AI 2000 全球人工智能学者
领域
2014
2023
领域
  • AI 2000
  • 热点
AI 2000安全与隐私领域学者排名每年选出前10名学者为“最具影响力学者”,前11-100名学者为“最具影响力学者提名”。该名录旨在表彰推动安全与隐私领域进步和创新的杰出学者。
我们会持续优化排名的产品和数据。如果您对产品和数据有合作意向,或者有任何问题和建议,请联系我们:aiopen@aminer.cn
1
2
Cloud Computing
Hash Function
Security
Cryptography
Provable Security
得分9k
2
2
IEEE
ACM
Model Checking
Grid Computing
Intrusion Detection
Computer Science
Security
得分8k
3
2
Differential Privacy
Federated Learning
Markov Decision Process
Linear Program
Convex Optimization
得分7k
4
3
Oblivious Ram
Privacy
Cloud Computing
Cryptography
Security
得分7k
5
12
Privacy
Cryptographic Protocol
Security
Data Privacy
Data Mining
得分6k
6
2
Computer Science
Side-channel Attacks
Cache Attacks
Flush Plus Reload
Rowhammer
得分6k
7
40
Smart Contracts
Computer Graphics
Blockchain
Hardware
Cryptography
得分6k
8
2
Security
Internet
Cryptography
Privacy
Computer Security
得分6k
9
8
Machine Learning
Artificial Intelligence
Computer Science
Adversarial Examples
Adversarial Example
得分6k
10
24
Location Privacy
Privacy
Data Privacy
Machine Learning
Location-based Services
得分6k
11
29
Social Network
Twitter Spam
SPAM
Social Networks
Fraudulent Account
得分5k
12
9
Differential Privacy
Hash Function
Standard Model
Communication Complexity
Privacy Guarantee
得分5k
13
6
Side-channel Attack
Intel Sgx
Side-channel Attacks
Side Channel
Spectre
得分5k
14
2
Web Security
Web Application
Bitcoin
Computer Security
Information Flow
得分5k
15
12
Artificial Intelligence
Computer Science
Deep Learning
Adversarial Example
Computer Vision
得分5k
16
12
Social Network
Influence Propagation
Path Planning
Localization
Mobile Robots
得分5k
17
12
Differential Privacy
Approximation Algorithm
Lower Bound
Metric Space
Polynomial Time
得分5k
18
12
Access Control
Programming Language
Security Protocol
Type System
Cryptographic Protocol
得分5k
19
12
Differential Privacy
Deep Learning
Training Efficiency
Privacy Cost
Deep Neural Network
得分5k
20
2
Cryptographic Protocol
Cryptography
Security Protocol
Formal Verification
Provable Security
得分5k
21
12
Rfid Tag
Authentication
Privacy
RFID
Cryptography
得分5k
22
7
Operating System
Security
Operating Systems
Reverse Engineering
Intrusion Detection
得分5k
23
12
Security
Security Analysis
TLS
Search Engine
Paper Ballot
得分4k
24
6
Access Control
Security
Computer Science
Cryptography
Byzantine Failures
得分4k
25
14
Privacy
Cryptography
Oblivious Transfer
Standard Model
Computer Security
得分4k
26
Data Structure
Assignment Problem
Simplex Algorithm
Verifiable Computation
Longest Path
得分4k
27
17
Security
TLS
Https
Measurement
Scanning
得分4k
28
15
Intrusion Detection
Static Analysis
Intrusion Detection System
Security
Web Application
得分4k
29
3
Computer Security
Internet
Security
Ethics
Denial Of Service Attack
得分4k
30
6
Machine Learning
Privacy
Deep Learning
Security
Model Stealing
得分4k
31
7
Programming Language
Security Policy
Software Security
Access Control
Control-flow Integrity
得分4k
32
39
Memorization
Differential Privacy
Adversarial Example
Genomic Privacy
Adversarial Examples
得分4k
33
8
Privacy
Data Privacy
Cryptography
Computer Security
Data Mining
得分4k
34
2
Trusted Computing
Computer Science
Computer Security
Security
Cryptography
得分4k
35
14
Security
Internet
Privacy
Denial Of Service
Electronic Commerce
得分4k
36
22
Computer Science
Programming Language
Computer Security
Software Engineering
Separation Logic
得分4k
37
2
Bitcoin
Ethereum
Protocols
Cryptocurrency
Consensus Computer
得分4k
38
36
Block Cipher
Static Analysis
Privacy
Cryptography
Computer Security
得分4k
39
Number Field Sieve
Proof-carrying Data
Computationally-sound Proofs
Cryptography
Side Channel Attacks
得分4k
40
2
Security
Reliability
LLVM
Operating Systems
Rowhammer
得分4k
41
2
Privacy
