Adam Doupé

2.9k total citations · 1 hit paper
79 papers, 1.7k citations indexed

About

Adam Doupé is a scholar working on Information Systems, Signal Processing and Artificial Intelligence. According to data from OpenAlex, Adam Doupé has authored 79 papers receiving a total of 1.7k indexed citations (citations by other indexed papers that have themselves been cited), including 58 papers in Information Systems, 38 papers in Signal Processing and 35 papers in Artificial Intelligence. Recurrent topics in Adam Doupé's work include Advanced Malware Detection Techniques (38 papers), Spam and Phishing Detection (23 papers) and Network Security and Intrusion Detection (21 papers). Adam Doupé is often cited by papers focused on Advanced Malware Detection Techniques (38 papers), Spam and Phishing Detection (23 papers) and Network Security and Intrusion Detection (21 papers). Adam Doupé collaborates with scholars based in United States, South Korea and France. Adam Doupé's co-authors include Gail‐Joon Ahn, Ziming Zhao, Giovanni Vigna, Christopher Kruegel, Yan Shoshitaishvili, Adam Oest, Brad Wardman, Tiffany Bao, BooJoong Kang and Niall McLaughlin and has published in prestigious journals such as Journal of the Association for Information Systems, IEEE Transactions on Dependable and Secure Computing and Genetics Selection Evolution.

In The Last Decade

Adam Doupé

72 papers receiving 1.6k citations

Hit Papers

Deep Android Malware Detection 2017 2026 2020 2023 2017 100 200 300

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Adam Doupé United States 22 1.1k 984 771 613 261 79 1.7k
Luca Invernizzi United States 13 874 0.8× 1.0k 1.0× 951 1.2× 796 1.3× 83 0.3× 18 1.7k
Adam Bates United States 25 877 0.8× 933 0.9× 1.1k 1.4× 744 1.2× 73 0.3× 64 1.9k
Leyla Bilge United States 18 1.2k 1.2× 1.2k 1.2× 1.4k 1.9× 1.2k 1.9× 109 0.4× 30 2.2k
Marco Cova United States 15 1.2k 1.1× 1.1k 1.1× 875 1.1× 817 1.3× 145 0.6× 23 1.7k
Christian Rossow Germany 25 1.1k 1.0× 1.5k 1.5× 1.7k 2.2× 1.4k 2.2× 264 1.0× 60 2.5k
Michael E. Locasto United States 19 476 0.4× 554 0.6× 659 0.9× 629 1.0× 127 0.5× 84 1.2k
Yanick Fratantonio United States 20 1.0k 1.0× 1.7k 1.7× 785 1.0× 807 1.3× 622 2.4× 37 2.0k
Tudor Dumitraş United States 21 877 0.8× 680 0.7× 1.1k 1.4× 441 0.7× 139 0.5× 60 1.7k
Zhenkai Liang Singapore 27 1.1k 1.0× 1.7k 1.7× 1.1k 1.4× 1.6k 2.6× 498 1.9× 86 2.5k
Yinzhi Cao United States 17 584 0.6× 598 0.6× 313 0.4× 680 1.1× 214 0.8× 56 1.2k

Countries citing papers authored by Adam Doupé

Since Specialization
Citations

This map shows the geographic impact of Adam Doupé's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Adam Doupé with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Adam Doupé more than expected).

Fields of papers citing papers by Adam Doupé

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Adam Doupé. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Adam Doupé. The network helps show where Adam Doupé may publish in the future.

Co-authorship network of co-authors of Adam Doupé

This figure shows the co-authorship network connecting the top 25 collaborators of Adam Doupé. A scholar is included among the top collaborators of Adam Doupé based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Adam Doupé. Adam Doupé is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Karimi, Alireza, Adam Oest, Gail‐Joon Ahn, et al.. (2025). SCAMMAGNIFIER: Piercing the Veil of Fraudulent Shopping Website Campaigns.
2.
Crandall, Jedidiah R., et al.. (2025). Revisiting SDN Resilience in Cloud and Enterprise Environments. 28–49.
3.
Doupé, Adam, et al.. (2025). SENSAI: Large Language Models as Applied Cybersecurity Tutors. 833–839. 3 indexed citations
6.
Sun, Zhibo, Adam Oest, Gianluca Stringhini, et al.. (2024). From Victims to Defenders: An Exploration of the Phishing Attack Reporting Ecosystem. 49–64.
7.
Gibbs, W. R., Zhenghao Hu, Brendan Dolan-Gavitt, et al.. (2024). Fuzz to the Future: Uncovering Occluded Future Vulnerabilities via Robust Fuzzing. 3719–3733.
8.
Pal, Kuntal Kumar, Pratyay Banerjee, Himanshu Gupta, et al.. (2024). "Len or index or count, anything but v1": Predicting Variable Names in Decompilation Output with Transfer Learning. 4069–4087. 5 indexed citations
9.
Oest, Adam, Zhibo Sun, Gail‐Joon Ahn, et al.. (2024). Nothing Personal: Understanding the Spread and Use of Personally Identifiable Information in the Financial Ecosystem. 55–65. 1 indexed citations
10.
11.
Weimer, Westley, et al.. (2024). Automatically Mitigating Vulnerabilities in Binary Programs via Partially Recompilable Decompilation. IEEE Transactions on Dependable and Secure Computing. 22(3). 2270–2282.
12.
Lu, Kangjie, et al.. (2023). RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections. 3093–3107. 1 indexed citations
13.
Oest, Adam, et al.. (2020). PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists. USENIX Security Symposium. 379–396. 24 indexed citations
14.
Cho, Haehyun, et al.. (2018). Prime+Count. 441–452. 29 indexed citations
15.
Sengupta, Sailik, Satya Gautam Vadlamudi, Subbarao Kambhampati, et al.. (2017). A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications. Adaptive Agents and Multi-Agents Systems. 178–186. 19 indexed citations
16.
Vadlamudi, Satya Gautam, Sailik Sengupta, Ziming Zhao, et al.. (2016). Moving Target Defense for Web Applications using Bayesian Stackelberg Games: (Extended Abstract). 1377–1378. 12 indexed citations
17.
Vadlamudi, Satya Gautam, Sailik Sengupta, Ziming Zhao, et al.. (2016). Moving Target Defense for Web Applications using Bayesian Stackelberg Games: (Extended Abstract). Adaptive Agents and Multi-Agents Systems. 1377–1378. 4 indexed citations
18.
Sun, Zhibo, et al.. (2016). Towards Automated Threat Intelligence Fusion. 408–416. 19 indexed citations
19.
Vigna, Giovanni, Kevin Borgolte, Adam Doupé, et al.. (2014). Ten Years of iCTF: The Good, The Bad, and The Ugly. Genetics Selection Evolution. 34 indexed citations
20.
Doupé, Adam, et al.. (2012). Enemy of the state: a state-aware black-box web vulnerability scanner. USENIX Security Symposium. 26–26. 76 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026