Ali Kanso

2.3k total citations
77 papers, 1.7k citations indexed

About

Ali Kanso is a scholar working on Computer Vision and Pattern Recognition, Information Systems and Computer Networks and Communications. According to data from OpenAlex, Ali Kanso has authored 77 papers receiving a total of 1.7k indexed citations (citations by other indexed papers that have themselves been cited), including 38 papers in Computer Vision and Pattern Recognition, 31 papers in Information Systems and 27 papers in Computer Networks and Communications. Recurrent topics in Ali Kanso's work include Chaos-based Image/Signal Encryption (35 papers), Cloud Computing and Resource Management (21 papers) and Advanced Steganography and Watermarking Techniques (15 papers). Ali Kanso is often cited by papers focused on Chaos-based Image/Signal Encryption (35 papers), Cloud Computing and Resource Management (21 papers) and Advanced Steganography and Watermarking Techniques (15 papers). Ali Kanso collaborates with scholars based in Kuwait, Canada and Sweden. Ali Kanso's co-authors include M. Ghebleh, Nejib Smaoui, Abdallah Shami, Manar Jammal, Wubin Li, Hassan Noura, Mohammed Almulla, Hamdi Yahyaoui, Dragan Stevanović and Abdelouahed Gherbi and has published in prestigious journals such as SHILAP Revista de lepidopterología, Information Sciences and SAE technical papers on CD-ROM/SAE technical paper series.

In The Last Decade

Ali Kanso

72 papers receiving 1.6k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Ali Kanso Kuwait 23 1.2k 459 373 336 259 77 1.7k
Je Sen Teh Malaysia 22 1.3k 1.1× 443 1.0× 133 0.4× 141 0.4× 329 1.3× 50 1.6k
Hejiao Huang China 16 1.5k 1.2× 488 1.1× 129 0.3× 157 0.5× 483 1.9× 51 2.0k
Ünal Çavuşoğlu Türkiye 23 927 0.8× 714 1.6× 582 1.6× 120 0.4× 196 0.8× 53 1.8k
Xiaoqiang Di China 19 480 0.4× 296 0.6× 411 1.1× 223 0.7× 80 0.3× 103 1.1k
Tariq Shah Pakistan 29 1.9k 1.6× 1.4k 3.0× 98 0.3× 111 0.3× 386 1.5× 84 2.2k
Fawad Masood Pakistan 14 717 0.6× 369 0.8× 161 0.4× 51 0.2× 153 0.6× 17 982
Akram Belazi Tunisia 16 1.4k 1.2× 637 1.4× 67 0.2× 90 0.3× 371 1.4× 19 1.7k
Tariq Shah Pakistan 24 1.5k 1.2× 862 1.9× 36 0.1× 115 0.3× 269 1.0× 98 1.7k
Changgen Peng China 14 360 0.3× 506 1.1× 123 0.3× 230 0.7× 114 0.4× 87 887

Countries citing papers authored by Ali Kanso

Since Specialization
Citations

This map shows the geographic impact of Ali Kanso's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Ali Kanso with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Ali Kanso more than expected).

Fields of papers citing papers by Ali Kanso

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Ali Kanso. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Ali Kanso. The network helps show where Ali Kanso may publish in the future.

Co-authorship network of co-authors of Ali Kanso

This figure shows the co-authorship network connecting the top 25 collaborators of Ali Kanso. A scholar is included among the top collaborators of Ali Kanso based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Ali Kanso. Ali Kanso is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Kanso, Ali & M. Ghebleh. (2025). A refinement of the logistic map for cryptographic applications. Franklin Open. 12. 100333–100333. 1 indexed citations
2.
Ghebleh, M. & Ali Kanso. (2025). On the second-order Wiener ratios of iterated line graphs. Computational and Applied Mathematics. 44(3).
3.
Kanso, Ali, et al.. (2022). Human intention and workspace recognition for collaborative assembly. IFAC-PapersOnLine. 55(10). 365–370. 4 indexed citations
4.
Kanso, Ali & M. Ghebleh. (2022). A trapdoor one-way function for verifiable secret sharing. SHILAP Revista de lepidopterología. 2(2). 100060–100060. 2 indexed citations
5.
Kanso, Ali, et al.. (2022). A Probabilistic Chaotic Image Encryption Scheme. Mathematics. 10(11). 1910–1910. 10 indexed citations
6.
Kanso, Ali, et al.. (2020). Efficient Image Encryption Scheme Based on 4-Dimensional Chaotic Maps. Informatica. 1–28. 3 indexed citations
7.
Jammal, Manar, Hassan Hawilo, Ali Kanso, & Abdallah Shami. (2018). Generic input template for cloud simulators: A case study of CloudSim. Software Practice and Experience. 49(5). 720–747. 7 indexed citations
8.
Ghebleh, M. & Ali Kanso. (2017). A novel secret image sharing scheme using large primes. Multimedia Tools and Applications. 77(10). 11903–11923. 30 indexed citations
9.
Jammal, Manar, Ali Kanso, Parisa Heidari, & Abdallah Shami. (2017). Evaluating High Availability-aware Deployments Using Stochastic Petri Net Model and Cloud Scoring Selection Tool. IEEE Transactions on Services Computing. 1–1. 15 indexed citations
10.
Jammal, Manar, Ali Kanso, Parisa Heidari, & Abdallah Shami. (2016). Availability Analysis of Cloud Deployed Applications. 14 indexed citations
11.
Kanso, Ali, M. Ghebleh, & Hassan Noura. (2015). A variant of Baptista's encryption scheme. Security and Communication Networks. 8(18). 3701–3712. 3 indexed citations
12.
Shami, Abdallah, et al.. (2015). Simulating High Availability Scenarios in Cloud Data Centers: A Closer Look. 4. 617–622. 5 indexed citations
13.
Fonseca, Carlos M. da, M. Ghebleh, Ali Kanso, & Dragan Stevanović. (2014). Counterexamples to a Conjecture on Wiener Index of Common Neighborhood Graphs. 72. 22 indexed citations
14.
Kanso, Ali, et al.. (2014). Foundations for long-term collaborative research. 43–48. 6 indexed citations
15.
Kanso, Ali & Yves Lemieux. (2013). Achieving High Availability at the Application Level in the Cloud. 778–785. 15 indexed citations
16.
Kanso, Ali, et al.. (2011). Integrating Legacy Applications for High Availability: A Case Study. 3694. 83–90. 7 indexed citations
17.
Kanso, Ali. (2010). Cryptosystems based on continued fractions. Security and Communication Networks. 4(10). 1199–1211. 1 indexed citations
18.
Smaoui, Nejib & Ali Kanso. (2009). Cryptography with chaos and shadowing. Chaos Solitons & Fractals. 42(4). 2312–2321. 24 indexed citations
19.
Kanso, Ali. (2009). SEARCH-BASED CHAOTIC PSEUDORANDOM BIT GENERATOR. International Journal of Bifurcation and Chaos. 19(12). 4227–4235. 6 indexed citations
20.
Kanso, Ali. (2008). An efficient cryptosystem Delta for stream cipher applications. Computers & Electrical Engineering. 35(1). 126–140. 5 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026