Machine Learning
Security
Deep Learning
Convolutional Neural Networks
得分4k
42
19
Security
Security Policy
Internet
Android
Operating System
得分3k
43
27
Intrusion Detection
Static Analysis
Web Application
Malware
Internet
得分3k
44
Succinct Arguments
Zero Knowledge
Interactive Oracle Proofs
Proof-carrying Data
Probabilistically Checkable Proofs
得分3k
45
Anomaly Detection
Device-free Passive Localization
Robust Device-free Localization
Wireless Communication
Typical Environment
得分3k
46
Secure Compilation
Computer Science
Dynamic Compromise
Software Fault Isolation
Undefined Behavior
得分3k
47
5
Trusted Computing
Meltdown
Intel Sgx
Protected Module Architectures
Protected Module Architecture
得分3k
48
7
Public Key
Cryptography
Computer Science
Random Oracle
Bilinear Map
得分3k
49
5
Malware
Dns Traffic
Domain Name
Servers
Computer Security
得分3k
50
1
Computer Science
Computer Security
Privacy
Hacker
Anticipation Game
得分3k
51
27
Privacy
Malicious Software
Internet
Security
Authentication
得分3k
52
2
RSA
Side-channel Attacks
Side-channel Attack
Cache Attacks
Side Channel
得分3k
53
4
Signal Processing
Parameter Estimation
Wireless Sensor Networks
Gaussian Noise
Signal To Noise Ratio
得分3k
54
4
Machine Learning
Computer Science
Security
Taint Tracking
Parameterized Complexity
得分3k
55
3
Blockchain
Trusted Hardware
Oilseed Rape
Smart Contracts
Partial Least Squares Analysis
得分3k
56
42
Privacy
Computer Science
Protocols
Trustworthy In-person Certification
Content Moderation
得分3k
57
Oblivious Ram
Semantic Data
Resource Description Framework
Rdf Data
Scalable Reasoning
得分3k
58
Lower Bound
Testable Code
Property Testing
Computational Complexity
Proof Complexity
得分3k
59
Zero Knowledge
Computationally-sound Proofs
Proof-carrying Data
Succinct Arguments
Quantum Strategy
得分3k
60
1
Verifiable Computation
Zero Knowledge Proofs
Security And Protection
Multiple Server System
Diversity Routing
得分3k
61
8
Ransomware
Malware
Autonomous Underwater Vehicle
Search Engine
Trajectory Design
得分3k
62
14
Bolted Connection
Curling
Finite Element Analysis
Ultimate Strength
Strength Reduction
得分3k
63
3
Privacy
DNS
Domain Name System
Security
Malware
得分3k
65
7
Android
Usability
Cryptography
Security
Usable Security
得分2k
66
12
Computer Science
Side Channel Attack
Side-channel Attack
Spectre
Meltdown
得分2k
67
75
Rowhammer
Cloud Computing
Rowhammer Attacks
Dram Chip
Hardware
得分2k
68
Blockchain Model
Big Data
Privacy-preserving Smart Contracts
Contractual Breach
Decentralized Smart Contract System
得分2k
69
18
Side Channel
Side-channel Attack
Intel Sgx
Human Computation
Constraint-based Recommendation
得分2k
70
5
Nuclear Medicine
Positron Emission Tomography
Wall Motion
Wall Thickening
Neural Network
得分2k
71
16
Computer Vision
Social Network
Face Recognition
Wearable Computer
Real Time
得分2k
72
30
Federated Learning
Probabilistic Model
Secure Aggregation
Composable Probabilistic Inference
Bidirectional Multimodal Structural Alignment
得分2k
73
16
Blockchain
Computer Science
Behavioral Modeling
Mobile Network Analysis
Campaign Optimization
得分2k
74
16
Personal Data
Privacy
Bitcoin
Blockchain
Decentralized Computation Platform
得分2k
75
Concurrency
Abstract Interpretation
Verification
Smart Contracts
Memory Model
得分2k
76
22
Cryptography
Wireless Network
Cloud Storage
Message Authentication
Block Cipher
得分2k
77
32
Security
Computer Science
Fuzzing
Computer Security
Cyber-physical System
得分2k
78
81
Memorization
Poisoning Attacks
Adversarial Machine Learning
TLS
Secure Channel
得分2k
79
1
Communication Complexity
Secure Computation
Secure Two-party Computation
Network Security
Efficient Protocol
得分2k
80
8
Computer Science
Smart Contracts
Robustness
Access Control
Symbolic Execution
得分2k
