H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 91 Citations 36,982 290 World Ranking 252 National Ranking 152

Research.com Recognitions

Awards & Achievements

2014 - IEEE Fellow For contributions to computer security and fault-tolerant distributed computing

2008 - ACM Fellow For contributions to computer security and fault-tolerant distributed computing.

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Computer network
  • The Internet

Michael K. Reiter focuses on Computer security, Server, Distributed computing, Computer network and Cryptography. His study in Computer security focuses on Password, Side channel attack, S/KEY, Password strength and Encryption. The various areas that Michael K. Reiter examines in his Server study include Consistency, Network topology, Protocol and Network data.

In his study, Hash function is strongly linked to Key, which falls under the umbrella field of Distributed computing. His study focuses on the intersection of Computer network and fields such as Software deployment with connections in the field of Implementation, Extensibility, Resource management and Workload. His Cryptography study combines topics in areas such as Graph, Authorization and Linux kernel.

His most cited work include:

  • Crowds: anonymity for Web transactions (1756 citations)
  • False data injection attacks against state estimation in electric power grids (1182 citations)
  • False data injection attacks against state estimation in electric power grids (790 citations)

What are the main themes of his work throughout his whole career to date?

His primary scientific interests are in Computer security, Distributed computing, Computer network, Server and Access control. His study in Cryptography, Public-key cryptography, Password, Key and Authentication is carried out as part of his Computer security studies. His Distributed computing research includes themes of Scalability and Software deployment.

His research integrates issues of Consistency and Fault tolerance, Replication, State machine replication in his study of Server. The Access control study combines topics in areas such as User interface and Internet privacy. His Byzantine fault tolerance study integrates concerns from other disciplines, such as Protocol and Asynchronous communication.

He most often published in these fields:

  • Computer security (35.48%)
  • Distributed computing (22.83%)
  • Computer network (18.86%)

What were the highlights of his more recent work (between 2015-2021)?

  • Computer security (35.48%)
  • Computer network (18.86%)
  • Cloud computing (4.47%)

In recent papers he was focusing on the following fields of study:

Michael K. Reiter mostly deals with Computer security, Computer network, Cloud computing, Artificial intelligence and Scalability. His multidisciplinary approach integrates Computer security and Corruption in his work. His work carried out in the field of Computer network brings together such families of science as Virtual machine and Communication complexity.

The concepts of his Cloud computing study are interwoven with issues in World Wide Web, Server, Software and Risk analysis. In his study, Malware is inextricably linked to Machine learning, which falls within the broad field of Artificial intelligence. His Scalability research is multidisciplinary, incorporating perspectives in Byzantine fault tolerance and Protocol.

Between 2015 and 2021, his most popular works were:

  • Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition (725 citations)
  • Stealing machine learning models via prediction APIs (478 citations)
  • Stealing Machine Learning Models via Prediction APIs (210 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Computer network
  • The Internet

His scientific interests lie mostly in Artificial neural network, Distributed computing, Computer security, Scalability and Robustness. His study in Artificial neural network is interdisciplinary in nature, drawing from both Adversary and Facial recognition system. His Distributed computing research is multidisciplinary, relying on both Gremlin, Traffic engineering and Microservices.

His Computer security research incorporates themes from Software framework, Software and Face detection. He has researched Scalability in several fields, including Network management, Optimization problem and Heuristics. In his research on the topic of Robustness, Classifier and Theoretical computer science is strongly related with Adversarial system.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Crowds: anonymity for Web transactions

Michael K. Reiter;Aviel D. Rubin.
ACM Transactions on Information and System Security (1998)

2637 Citations

False data injection attacks against state estimation in electric power grids

Yao Liu;Peng Ning;Michael K. Reiter.
ACM Transactions on Information and System Security (2011)

2239 Citations

The design and analysis of graphical passwords

Ian Jermyn;Alain Mayer;Fabian Monrose;Michael K. Reiter.
usenix security symposium (1999)

1095 Citations

Flicker: an execution infrastructure for tcb minimization

Jonathan M. McCune;Bryan J. Parno;Adrian Perrig;Michael K. Reiter.
european conference on computer systems (2008)

839 Citations

Byzantine quorum systems

Dahlia Malkhi;Michael Reiter.
Distributed Computing (1998)

805 Citations

Cross-VM side channels and their use to extract private keys

Yinqian Zhang;Ari Juels;Michael K. Reiter;Thomas Ristenpart.
computer and communications security (2012)

805 Citations

Password hardening based on keystroke dynamics

Fabian Monrose;Michael K. Reiter;Susanne Wetzel.
International Journal of Information Security (2002)

694 Citations

Seeing-is-believing: using camera phones for human-verifiable authentication

Jonathan M. McCune;Adrian Perrig;Michael K. Reiter.
ieee symposium on security and privacy (2005)

682 Citations

On user choice in graphical password schemes

Darren Davis;Fabian Monrose;Michael K. Reiter.
usenix security symposium (2004)

656 Citations

Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition

Mahmood Sharif;Sruti Bhagavatula;Lujo Bauer;Michael K. Reiter.
computer and communications security (2016)

613 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Michael K. Reiter

Adrian Perrig

Adrian Perrig

ETH Zurich

Publications: 70

Miguel Correia

Miguel Correia

Instituto Superior Técnico

Publications: 56

Gene Tsudik

Gene Tsudik

University of California, Irvine

Publications: 55

Wei Yu

Wei Yu

Towson University

Publications: 52

Peng Liu

Peng Liu

Chinese Academy of Sciences

Publications: 49

Dawn Song

Dawn Song

University of California, Berkeley

Publications: 48

Nadarajah Asokan

Nadarajah Asokan

University of Waterloo

Publications: 48

Elisa Bertino

Elisa Bertino

Purdue University West Lafayette

Publications: 47

Xinwen Fu

Xinwen Fu

University of Massachusetts Lowell

Publications: 47

Lorrie Faith Cranor

Lorrie Faith Cranor

Carnegie Mellon University

Publications: 46

Patrick McDaniel

Patrick McDaniel

Pennsylvania State University

Publications: 44

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

TU Darmstadt

Publications: 43

Angelos Stavrou

Angelos Stavrou

Virginia Tech

Publications: 42

Paulo Veríssimo

Paulo Veríssimo

King Abdullah University of Science and Technology

Publications: 41

Frank Piessens

Frank Piessens

KU Leuven

Publications: 41

Something went wrong. Please try again later.