Hit papers significantly outperform the citation benchmark for their cohort. A paper qualifies
if it has ≥500 total citations, achieves ≥1.5× the top-1% citation threshold for papers in the
same subfield and year (this is the minimum needed to enter the top 1%, not the average
within it), or reaches the top citation threshold in at least one of its specific research
topics.
CryptDB
2011687 citationsRaluca Ada Popa, Nickolai Zeldovich et al.DSpace@MIT (Massachusetts Institute of Technology)profile →
Machine Learning Classification over Encrypted Data
Citations per year, relative to Raluca Ada Popa Raluca Ada Popa (= 1×)
peers
Bryan Ford
Countries citing papers authored by Raluca Ada Popa
Since
Specialization
Citations
This map shows the geographic impact of Raluca Ada Popa's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Raluca Ada Popa with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Raluca Ada Popa more than expected).
This network shows the impact of papers produced by Raluca Ada Popa. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Raluca Ada Popa. The network helps show where Raluca Ada Popa may publish in the future.
Co-authorship network of co-authors of Raluca Ada Popa
This figure shows the co-authorship network connecting the top 25 collaborators of Raluca Ada Popa.
A scholar is included among the top collaborators of Raluca Ada Popa based on the total number of
citations received by their joint publications. Widths of edges
represent the number of papers authors have co-authored together.
Node borders
signify the number of papers an author published with Raluca Ada Popa. Raluca Ada Popa is excluded from
the visualization to improve readability, since they are connected to all nodes in the network.
Hu, Yuncong, Sam Kumar, & Raluca Ada Popa. (2020). Ghostor: Toward a Secure Data-Sharing System from Decentralized Trust. IACR Cryptology ePrint Archive. 2020. 648–877.6 indexed citations
6.
Mishra, Pratyush, et al.. (2020). Delphi: A Cryptographic Inference Service for Neural Networks. IACR Cryptology ePrint Archive. 2020. 2505–2522.47 indexed citations
7.
Andersen, Michael, Sam Kumar, Moustafa AbdelBaky, et al.. (2019). WAVE: A Decentralized Authorization Framework with Transitive Delegation.. OSTI OAI (U.S. Department of Energy Office of Scientific and Technical Information). 1375–1392.12 indexed citations
Zheng, Wenting, et al.. (2018). DIZK: A Distributed Zero Knowledge Proof System.. IACR Cryptology ePrint Archive. 2018. 675–692.6 indexed citations
10.
Poddar, Rishabh, Chang Lan, Raluca Ada Popa, & Sylvia Ratnasamy. (2018). SafeBricks: Shielding Network Functions in the Cloud. Networked Systems Design and Implementation. 201–216.41 indexed citations
11.
Zheng, Wenting, Ankur Dave, Jethro G. Beekman, et al.. (2017). Opaque: an oblivious and encrypted distributed analytics platform. Networked Systems Design and Implementation. 283–298.137 indexed citations
12.
Lan, Chang, Justine Sherry, Raluca Ada Popa, Sylvia Ratnasamy, & Zhi Liu. (2016). Embark: securely outsourcing middleboxes to the cloud. Networked Systems Design and Implementation. 255–273.63 indexed citations
13.
Popa, Raluca Ada, et al.. (2014). Building web applications on top of encrypted data using Mylar. IACR Cryptology ePrint Archive. 2016(4). 22–27.1 indexed citations
Curino, Carlo, Evan P. C. Jones, Raluca Ada Popa, et al.. (2011). Relational Cloud: a Database Service for the cloud.. Conference on Innovative Data Systems Research. 235–240.116 indexed citations
16.
Popa, Raluca Ada, Jacob R. Lorch, Dávid Molnár, Helen J. Wang, & Zhuang Li. (2011). Enabling security in cloud storage SLAs with CloudProof. USENIX Annual Technical Conference. 31–31.157 indexed citations
17.
Popa, Raluca Ada, Hari Balakrishnan, & Andrew J. Blumberg. (2009). VPriv: protecting privacy in location-based vehicular services. USENIX Security Symposium. 335–350.65 indexed citations
18.
Cowling, James, et al.. (2009). Census: location-aware membership management for large-scale distributed systems. DSpace@MIT (Massachusetts Institute of Technology). 12–12.23 indexed citations
19.
Aslam, Javed A., Raluca Ada Popa, & Ronald L. Rivest. (2008). On auditing elections when precincts have different sizes. 1.17 indexed citations
20.
Aslam, Javed A., Raluca Ada Popa, & Ronald L. Rivest. (2007). On estimating the size and confidence of a statistical audit. 8–8.45 indexed citations
Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive
bibliographic database. While OpenAlex provides broad and valuable coverage of the global
research landscape, it—like all bibliographic datasets—has inherent limitations. These include
incomplete records, variations in author disambiguation, differences in journal indexing, and
delays in data updates. As a result, some metrics and network relationships displayed in
Rankless may not fully capture the entirety of a scholar's output or impact.