81
82
Traffic Analysis
Privacy
Deep Learning
Flow Correlation
Differential Privacy
得分2k
82
20
Social Network
Authentication
Privacy
Social Networks
Computer Security
得分2k
83
13
Operating System
Cryptography
Anonymity
Computer Science
Cloud Computing
得分2k
84
27
Federated Learning
Machine Learning
Computer Science
Web Pages
Topic Model
得分2k
85
39
Cryptographic Protocol
Cryptography
Computer Science
Web Service
Security Protocol
得分2k
86
11
Natural Language
Natural Language Approach
English Shellcode
Natural Language Processing
Security
得分2k
87
19
Access Control
Security
Security Policy
Privacy
Usability
得分2k
88
15
Particle Physics
Standard Model
Cross Section
Higgs Boson
Centre Of Mass
得分2k
89
77
Privacy
Cryptography
Homomorphic Encryption
Secret Sharing
Cryptographic Extension
得分2k
90
10
Adversarial Machine Learning
Machine Learning
Evasion Attacks
Security
Malware Detection
得分2k
91
5
Secure Computation
Oblivious Ram
Domain Adaptation
Oblivious Algorithms
Security
得分2k
92
25
Secure Aggregation
Federated Learning
Secure Arithmetic Two-party Computation
Oblivious Linear Evaluation (ole)
Machine Learning
得分2k
93
36
Cryptography
Encryption
One-way Function
Resettable Security
Non-black-box Simulation
得分2k
94
5
Computer Security
Static Analysis
Vulnerability
Phishing
Firmware
得分2k
95
34
Plancherel Measure
Central Limit Theorem
Federated Learning
Secure Aggregation
Electronic Health Records
得分2k
96
34
Secure Aggregation
Federated Learning
Scalable Two-party Secure Computation
Portable Circuit Format
Secure Computation Environment
得分2k
97
22
Secure Aggregation
Federated Learning
Privacy-preserving Protocols
Machine Learning
Practical Secure Aggregation
得分2k
98
16
Computer Security
Computer Science
Blockchain
Scalability
Ledger Pruning
得分2k
99
16
Scalability
Computer Science
Computer Security
Blockchain
Ledger Pruning
得分2k
100
16
Computer Science
Side-channel Analysis
Power Analysis
Side-channel Attack
Masking
得分2k
1
2
Cloud Computing
Hash Function
Security
Cryptography
Provable Security
得分9k
2
2
IEEE
ACM
Model Checking
Grid Computing
Intrusion Detection
Computer Science
Security
得分8k
3
2
Differential Privacy
Federated Learning
Markov Decision Process
Linear Program
Convex Optimization
得分7k
4
3
Oblivious Ram
Privacy
Cloud Computing
Cryptography
Security
得分7k
5
12
Privacy
Cryptographic Protocol
Security
Data Privacy
Data Mining
得分6k
6
2
Computer Science
Side-channel Attacks
Cache Attacks
Flush Plus Reload
Rowhammer
得分6k
7
40
Smart Contracts
Computer Graphics
Blockchain
Hardware
Cryptography
得分6k
8
2
Security
Internet
Cryptography
Privacy
Computer Security
得分6k
9
8
Machine Learning
Artificial Intelligence
Computer Science
Adversarial Examples
Adversarial Example
得分6k
10
24
Location Privacy
Privacy
Data Privacy
Machine Learning
Location-based Services
得分6k
11
29
Social Network
Twitter Spam
SPAM
Social Networks
Fraudulent Account
得分5k
12
9
Differential Privacy
Hash Function
Standard Model
Communication Complexity
Privacy Guarantee
得分5k
13
6
Side-channel Attack
Intel Sgx
Side-channel Attacks
Side Channel
Spectre
得分5k
14
2
Web Security
Web Application
Bitcoin
Computer Security
Information Flow
得分5k
15
12
Artificial Intelligence
Computer Science
Deep Learning
Adversarial Example
Computer Vision
得分5k
16
12
Social Network
Influence Propagation
Path Planning
Localization
Mobile Robots
得分5k
17
12
Differential Privacy
Approximation Algorithm
Lower Bound
Metric Space
Polynomial Time
得分5k
18
12
Access Control
Programming Language
Security Protocol
Type System
Cryptographic Protocol
得分5k
19
12
Differential Privacy
Deep Learning
Training Efficiency
Privacy Cost
Deep Neural Network
得分5k
20
2
Cryptographic Protocol
Cryptography
