AI 2000安全与隐私领域学者排名每年选出前10名学者为“最具影响力学者”,前11-100名学者为“最具影响力学者提名”。该名录旨在表彰推动安全与隐私领域进步和创新的杰出学者。
我们会持续优化排名的产品和数据。如果您对产品和数据有合作意向,或者有任何问题和建议,请联系我们:aiopen@aminer.cn。
查查你的排名:
2
2
Model Checking
Grid Computing
Intrusion Detection
Computer Science
Security
得分:8k
3
2
Differential Privacy
Federated Learning
Markov Decision Process
Linear Program
Convex Optimization
得分:7k
9
8
Machine Learning
Artificial Intelligence
Computer Science
Adversarial Examples
Adversarial Example
得分:6k
10
24
得分:6k
12
9
Differential Privacy
Hash Function
Standard Model
Communication Complexity
Privacy Guarantee
得分:5k
15
12
Artificial Intelligence
Computer Science
Deep Learning
Adversarial Example
Computer Vision
得分:5k
17
12
得分:5k
18
12
Access Control
Programming Language
Security Protocol
Type System
Cryptographic Protocol
得分:5k
20
2
Cryptographic Protocol
Cryptography
Security Protocol
Formal Verification
Provable Security
得分:5k
22
7
得分:5k
24
6
Access Control
Security
Computer Science
Cryptography
Byzantine Failures
得分:4k
25
14
Privacy
Cryptography
Oblivious Transfer
Standard Model
Computer Security
得分:4k
26
Data Structure
Assignment Problem
Simplex Algorithm
Verifiable Computation
Longest Path
得分:4k
28
15
Intrusion Detection
Static Analysis
Intrusion Detection System
Security
Web Application
得分:4k
31
7
Programming Language
Security Policy
Software Security
Access Control
Control-flow Integrity
得分:4k
32
39
Memorization
Differential Privacy
Adversarial Example
Genomic Privacy
Adversarial Examples
得分:4k
34
2
得分:4k
36
22
Computer Science
Programming Language
Computer Security
Software Engineering
Separation Logic
得分:4k
37
2
Bitcoin
Ethereum
Protocols
Cryptocurrency
Consensus Computer
得分:4k
39
Number Field Sieve
Proof-carrying Data
Computationally-sound Proofs
Cryptography
Side Channel Attacks
得分:4k
41
2
得分:4k
43
27
得分:3k
44
Succinct Arguments
Zero Knowledge
Interactive Oracle Proofs
Proof-carrying Data
Probabilistically Checkable Proofs
得分:3k
45
Anomaly Detection
Device-free Passive Localization
Robust Device-free Localization
Wireless Communication
Typical Environment
得分:3k
46
Secure Compilation
Computer Science
Dynamic Compromise
Software Fault Isolation
Undefined Behavior
得分:3k
47
5
Trusted Computing
Meltdown
Intel Sgx
Protected Module Architectures
Protected Module Architecture
得分:3k
53
4
Signal Processing
Parameter Estimation
Wireless Sensor Networks
Gaussian Noise
Signal To Noise Ratio
得分:3k
55
3
Blockchain
Trusted Hardware
Oilseed Rape
Smart Contracts
Partial Least Squares Analysis
得分:3k
58
Lower Bound
Testable Code
Property Testing
Computational Complexity
Proof Complexity
得分:3k
59
Zero Knowledge
Computationally-sound Proofs
Proof-carrying Data
Succinct Arguments
Quantum Strategy
得分:3k
60
1
Verifiable Computation
Zero Knowledge Proofs
Security And Protection
Multiple Server System
Diversity Routing
得分:3k
61
8
得分:3k
62
14
得分:3k
68
Blockchain Model
Big Data
Privacy-preserving Smart Contracts
Contractual Breach
Decentralized Smart Contract System
得分:2k
69
18
Side Channel
Side-channel Attack
Intel Sgx
Human Computation
Constraint-based Recommendation
得分:2k
70
5
Nuclear Medicine
Positron Emission Tomography
Wall Motion
Wall Thickening
Neural Network
得分:2k
71
16
得分:2k
72
30
Federated Learning
Probabilistic Model
Secure Aggregation
Composable Probabilistic Inference
Bidirectional Multimodal Structural Alignment
得分:2k
73
16
Blockchain
Computer Science
Behavioral Modeling
Mobile Network Analysis
Campaign Optimization
得分:2k
75
得分:2k
78
81
得分:2k
79
1
Communication Complexity
Secure Computation
Secure Two-party Computation
Network Security
Efficient Protocol
得分:2k
80
8
得分:2k
85
39
得分:2k
86
11
Natural Language
Natural Language Approach
English Shellcode
Natural Language Processing
Security
得分:2k
88
15
Particle Physics
Standard Model
Cross Section
Higgs Boson
Centre Of Mass
得分:2k
89
77
得分:2k
90
10
Adversarial Machine Learning
Machine Learning
Evasion Attacks
Security
Malware Detection
得分:2k
91
5
得分:2k
92
25
Secure Aggregation
Federated Learning
Secure Arithmetic Two-party Computation
Oblivious Linear Evaluation (ole)
Machine Learning
得分:2k
95
34
Plancherel Measure
Central Limit Theorem
Federated Learning
Secure Aggregation
Electronic Health Records
得分:2k
96
34
Secure Aggregation
Federated Learning
Scalable Two-party Secure Computation
Portable Circuit Format
Secure Computation Environment
得分:2k
97
22
Secure Aggregation
Federated Learning
Privacy-preserving Protocols
