Collin Jackson

3.2k total citations
37 papers, 2.0k citations indexed

About

Collin Jackson is a scholar working on Information Systems, Artificial Intelligence and Signal Processing. According to data from OpenAlex, Collin Jackson has authored 37 papers receiving a total of 2.0k indexed citations (citations by other indexed papers that have themselves been cited), including 30 papers in Information Systems, 22 papers in Artificial Intelligence and 13 papers in Signal Processing. Recurrent topics in Collin Jackson's work include Spam and Phishing Detection (21 papers), Web Application Security Vulnerabilities (18 papers) and Security and Verification in Computing (13 papers). Collin Jackson is often cited by papers focused on Spam and Phishing Detection (21 papers), Web Application Security Vulnerabilities (18 papers) and Security and Verification in Computing (13 papers). Collin Jackson collaborates with scholars based in United States, United Kingdom and Israel. Collin Jackson's co-authors include Adam Barth, John C. Mitchell, Dan Boneh, Helen J. Wang, B. B. Ross, Andrew Bortz, Elie Bursztein, Jon Howell, Eric Chen and Gaurav Aggarwal and has published in prestigious journals such as Nature Communications, Communications of the ACM and IEEE Internet Computing.

In The Last Decade

Collin Jackson

36 papers receiving 1.8k citations

Author Peers

Peers are selected by citation overlap in the author's most active subfields. citations · hero ref

Author Last Decade Papers Cites
Collin Jackson 1.6k 1.2k 1.1k 521 238 37 2.0k
Nick Nikiforakis 1.4k 0.9× 1.2k 1.0× 1.1k 1.0× 507 1.0× 396 1.7× 72 2.0k
Luca Invernizzi 874 0.6× 796 0.7× 1.0k 1.0× 951 1.8× 139 0.6× 18 1.7k
Marco Cova 1.2k 0.7× 817 0.7× 1.1k 1.0× 875 1.7× 75 0.3× 23 1.7k
Alexander Moshchuk 838 0.5× 677 0.6× 952 0.9× 539 1.0× 96 0.4× 22 1.3k
Sven Bugiel 1.1k 0.7× 736 0.6× 1.4k 1.3× 513 1.0× 161 0.7× 47 1.7k
Michael Backes 684 0.4× 483 0.4× 493 0.5× 243 0.5× 201 0.8× 54 1.1k
Adam Doupé 1.1k 0.7× 613 0.5× 984 0.9× 771 1.5× 141 0.6× 79 1.7k
Stuart G. Stubblebine 665 0.4× 735 0.6× 201 0.2× 546 1.0× 296 1.2× 38 1.2k
Joshua Mason 505 0.3× 686 0.6× 690 0.6× 883 1.7× 88 0.4× 24 1.3k
Nayeem Islam 404 0.3× 538 0.5× 427 0.4× 634 1.2× 80 0.3× 31 1.1k

Countries citing papers authored by Collin Jackson

Since Specialization
Citations

This map shows the geographic impact of Collin Jackson's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Collin Jackson with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Collin Jackson more than expected).

Fields of papers citing papers by Collin Jackson

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Collin Jackson. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Collin Jackson. The network helps show where Collin Jackson may publish in the future.

Co-authorship network of co-authors of Collin Jackson

This figure shows the co-authorship network connecting the top 25 collaborators of Collin Jackson. A scholar is included among the top collaborators of Collin Jackson based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Collin Jackson. Collin Jackson is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Gibson, Sally, Collin Jackson, James Crosby, & Jason Day. (2025). The role of C-O-H-F-Cl fluids in the making of Earth’s continental roots. Nature Communications. 16(1). 7842–7842.
2.
Silver, David, Suman Jana, Dan Boneh, Eric Chen, & Collin Jackson. (2014). Password managers: attacks and defenses. USENIX Security Symposium. 449–464. 55 indexed citations
3.
Jackson, Collin, et al.. (2014). Analyzing Forged SSL Certificates in the Wild. 83–97. 107 indexed citations
4.
Jackson, Collin, et al.. (2013). Cross-origin pixel stealing. 1055–1062. 30 indexed citations
5.
Kim, Tiffany Hyun‐Jin, et al.. (2013). Accountable key infrastructure (AKI). 679–690. 68 indexed citations
6.
Wang, Helen J., et al.. (2012). Clickjacking: attacks and defenses. USENIX Security Symposium. 22–22. 75 indexed citations
7.
Stark, Emily, et al.. (2012). The Case for Prefetching and Prevalidating TLS Server Certificates.. Network and Distributed System Security Symposium. 25 indexed citations
8.
Jackson, Collin. (2011). Crossing the Chasm: Pitching Security Research to Mainstream Browser Vendors. USENIX Security Symposium. 1 indexed citations
9.
Singh, Kapil, Helen J. Wang, Alexander Moshchuk, Collin Jackson, & Wenke Lee. (2011). HTTPi for Practical End-to-End Web Content Integrity. 46 Suppl 1. 1–2. 1 indexed citations
11.
Aggarwal, Gaurav, Elie Bursztein, Collin Jackson, & Dan Boneh. (2010). An analysis of private browsing modes in modern browsers. USENIX Security Symposium. 6–6. 110 indexed citations
12.
Barth, Adam, Collin Jackson, & John C. Mitchell. (2009). Securing frame communication in browsers. Communications of the ACM. 52(6). 83–91. 58 indexed citations
13.
Barth, Adam, Collin Jackson, & John C. Mitchell. (2008). Securing frame communication in browsers. USENIX Security Symposium. 17–30. 49 indexed citations
14.
Barth, Adam, Collin Jackson, & John C. Mitchell. (2008). Robust defenses for cross-site request forgery. 75–88. 240 indexed citations
15.
Jackson, Collin, Dan Boneh, & John C. Mitchell. (2007). Transaction generators: root kits for web. 1. 12 indexed citations
16.
Howell, Jon, et al.. (2007). MashupOS: operating system abstractions for client mashups. 16. 43 indexed citations
17.
Wang, Helen J., et al.. (2007). Protection and communication abstractions for web browsers in MashupOS. 1–16. 88 indexed citations
18.
Jackson, Collin, Andrew Bortz, Dan Boneh, & John C. Mitchell. (2006). Protecting browser state from web privacy attacks. 737–744. 118 indexed citations
19.
Jackson, Collin, et al.. (2005). A Browser Plug-in Solution to the Unique Password Problem. CTIT technical reports series. 19 indexed citations
20.
Ross, B. B., et al.. (2005). Stronger password authentication using browser extensions. USENIX Security Symposium. 2–2. 250 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026