Security Protocol
Formal Verification
Provable Security
得分5k
21
12
Rfid Tag
Authentication
Privacy
RFID
Cryptography
得分5k
22
7
Operating System
Security
Operating Systems
Reverse Engineering
Intrusion Detection
得分5k
23
12
Security
Security Analysis
TLS
Search Engine
Paper Ballot
得分4k
24
6
Access Control
Security
Computer Science
Cryptography
Byzantine Failures
得分4k
25
14
Privacy
Cryptography
Oblivious Transfer
Standard Model
Computer Security
得分4k
26
Data Structure
Assignment Problem
Simplex Algorithm
Verifiable Computation
Longest Path
得分4k
27
17
Security
TLS
Https
Measurement
Scanning
得分4k
28
15
Intrusion Detection
Static Analysis
Intrusion Detection System
Security
Web Application
得分4k
29
3
Computer Security
Internet
Security
Ethics
Denial Of Service Attack
得分4k
30
6
Machine Learning
Privacy
Deep Learning
Security
Model Stealing
得分4k
31
7
Programming Language
Security Policy
Software Security
Access Control
Control-flow Integrity
得分4k
32
39
Memorization
Differential Privacy
Adversarial Example
Genomic Privacy
Adversarial Examples
得分4k
33
8
Privacy
Data Privacy
Cryptography
Computer Security
Data Mining
得分4k
34
2
Trusted Computing
Computer Science
Computer Security
Security
Cryptography
得分4k
35
14
Security
Internet
Privacy
Denial Of Service
Electronic Commerce
得分4k
36
22
Computer Science
Programming Language
Computer Security
Software Engineering
Separation Logic
得分4k
37
2
Bitcoin
Ethereum
Protocols
Cryptocurrency
Consensus Computer
得分4k
38
36
Block Cipher
Static Analysis
Privacy
Cryptography
Computer Security
得分4k
39
Number Field Sieve
Proof-carrying Data
Computationally-sound Proofs
Cryptography
Side Channel Attacks
得分4k
40
2
Security
Reliability
LLVM
Operating Systems
Rowhammer
得分4k
41
2
Privacy
Machine Learning
Security
Deep Learning
Convolutional Neural Networks
得分4k
42
19
Security
Security Policy
Internet
Android
Operating System
得分3k
43
27
Intrusion Detection
Static Analysis
Web Application
Malware
Internet
得分3k
44
Succinct Arguments
Zero Knowledge
Interactive Oracle Proofs
Proof-carrying Data
Probabilistically Checkable Proofs
得分3k
45
Anomaly Detection
Device-free Passive Localization
Robust Device-free Localization
Wireless Communication
Typical Environment
得分3k
46
Secure Compilation
Computer Science
Dynamic Compromise
Software Fault Isolation
Undefined Behavior
得分3k
47
5
Trusted Computing
Meltdown
Intel Sgx
Protected Module Architectures
Protected Module Architecture
得分3k
48
7
Public Key
Cryptography
Computer Science
Random Oracle
Bilinear Map
得分3k
49
5
Malware
Dns Traffic
Domain Name
Servers
Computer Security
得分3k
50
1
Computer Science
Computer Security
Privacy
Hacker
Anticipation Game
得分3k
51
27
Privacy
Malicious Software
Internet
Security
Authentication
得分3k
52
2
RSA
Side-channel Attacks
Side-channel Attack
Cache Attacks
Side Channel
得分3k
53
4
Signal Processing
Parameter Estimation
Wireless Sensor Networks
Gaussian Noise
Signal To Noise Ratio
得分3k
54
4
Machine Learning
Computer Science
Security
Taint Tracking
Parameterized Complexity
得分3k
55
3
Blockchain
Trusted Hardware
Oilseed Rape
Smart Contracts
Partial Least Squares Analysis
得分3k
56
42
Privacy
Computer Science
Protocols
Trustworthy In-person Certification
Content Moderation
得分3k
57
Oblivious Ram
Semantic Data
Resource Description Framework
Rdf Data
Scalable Reasoning
得分3k
58
Lower Bound
Testable Code
Property Testing
Computational Complexity
Proof Complexity
得分3k
59
Zero Knowledge
Computationally-sound Proofs
Proof-carrying Data
Succinct Arguments
Quantum Strategy
得分3k
60
1
Verifiable Computation
Zero Knowledge Proofs
Security And Protection
Multiple Server System
Diversity Routing
得分3k
61
8
Ransomware
Malware
Autonomous Underwater Vehicle
