Albert B. Jeng

488 total citations
29 papers, 222 citations indexed

About

Albert B. Jeng is a scholar working on Information Systems, Signal Processing and Computer Networks and Communications. According to data from OpenAlex, Albert B. Jeng has authored 29 papers receiving a total of 222 indexed citations (citations by other indexed papers that have themselves been cited), including 21 papers in Information Systems, 18 papers in Signal Processing and 15 papers in Computer Networks and Communications. Recurrent topics in Albert B. Jeng's work include Advanced Malware Detection Techniques (17 papers), Network Security and Intrusion Detection (10 papers) and Spam and Phishing Detection (9 papers). Albert B. Jeng is often cited by papers focused on Advanced Malware Detection Techniques (17 papers), Network Security and Intrusion Detection (10 papers) and Spam and Phishing Detection (9 papers). Albert B. Jeng collaborates with scholars based in Taiwan, Jordan and United States. Albert B. Jeng's co-authors include Te-En Wei, Hahn-Ming Lee, Ching-Hao Mao, Yen‐Lin Chen, Ismail Al-Taharwa, Shyi‐Ming Chen, Marshall D. Abrams, Chin‐Wei Tien, Kuo-Ping Wu and Robert H. Deng and has published in prestigious journals such as Applied Mathematics and Computation, IEEE Network and Soft Computing.

In The Last Decade

Albert B. Jeng

29 papers receiving 209 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Albert B. Jeng Taiwan 10 161 154 117 56 36 29 222
Adwait Nadkarni United States 11 225 1.4× 167 1.1× 103 0.9× 145 2.6× 66 1.8× 19 300
Yuval Fledel Israel 6 421 2.6× 293 1.9× 283 2.4× 153 2.7× 106 2.9× 9 492
Thomas Given-Wilson France 9 75 0.5× 54 0.4× 105 0.9× 96 1.7× 19 0.5× 25 203
Felix Günther Germany 8 71 0.4× 134 0.9× 151 1.3× 167 3.0× 19 0.5× 15 255
Nilo Redini United States 9 200 1.2× 104 0.7× 96 0.8× 116 2.1× 82 2.3× 13 256
Sebastian Gerling Germany 7 170 1.1× 100 0.6× 55 0.5× 140 2.5× 36 1.0× 9 236
Limin Yang United States 10 221 1.4× 162 1.1× 181 1.5× 132 2.4× 44 1.2× 13 322
Ari Takanen Finland 5 104 0.6× 88 0.6× 63 0.5× 53 0.9× 132 3.7× 7 230
Jiřı Šimša United States 9 46 0.3× 94 0.6× 141 1.2× 57 1.0× 33 0.9× 16 267
Bazara I. A. Barry Sudan 7 130 0.8× 101 0.7× 134 1.1× 81 1.4× 12 0.3× 23 220

Countries citing papers authored by Albert B. Jeng

Since Specialization
Citations

This map shows the geographic impact of Albert B. Jeng's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Albert B. Jeng with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Albert B. Jeng more than expected).

Fields of papers citing papers by Albert B. Jeng

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Albert B. Jeng. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Albert B. Jeng. The network helps show where Albert B. Jeng may publish in the future.

Co-authorship network of co-authors of Albert B. Jeng

This figure shows the co-authorship network connecting the top 25 collaborators of Albert B. Jeng. A scholar is included among the top collaborators of Albert B. Jeng based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Albert B. Jeng. Albert B. Jeng is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Wei, Te-En, Hahn-Ming Lee, Albert B. Jeng, Hemank Lamba, & Christos Faloutsos. (2019). WebHound: a data-driven intrusion detection from real-world web access logs. Soft Computing. 23(22). 11947–11965. 4 indexed citations
2.
Chen, Yen‐Lin, Hahn-Ming Lee, Albert B. Jeng, & Te-En Wei. (2015). DroidCIA: A Novel Detection Method of Code Injection Attacks on HTML5-Based Mobile Apps. 1. 1014–1021. 10 indexed citations
3.
Al-Taharwa, Ismail, et al.. (2015). Drive-by Disclosure: A Large-Scale Detector of Drive-by Downloads Based on Latent Behavior Prediction. 1. 334–343. 3 indexed citations
4.
Jeng, Albert B., et al.. (2015). Vulnerability Detection of Multiple Layer Colluding Application through Intent Privilege Checking. 11. 1–7. 1 indexed citations
6.
Chen, Yen‐Lin, Hahn-Ming Lee, Albert B. Jeng, & Te-En Wei. (2015). DroidCIA: A Novel Detection Method of Code Injection Attacks on HTML5-Based Mobile Apps. 2015 IEEE Trustcom/BigDataSE/ISPA. 15 indexed citations
7.
Al-Taharwa, Ismail, et al.. (2014). JSOD: JavaScript obfuscation detector. Security and Communication Networks. 8(6). 1092–1107. 22 indexed citations
9.
Wei, Te-En, et al.. (2012). Android privacy. 13 indexed citations
11.
Wei, Te-En, et al.. (2012). Android privacy. 1830–1837. 6 indexed citations
12.
Wei, Te-En, et al.. (2012). Android Malware Detection via a Latent Network Behavior Analysis. 30. 1251–1258. 40 indexed citations
13.
Al-Taharwa, Ismail, Hahn-Ming Lee, Albert B. Jeng, et al.. (2012). RedJsod: A Readable JavaScript Obfuscation Detector Using Semantic-based Analysis. 1370–1375. 4 indexed citations
14.
Wei, Te-En, et al.. (2011). RePEF — A system for Restoring Packed Executable File for malware analysis. 519–527. 2 indexed citations
15.
Al-Taharwa, Ismail, Albert B. Jeng, & Hahn-Ming Lee. (2011). Cloud-Based Anti-Malware Solution. 1 indexed citations
16.
Jeng, Albert B., et al.. (2011). How to solve collision and authentication issues using RFID protocol technology. 454–460. 1 indexed citations
17.
Jeng, Albert B., et al.. (2010). The Radio Frequency Identification tag with the function of anti-collision and anti-counterfeiting. 35. 2681–2686. 1 indexed citations
18.
Jeng, Albert B., et al.. (2009). Survey and remedy of the technologies used for RFID tags against counterfeiting. 2975–2981. 7 indexed citations
19.
Jeng, Albert B., et al.. (2008). A Low Cost Key Agreement Protocol Based on Binary Tree for EPCglobal Class 1 Generation 2 RFID Protocol. IEICE Transactions on Information and Systems. E91-D(5). 1408–1415. 1 indexed citations
20.
Deng, Robert H., et al.. (1997). A new on-line cash check scheme. 111–116. 10 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026