Ayman Kayssi

3.8k total citations
223 papers, 2.5k citations indexed

About

Ayman Kayssi is a scholar working on Computer Networks and Communications, Electrical and Electronic Engineering and Artificial Intelligence. According to data from OpenAlex, Ayman Kayssi has authored 223 papers receiving a total of 2.5k indexed citations (citations by other indexed papers that have themselves been cited), including 132 papers in Computer Networks and Communications, 84 papers in Electrical and Electronic Engineering and 73 papers in Artificial Intelligence. Recurrent topics in Ayman Kayssi's work include Network Security and Intrusion Detection (47 papers), Internet Traffic Analysis and Secure E-voting (36 papers) and Low-power high-performance VLSI design (27 papers). Ayman Kayssi is often cited by papers focused on Network Security and Intrusion Detection (47 papers), Internet Traffic Analysis and Secure E-voting (36 papers) and Low-power high-performance VLSI design (27 papers). Ayman Kayssi collaborates with scholars based in Lebanon, United States and United Arab Emirates. Ayman Kayssi's co-authors include Ali Chehab, Imad H. Elhajj, Ola Salman, Wassim Itani, Karem A. Sakallah, Hassan Artail, Rouwaida Kanj, Ali Hussein, Kim Baraka and Cesar Ghali and has published in prestigious journals such as SHILAP Revista de lepidopterología, Sensors and IEEE Transactions on Smart Grid.

In The Last Decade

Ayman Kayssi

210 papers receiving 2.4k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Ayman Kayssi Lebanon 24 1.6k 846 728 722 395 223 2.5k
Georg Carle Germany 27 2.8k 1.7× 733 0.9× 948 1.3× 700 1.0× 407 1.0× 318 3.4k
Selvakumar Manickam Malaysia 32 1.8k 1.1× 1.1k 1.3× 1.0k 1.4× 719 1.0× 582 1.5× 205 2.9k
Qi Shi United Kingdom 21 2.0k 1.2× 1.4k 1.6× 577 0.8× 753 1.0× 767 1.9× 150 2.8k
Jong‐Hyouk Lee South Korea 30 2.2k 1.4× 812 1.0× 906 1.2× 1.5k 2.1× 372 0.9× 138 3.1k
Nai‐Wei Lo Taiwan 21 1.2k 0.7× 787 0.9× 557 0.8× 951 1.3× 205 0.5× 92 1.8k
Robin Doss Australia 25 1.4k 0.8× 712 0.8× 497 0.7× 775 1.1× 347 0.9× 188 2.2k
Prosanta Gope United Kingdom 26 1.3k 0.8× 770 0.9× 548 0.8× 1.3k 1.8× 321 0.8× 64 2.4k
Priyadarsi Nanda Australia 24 1.8k 1.1× 1.2k 1.4× 393 0.5× 723 1.0× 562 1.4× 106 2.4k
Ying‐Dar Lin Taiwan 27 3.0k 1.8× 800 0.9× 1.5k 2.0× 650 0.9× 462 1.2× 263 3.7k
Lisandro Zambenedetti Granville Brazil 27 2.6k 1.6× 684 0.8× 657 0.9× 1.1k 1.5× 261 0.7× 249 3.0k

Countries citing papers authored by Ayman Kayssi

Since Specialization
Citations

This map shows the geographic impact of Ayman Kayssi's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Ayman Kayssi with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Ayman Kayssi more than expected).

Fields of papers citing papers by Ayman Kayssi

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Ayman Kayssi. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Ayman Kayssi. The network helps show where Ayman Kayssi may publish in the future.

Co-authorship network of co-authors of Ayman Kayssi

This figure shows the co-authorship network connecting the top 25 collaborators of Ayman Kayssi. A scholar is included among the top collaborators of Ayman Kayssi based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Ayman Kayssi. Ayman Kayssi is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Kayssi, Ayman, et al.. (2025). Privacy-Aware 3D Reconstruction and Obfuscation in the Metaverse. 16–22. 1 indexed citations
2.
Kayssi, Ayman, et al.. (2024). Adaptive Mobile Diminished Reality Framework for 3D Visual Privacy. 1–8. 2 indexed citations
3.
Kayssi, Ayman, et al.. (2024). AI-Enhanced Mobile Diminished Reality for Preserving 3D Visual Privacy. 141–148. 1 indexed citations
4.
Elhajj, Imad H., et al.. (2023). Phishing and Smishing Detection Using Machine Learning. 206–211.
5.
Elhajj, Imad H., et al.. (2023). Feature Relevance in NAT Detection Using Explainable AI. 2021. 1181–1184. 1 indexed citations
6.
Elhajj, Imad H., et al.. (2023). A Generalizable Machine Learning Model for NAT Detection. 44–49.
7.
Salman, Ola, et al.. (2016). Identity-based authentication scheme for the Internet of Things. 1109–1111. 78 indexed citations
8.
Elhajj, Imad H., et al.. (2015). Energy-Efficient Security for Voice over IP. International journal of network security. 17(1). 7–22. 1 indexed citations
9.
Salman, Ola, Imad H. Elhajj, Ayman Kayssi, & Ali Chehab. (2015). Edge computing enabling the Internet of Things. 603–608. 136 indexed citations
10.
Kayssi, Ayman, et al.. (2012). CENTER: A Centralized Trust-Based Efficient Routing protocol for wireless sensor networks. 195–202. 9 indexed citations
11.
Kayssi, Ayman, et al.. (2011). A decentralized energy-aware key management scheme for Wireless Sensor Networks. International Conference for Internet Technology and Secured Transactions. 504–508. 4 indexed citations
12.
Itani, Wassim, Ayman Kayssi, & Ali Chehab. (2009). Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures. 711–716. 165 indexed citations
13.
Eid, Mohamad, Hassan Artail, Ayman Kayssi, & Ali Chehab. (2008). LAMAIDS: A Lightweight Adaptive Mobile Agent-based Intrusion Detection System.. Scopus. 6(2). 145–157. 3 indexed citations
14.
Itani, Wassim, et al.. (2006). A Policy-driven, Content-based Security Protocol for Protecting Audit Logs on Wireless Devices.. International journal of network security. 3. 120–131. 1 indexed citations
15.
Itani, Wassim, et al.. (2006). PRIDE: Policy-Driven Web Security for Handheld Wireless Devices.. Global Communications Conference. 1 indexed citations
16.
Eid, Mohamad, Hassan Artail, Ayman Kayssi, & Ali Chehab. (2005). Trends in Mobile Agent Applications. Scopus. 4 indexed citations
17.
Chehab, Ali, et al.. (2004). An improved method for iDDT testing in the presence of leakage and process variation. Scopus. 11 indexed citations
18.
Kayssi, Ayman, et al.. (2004). TRUMMAR - a trust model for mobile agent systems based on reputation. 113–120. 22 indexed citations
19.
Samaha, Joseph, et al.. (2000). G3 Integrates Three System Technologies. Computer. 33(10). 107–110. 1 indexed citations
20.
Kayssi, Ayman & Karem A. Sakallah. (1992). Delay macromodels for the timing analysis of GaAs DCFL. European Design Automation Conference. 142–145. 2 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026