-Choose Oblivious TransferLecture Notes in Computer Science2011103
18Everlasting security in the bounded storage modelIEEE Transactions on Information Theory200292
19A Statistical Theory for Quantitative Association RulesJournal of Intelligent Information Systems200391
20Secure Multi-Party Computation without AgreementJournal of Cryptology200582
21Implementing Two-Party Computation Efficiently with Security Against Malicious AdversariesLecture Notes in Computer Science200882
22An Efficient SIFT-Based Mode-Seeking Algorithm for Sub-Pixel Registration of Remotely Sensed ImagesIEEE Geoscience and Remote Sensing Letters201581
23Efficient frontier detection for robot explorationInternational Journal of Robotics Research201480
24Skin cancer detection by deep learning and sound analysis algorithms: A prospective clinical study of an elementary dermoscopeEBioMedicine201980
25On Dynamic Shortest Paths ProblemsAlgorithmica201173
26Training Deterministic Parsers with Non-Deterministic OraclesTransactions of the Association for Computational Linguistics201372
27The “Fundamental Problem” of Authorship AttributionEnglish Studies201271
28Secure Two-Party Computation via Cut-and-Choose Oblivious TransferJournal of Cryptology201271
29Online data-driven anomaly detection in autonomous robotsKnowledge and Information Systems201570
30Efficient Constant Round Multi-party Computation Combining BMR and SPDZLecture Notes in Computer Science201569
31Resolving crises through automated bilateral negotiationsArtificial Intelligence200867
32Fragmentation Considered Poisonous, or: One-domain-to-rule-them-all.org201364
33On the Limitations of Universally Composable Two-Party Computation Without Set-Up AssumptionsJournal of Cryptology200663
34Efficient Set Intersection with Simulation-Based SecurityJournal of Cryptology201663
35The giving tree: constructing trees for efficient offline and online multi-robot coverageAnnals of Mathematics and Artificial Intelligence200860
36Keeping Denial-of-Service Attackers in the DarkIEEE Transactions on Dependable and Secure Computing200759
37Explicit Non-adaptive Combinatorial Group Testing SchemesLecture Notes in Computer Science200859
38Realtime Classification for Encrypted TrafficLecture Notes in Computer Science201059
39Intelligent agent supporting human–multi-robot team collaborationArtificial Intelligence201756
40Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert AdversariesJournal of Cryptology201054
41On the Usefulness of Fibonacci Compression CodesComputer Journal201052
42A Genetic Algorithm-Based Solver for Very Large Jigsaw Puzzles201350
43CLOSED SUBGROUPS IN PRO-V TOPOLOGIES AND THE EXTENSION PROBLEM FOR INVERSE AUTOMATAInternational Journal of Algebra and Computation200149
44Why Johnny can't surf (safely)? Attacks and defenses for web usersComputers and Security200948
45A Full Proof of the BGW Protocol for Perfectly Secure Multiparty ComputationJournal of Cryptology201748
46Mining fall-related information in clinical notes: Comparison of rule-based and novel word embedding-based machine learning approachesJournal of Biomedical Informatics201948
47Distributed Algorithms for Network Diameter and GirthLecture Notes in Computer Science201248
48First order temporal logic monitoring with BDDs201746
49Combining psychological models with machine learning to better predict people’s decisionsSynthÈse201245
50Unsupervised and supervised exploitation of semantic domains in lexical disambiguationComputer Speech and Language200443