D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 93 Citations 37,811 380 World Ranking 309 National Ranking 188

Research.com Recognitions

Awards & Achievements

2014 - IEEE Fellow For contributions to computer security and fault-tolerant distributed computing

2008 - ACM Fellow For contributions to computer security and fault-tolerant distributed computing.

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Computer network
  • The Internet

Michael K. Reiter focuses on Computer security, Server, Distributed computing, Computer network and Cryptography. His study in Computer security focuses on Password, Side channel attack, S/KEY, Password strength and Encryption. The various areas that Michael K. Reiter examines in his Server study include Consistency, Network topology, Protocol and Network data.

In his study, Hash function is strongly linked to Key, which falls under the umbrella field of Distributed computing. His study focuses on the intersection of Computer network and fields such as Software deployment with connections in the field of Implementation, Extensibility, Resource management and Workload. His Cryptography study combines topics in areas such as Graph, Authorization and Linux kernel.

His most cited work include:

  • Crowds: anonymity for Web transactions (1756 citations)
  • False data injection attacks against state estimation in electric power grids (1182 citations)
  • False data injection attacks against state estimation in electric power grids (790 citations)

What are the main themes of his work throughout his whole career to date?

His primary scientific interests are in Computer security, Distributed computing, Computer network, Server and Access control. His study in Cryptography, Public-key cryptography, Password, Key and Authentication is carried out as part of his Computer security studies. His Distributed computing research includes themes of Scalability and Software deployment.

His research integrates issues of Consistency and Fault tolerance, Replication, State machine replication in his study of Server. The Access control study combines topics in areas such as User interface and Internet privacy. His Byzantine fault tolerance study integrates concerns from other disciplines, such as Protocol and Asynchronous communication.

He most often published in these fields:

  • Computer security (35.48%)
  • Distributed computing (22.83%)
  • Computer network (18.86%)

What were the highlights of his more recent work (between 2015-2021)?

  • Computer security (35.48%)
  • Computer network (18.86%)
  • Cloud computing (4.47%)

In recent papers he was focusing on the following fields of study:

Michael K. Reiter mostly deals with Computer security, Computer network, Cloud computing, Artificial intelligence and Scalability. His multidisciplinary approach integrates Computer security and Corruption in his work. His work carried out in the field of Computer network brings together such families of science as Virtual machine and Communication complexity.

The concepts of his Cloud computing study are interwoven with issues in World Wide Web, Server, Software and Risk analysis. In his study, Malware is inextricably linked to Machine learning, which falls within the broad field of Artificial intelligence. His Scalability research is multidisciplinary, incorporating perspectives in Byzantine fault tolerance and Protocol.

Between 2015 and 2021, his most popular works were:

  • Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition (725 citations)
  • Stealing machine learning models via prediction APIs (478 citations)
  • Stealing Machine Learning Models via Prediction APIs (210 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Computer network
  • The Internet

His scientific interests lie mostly in Artificial neural network, Distributed computing, Computer security, Scalability and Robustness. His study in Artificial neural network is interdisciplinary in nature, drawing from both Adversary and Facial recognition system. His Distributed computing research is multidisciplinary, relying on both Gremlin, Traffic engineering and Microservices.

His Computer security research incorporates themes from Software framework, Software and Face detection. He has researched Scalability in several fields, including Network management, Optimization problem and Heuristics. In his research on the topic of Robustness, Classifier and Theoretical computer science is strongly related with Adversarial system.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

False data injection attacks against state estimation in electric power grids

Yao Liu;Peng Ning;Michael K. Reiter.
ACM Transactions on Information and System Security (2011)

2911 Citations

Crowds: anonymity for Web transactions

Michael K. Reiter;Aviel D. Rubin.
ACM Transactions on Information and System Security (1998)

2834 Citations

False data injection attacks against state estimation in electric power grids

Yao Liu;Peng Ning;Michael K. Reiter.
computer and communications security (2009)

1321 Citations

The design and analysis of graphical passwords

Ian Jermyn;Alain Mayer;Fabian Monrose;Michael K. Reiter.
usenix security symposium (1999)

1173 Citations

Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition

Mahmood Sharif;Sruti Bhagavatula;Lujo Bauer;Michael K. Reiter.
computer and communications security (2016)

1135 Citations

Stealing machine learning models via prediction APIs

Florian Tramèr;Fan Zhang;Ari Juels;Michael K. Reiter.
usenix security symposium (2016)

967 Citations

Cross-VM side channels and their use to extract private keys

Yinqian Zhang;Ari Juels;Michael K. Reiter;Thomas Ristenpart.
computer and communications security (2012)

926 Citations

Flicker: an execution infrastructure for tcb minimization

Jonathan M. McCune;Bryan J. Parno;Adrian Perrig;Michael K. Reiter.
european conference on computer systems (2008)

925 Citations

Byzantine quorum systems

Dahlia Malkhi;Michael Reiter.
Distributed Computing (1998)

894 Citations

Seeing-is-believing: using camera phones for human-verifiable authentication

J.M. McCune;A. Perrig;M.K. Reiter.
ieee symposium on security and privacy (2005)

740 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Michael K. Reiter

Adrian Perrig

Adrian Perrig

ETH Zurich

Publications: 70

Miguel Correia

Miguel Correia

Instituto Superior Técnico

Publications: 56

Gene Tsudik

Gene Tsudik

University of California, Irvine

Publications: 55

Wei Yu

Wei Yu

Towson University

Publications: 52

Peng Liu

Peng Liu

Chinese Academy of Sciences

Publications: 49

Dawn Song

Dawn Song

University of California, Berkeley

Publications: 48

Nadarajah Asokan

Nadarajah Asokan

University of Waterloo

Publications: 48

Elisa Bertino

Elisa Bertino

Purdue University West Lafayette

Publications: 47

Xinwen Fu

Xinwen Fu

University of Massachusetts Lowell

Publications: 47

Lorrie Faith Cranor

Lorrie Faith Cranor

Carnegie Mellon University

Publications: 46

Patrick McDaniel

Patrick McDaniel

Pennsylvania State University

Publications: 44

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

Technical University of Darmstadt

Publications: 43

Angelos Stavrou

Angelos Stavrou

Virginia Tech

Publications: 42

Paulo Veríssimo

Paulo Veríssimo

King Abdullah University of Science and Technology

Publications: 41

Frank Piessens

Frank Piessens

KU Leuven

Publications: 41

Sushil Jajodia

Sushil Jajodia

George Mason University

Publications: 39

Trending Scientists

George Candea

George Candea

École Polytechnique Fédérale de Lausanne

Richang Hong

Richang Hong

Hefei University of Technology

Diego Klabjan

Diego Klabjan

Northwestern University

Fabing Su

Fabing Su

Chinese Academy of Sciences

James A. Finch

James A. Finch

McGill University

M.-A. Nicolet

M.-A. Nicolet

California Institute of Technology

Donald L. Court

Donald L. Court

National Institutes of Health

Christian Doerig

Christian Doerig

RMIT University

Yoshimasa Morino

Yoshimasa Morino

Kumamoto University

Janice White

Janice White

Howard Hughes Medical Institute

Robert C. Newton

Robert C. Newton

University of California, Los Angeles

David Thistle

David Thistle

Florida State University

Nima Rezaei

Nima Rezaei

Tehran University of Medical Sciences

Michael J. Lambert

Michael J. Lambert

Brigham Young University

Michael Kashgarian

Michael Kashgarian

Yale University

Stefan Kuhlmann

Stefan Kuhlmann

University of Twente

Something went wrong. Please try again later.