Roya Ensafi

1.2k total citations
38 papers, 692 citations indexed

About

Roya Ensafi is a scholar working on Artificial Intelligence, Computer Networks and Communications and Information Systems. According to data from OpenAlex, Roya Ensafi has authored 38 papers receiving a total of 692 indexed citations (citations by other indexed papers that have themselves been cited), including 28 papers in Artificial Intelligence, 26 papers in Computer Networks and Communications and 10 papers in Information Systems. Recurrent topics in Roya Ensafi's work include Internet Traffic Analysis and Secure E-voting (26 papers), Network Security and Intrusion Detection (20 papers) and Advanced Malware Detection Techniques (9 papers). Roya Ensafi is often cited by papers focused on Internet Traffic Analysis and Secure E-voting (26 papers), Network Security and Intrusion Detection (20 papers) and Advanced Malware Detection Techniques (9 papers). Roya Ensafi collaborates with scholars based in United States, Iran and Canada. Roya Ensafi's co-authors include Nick Feamster, Philipp Winter, Jedidiah R. Crandall, Vern Paxson, Nicholas Weaver, Abdullah Mueen, Paul Pearce, Frank Li, David A. Fifield and Han Zhang and has published in prestigious journals such as SHILAP Revista de lepidopterología, Communications of the ACM and IEEE Security & Privacy.

In The Last Decade

Roya Ensafi

33 papers receiving 655 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Roya Ensafi United States 15 472 464 168 151 82 38 692
Roland van Rijswijk-Deij Netherlands 15 476 1.0× 554 1.2× 202 1.2× 130 0.9× 38 0.5× 59 716
Mattijs Jonker Netherlands 11 280 0.6× 355 0.8× 129 0.8× 110 0.7× 26 0.3× 48 450
Jedidiah R. Crandall United States 16 691 1.5× 638 1.4× 279 1.7× 530 3.5× 93 1.1× 58 1.1k
Robert Beverly United States 16 467 1.0× 643 1.4× 196 1.2× 132 0.9× 23 0.3× 47 795
Norbert Pohlmann Germany 9 261 0.6× 372 0.8× 233 1.4× 299 2.0× 46 0.6× 46 529
Neha Narula United States 9 523 1.1× 261 0.6× 335 2.0× 318 2.1× 43 0.5× 15 709
Roxana Geambasu United States 14 324 0.7× 351 0.8× 362 2.2× 130 0.9× 107 1.3× 28 645
Ingmar Poese Germany 12 184 0.4× 545 1.2× 109 0.6× 33 0.2× 54 0.7× 20 702
Ghita Mezzour United States 11 133 0.3× 425 0.9× 184 1.1× 96 0.6× 33 0.4× 31 620
Jaap-Henk Hoepman Netherlands 12 234 0.5× 118 0.3× 213 1.3× 66 0.4× 163 2.0× 55 527

Countries citing papers authored by Roya Ensafi

Since Specialization
Citations

This map shows the geographic impact of Roya Ensafi's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Roya Ensafi with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Roya Ensafi more than expected).

Fields of papers citing papers by Roya Ensafi

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Roya Ensafi. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Roya Ensafi. The network helps show where Roya Ensafi may publish in the future.

Co-authorship network of co-authors of Roya Ensafi

This figure shows the co-authorship network connecting the top 25 collaborators of Roya Ensafi. A scholar is included among the top collaborators of Roya Ensafi based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Roya Ensafi. Roya Ensafi is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
2.
Sharma, Piyush, et al.. (2025). CenPush: Blocking-Resistant Control Channel Using Push Notifications. Proceedings on Privacy Enhancing Technologies. 2025(4). 712–727.
3.
Knockel, Jeffrey, et al.. (2024). Attacking Connection Tracking Frameworks as used by Virtual Private Networks. Proceedings on Privacy Enhancing Technologies. 2024(3). 109–126. 1 indexed citations
4.
Prakash, Atul, et al.. (2024). Modeling and Detecting Internet Censorship Events.
5.
Kumar, Deepak, et al.. (2023). CERTainty: Detecting DNS Manipulation at Scale using TLS Certificates. Proceedings on Privacy Enhancing Technologies. 2023(3). 122–137. 3 indexed citations
6.
Wustrow, Eric, et al.. (2021). Throttling Twitter. 435–443. 10 indexed citations
7.
Halderman, J. Alex, et al.. (2020). Investigating Large Scale HTTPS Interception in Kazakhstan. 125–132. 27 indexed citations
8.
Kohls, Katharina, et al.. (2020). Censored Planet: An Internet-wide, Longitudinal Censorship Observatory. 49–66. 39 indexed citations
9.
Wang, Zhongjie, et al.. (2020). Characterizing Transnational Internet Performance and the Great Bottleneck of China. 69–70. 3 indexed citations
10.
Bernhard, Matthew, et al.. (2020). Decentralized Control: A Case Study of Russia. 30 indexed citations
11.
Wang, Zhongjie, et al.. (2020). Characterizing Transnational Internet Performance and the Great Bottleneck of China. ACM SIGMETRICS Performance Evaluation Review. 48(1). 69–70.
12.
VanderSloot, Benjamin, et al.. (2018). Quack: Scalable Remote Measurement of Application-Layer Censorship. USENIX Security Symposium. 187–202. 21 indexed citations
13.
Pearce, Paul, Roya Ensafi, Frank Li, Nick Feamster, & Vern Paxson. (2018). Toward Continual Measurement of Global Network-Level Censorship. IEEE Security & Privacy. 16(1). 24–33. 6 indexed citations
14.
Pearce, Paul, Roya Ensafi, Frank Li, Nick Feamster, & Vern Paxson. (2017). Augur: Internet-Wide Detection of Connectivity Disruptions. 427–443. 40 indexed citations
15.
Pearce, Paul, Ben Jones, Frank Li, et al.. (2017). Global Measurement of {DNS} Manipulation. USENIX Security Symposium. 307–323. 46 indexed citations
16.
Winter, Philipp, et al.. (2016). Identifying and Characterizing Sybils in the Tor Network. KTH Publication Database DiVA (KTH Royal Institute of Technology). 1169–1185. 19 indexed citations
17.
Ensafi, Roya, David A. Fifield, Philipp Winter, et al.. (2015). Examining How the Great Firewall Discovers Hidden Circumvention Servers. 445–458. 66 indexed citations
18.
Ensafi, Roya, Jong-Chun Park, Deepak Kapur, & Jedidiah R. Crandall. (2010). Idle port scanning and non-interference analysis of network protocol stacks using model checking. USENIX Security Symposium. 17–17. 35 indexed citations
19.
Ensafi, Roya, et al.. (2007). A Fuzzy-Based Multi-criteria Scheduler for Uniform Multiprocessor Real-Time Systems. 179–184. 9 indexed citations
20.

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026