Machine Learning
Practical Secure Aggregation
得分:2k
98
16
得分:2k
100
16
得分:2k
2
2
Model Checking
Grid Computing
Intrusion Detection
Computer Science
Security
得分:8k
3
2
Differential Privacy
Federated Learning
Markov Decision Process
Linear Program
Convex Optimization
得分:7k
9
8
Machine Learning
Artificial Intelligence
Computer Science
Adversarial Examples
Adversarial Example
得分:6k
10
24
得分:6k
12
9
Differential Privacy
Hash Function
Standard Model
Communication Complexity
Privacy Guarantee
得分:5k
15
12
Artificial Intelligence
Computer Science
Deep Learning
Adversarial Example
Computer Vision
得分:5k
17
12
得分:5k
18
12
Access Control
Programming Language
Security Protocol
Type System
Cryptographic Protocol
得分:5k
20
2
Cryptographic Protocol
Cryptography
Security Protocol
Formal Verification
Provable Security
得分:5k
22
7
得分:5k
24
6
Access Control
Security
Computer Science
Cryptography
Byzantine Failures
得分:4k
25
14
Privacy
Cryptography
Oblivious Transfer
Standard Model
Computer Security
得分:4k
26
Data Structure
Assignment Problem
Simplex Algorithm
Verifiable Computation
Longest Path
得分:4k
28
15
Intrusion Detection
Static Analysis
Intrusion Detection System
Security
Web Application
得分:4k
31
7
Programming Language
Security Policy
Software Security
Access Control
Control-flow Integrity
得分:4k
32
39
Memorization
Differential Privacy
Adversarial Example
Genomic Privacy
Adversarial Examples
得分:4k
34
2
得分:4k
36
22
Computer Science
Programming Language
Computer Security
Software Engineering
Separation Logic
得分:4k
37
2
Bitcoin
Ethereum
Protocols
Cryptocurrency
Consensus Computer
得分:4k
39
Number Field Sieve
Proof-carrying Data
Computationally-sound Proofs
Cryptography
Side Channel Attacks
得分:4k
41
2
得分:4k
43
27
得分:3k
44
Succinct Arguments
Zero Knowledge
Interactive Oracle Proofs
Proof-carrying Data
Probabilistically Checkable Proofs
得分:3k
45
Anomaly Detection
Device-free Passive Localization
Robust Device-free Localization
Wireless Communication
Typical Environment
得分:3k
46
Secure Compilation
Computer Science
Dynamic Compromise
Software Fault Isolation
Undefined Behavior
得分:3k
47
5
Trusted Computing
Meltdown
Intel Sgx
Protected Module Architectures
Protected Module Architecture
得分:3k
53
4
Signal Processing
Parameter Estimation
Wireless Sensor Networks
Gaussian Noise
Signal To Noise Ratio
得分:3k
55
3
Blockchain
Trusted Hardware
Oilseed Rape
Smart Contracts
Partial Least Squares Analysis
得分:3k
58
Lower Bound
Testable Code
Property Testing
Computational Complexity
Proof Complexity
得分:3k
59
Zero Knowledge
Computationally-sound Proofs
Proof-carrying Data
Succinct Arguments
Quantum Strategy
得分:3k
60
1
Verifiable Computation
Zero Knowledge Proofs
Security And Protection
Multiple Server System
Diversity Routing
得分:3k
61
8
得分:3k
62
14
得分:3k
68
Blockchain Model
Big Data
Privacy-preserving Smart Contracts
Contractual Breach
Decentralized Smart Contract System
得分:2k
69
18
Side Channel
Side-channel Attack
Intel Sgx
Human Computation
Constraint-based Recommendation
得分:2k
70
5
Nuclear Medicine
Positron Emission Tomography
Wall Motion
Wall Thickening
Neural Network
得分:2k
71
16
得分:2k
72
30
Federated Learning
Probabilistic Model
Secure Aggregation
Composable Probabilistic Inference
Bidirectional Multimodal Structural Alignment
得分:2k
73
16
Blockchain
Computer Science
Behavioral Modeling
Mobile Network Analysis
Campaign Optimization
得分:2k
75
得分:2k
78
81
得分:2k
79
1
Communication Complexity
Secure Computation
Secure Two-party Computation
Network Security
Efficient Protocol
得分:2k
80
8
得分:2k
85
39
得分:2k
86
11
Natural Language
Natural Language Approach
English Shellcode
Natural Language Processing
Security
得分:2k
88
15
Particle Physics
Standard Model
Cross Section
Higgs Boson
Centre Of Mass
得分:2k
89
77
得分:2k
90
10
Adversarial Machine Learning
Machine Learning
Evasion Attacks
Security
Malware Detection
得分:2k
91
5
得分:2k
92
25
Secure Aggregation
Federated Learning
Secure Arithmetic Two-party Computation
Oblivious Linear Evaluation (ole)
Machine Learning
得分:2k
95
34
Plancherel Measure
Central Limit Theorem
Federated Learning
Secure Aggregation
Electronic Health Records
得分:2k
96
34
Secure Aggregation
Federated Learning
Scalable Two-party Secure Computation
Portable Circuit Format
Secure Computation Environment
得分:2k
97
22
Secure Aggregation
Federated Learning
Privacy-preserving Protocols
Machine Learning
Practical Secure Aggregation
得分:2k
98
16
得分:2k
100
16
得分:2k