Search Engine
Trajectory Design
得分3k
62
14
Bolted Connection
Curling
Finite Element Analysis
Ultimate Strength
Strength Reduction
得分3k
63
3
Privacy
DNS
Domain Name System
Security
Malware
得分3k
65
7
Android
Usability
Cryptography
Security
Usable Security
得分2k
66
12
Computer Science
Side Channel Attack
Side-channel Attack
Spectre
Meltdown
得分2k
67
75
Rowhammer
Cloud Computing
Rowhammer Attacks
Dram Chip
Hardware
得分2k
68
Blockchain Model
Big Data
Privacy-preserving Smart Contracts
Contractual Breach
Decentralized Smart Contract System
得分2k
69
18
Side Channel
Side-channel Attack
Intel Sgx
Human Computation
Constraint-based Recommendation
得分2k
70
5
Nuclear Medicine
Positron Emission Tomography
Wall Motion
Wall Thickening
Neural Network
得分2k
71
16
Computer Vision
Social Network
Face Recognition
Wearable Computer
Real Time
得分2k
72
30
Federated Learning
Probabilistic Model
Secure Aggregation
Composable Probabilistic Inference
Bidirectional Multimodal Structural Alignment
得分2k
73
16
Blockchain
Computer Science
Behavioral Modeling
Mobile Network Analysis
Campaign Optimization
得分2k
74
16
Personal Data
Privacy
Bitcoin
Blockchain
Decentralized Computation Platform
得分2k
75
Concurrency
Abstract Interpretation
Verification
Smart Contracts
Memory Model
得分2k
76
22
Cryptography
Wireless Network
Cloud Storage
Message Authentication
Block Cipher
得分2k
77
32
Security
Computer Science
Fuzzing
Computer Security
Cyber-physical System
得分2k
78
81
Memorization
Poisoning Attacks
Adversarial Machine Learning
TLS
Secure Channel
得分2k
79
1
Communication Complexity
Secure Computation
Secure Two-party Computation
Network Security
Efficient Protocol
得分2k
80
8
Computer Science
Smart Contracts
Robustness
Access Control
Symbolic Execution
得分2k
81
82
Traffic Analysis
Privacy
Deep Learning
Flow Correlation
Differential Privacy
得分2k
82
20
Social Network
Authentication
Privacy
Social Networks
Computer Security
得分2k
83
13
Operating System
Cryptography
Anonymity
Computer Science
Cloud Computing
得分2k
84
27
Federated Learning
Machine Learning
Computer Science
Web Pages
Topic Model
得分2k
85
39
Cryptographic Protocol
Cryptography
Computer Science
Web Service
Security Protocol
得分2k
86
11
Natural Language
Natural Language Approach
English Shellcode
Natural Language Processing
Security
得分2k
87
19
Access Control
Security
Security Policy
Privacy
Usability
得分2k
88
15
Particle Physics
Standard Model
Cross Section
Higgs Boson
Centre Of Mass
得分2k
89
77
Privacy
Cryptography
Homomorphic Encryption
Secret Sharing
Cryptographic Extension
得分2k
90
10
Adversarial Machine Learning
Machine Learning
Evasion Attacks
Security
Malware Detection
得分2k
91
5
Secure Computation
Oblivious Ram
Domain Adaptation
Oblivious Algorithms
Security
得分2k
92
25
Secure Aggregation
Federated Learning
Secure Arithmetic Two-party Computation
Oblivious Linear Evaluation (ole)
Machine Learning
得分2k
93
36
Cryptography
Encryption
One-way Function
Resettable Security
Non-black-box Simulation
得分2k
94
5
Computer Security
Static Analysis
Vulnerability
Phishing
Firmware
得分2k
95
34
Plancherel Measure
Central Limit Theorem
Federated Learning
Secure Aggregation
Electronic Health Records
得分2k
96
34
Secure Aggregation
Federated Learning
Scalable Two-party Secure Computation
Portable Circuit Format
Secure Computation Environment
得分2k
97
22
Secure Aggregation
Federated Learning
Privacy-preserving Protocols
Machine Learning
Practical Secure Aggregation
得分2k
98
16
Computer Security
Computer Science
Blockchain
Scalability
Ledger Pruning
得分2k
99
16
Scalability
Computer Science
Computer Security
Blockchain
Ledger Pruning
得分2k
100
16
Computer Science
Side-channel Analysis
Power Analysis
Side-channel Attack
Masking
得分2k