Bailing Wang

1.8k total citations · 1 hit paper
119 papers, 1.1k citations indexed

About

Bailing Wang is a scholar working on Computer Networks and Communications, Artificial Intelligence and Information Systems. According to data from OpenAlex, Bailing Wang has authored 119 papers receiving a total of 1.1k indexed citations (citations by other indexed papers that have themselves been cited), including 51 papers in Computer Networks and Communications, 48 papers in Artificial Intelligence and 30 papers in Information Systems. Recurrent topics in Bailing Wang's work include Network Security and Intrusion Detection (35 papers), Anomaly Detection Techniques and Applications (19 papers) and Advanced Malware Detection Techniques (18 papers). Bailing Wang is often cited by papers focused on Network Security and Intrusion Detection (35 papers), Anomaly Detection Techniques and Applications (19 papers) and Advanced Malware Detection Techniques (18 papers). Bailing Wang collaborates with scholars based in China, Hong Kong and Sri Lanka. Bailing Wang's co-authors include Yang Liu, Yu Peng, Zihe Liu, Sirui Yao, Kai Wang, Chao Wang, Jindong Wang, Tian Wang, Chunhua Zhao and Chongjun Zhao and has published in prestigious journals such as PLoS ONE, Scientific Reports and Expert Systems with Applications.

In The Last Decade

Bailing Wang

110 papers receiving 1.1k citations

Hit Papers

Review on cyber-physical systems 2017 2026 2020 2023 2017 100 200 300

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Bailing Wang China 16 401 329 225 182 160 119 1.1k
Luiza de Macedo Mourelle Brazil 20 313 0.8× 674 2.0× 98 0.4× 283 1.6× 81 0.5× 179 1.4k
Zhao Zhang China 21 697 1.7× 285 0.9× 115 0.5× 99 0.5× 183 1.1× 88 1.4k
Vishal Jain India 22 233 0.6× 362 1.1× 95 0.4× 191 1.0× 67 0.4× 210 2.0k
Hong Xie China 19 224 0.6× 278 0.8× 80 0.4× 240 1.3× 31 0.2× 129 1.2k
Fawaz Alsolami Saudi Arabia 20 648 1.6× 565 1.7× 188 0.8× 480 2.6× 292 1.8× 59 1.6k
Mehdi Hosseinzadeh Iran 22 743 1.9× 422 1.3× 84 0.4× 256 1.4× 229 1.4× 65 1.6k
Tianyu Zhang China 19 251 0.6× 130 0.4× 65 0.3× 101 0.6× 141 0.9× 101 1.4k
Yujing Wang China 17 292 0.7× 840 2.6× 123 0.5× 125 0.7× 437 2.7× 57 1.5k
J. Logeshwaran India 24 565 1.4× 248 0.8× 89 0.4× 526 2.9× 37 0.2× 108 1.5k
Ashraf Darwish Egypt 14 371 0.9× 376 1.1× 51 0.2× 100 0.5× 135 0.8× 64 1.2k

Countries citing papers authored by Bailing Wang

Since Specialization
Citations

This map shows the geographic impact of Bailing Wang's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Bailing Wang with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Bailing Wang more than expected).

Fields of papers citing papers by Bailing Wang

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Bailing Wang. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Bailing Wang. The network helps show where Bailing Wang may publish in the future.

Co-authorship network of co-authors of Bailing Wang

This figure shows the co-authorship network connecting the top 25 collaborators of Bailing Wang. A scholar is included among the top collaborators of Bailing Wang based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Bailing Wang. Bailing Wang is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Wang, Kai, et al.. (2025). Hierarchical GNN Message Passing for Node-Level Anomaly Detection in Industrial Control Systems. IEEE Transactions on Dependable and Secure Computing. 23(2). 1994–2011. 1 indexed citations
2.
Wang, Kai, et al.. (2025). KERMIT: Knowledge graph completion of enhanced relation modeling with inverse transformation. Knowledge-Based Systems. 324. 113500–113500. 1 indexed citations
3.
Zhang, Yaofang, et al.. (2024). PPEIM: A preference path-based early-stage influence accumulation model for influential nodes identification in locally dense multi-core networks. Journal of Computational Science. 85. 102479–102479. 1 indexed citations
4.
Wang, Bailing, et al.. (2024). Software-Defined Wide Area Networks (SD-WANs): A Survey. Electronics. 13(15). 3011–3011. 1 indexed citations
5.
Wang, Zibo, et al.. (2023). A Survey on Programmable Logic Controller Vulnerabilities, Attacks, Detections, and Forensics. Processes. 11(3). 918–918. 15 indexed citations
6.
Wei, Yuliang, et al.. (2023). Few-shot learning in realistic settings for text CAPTCHA recognition. Neural Computing and Applications. 35(15). 10751–10764. 4 indexed citations
7.
Wang, Chao, et al.. (2023). Robust Intrusion Detection for Industrial Control Systems Using Improved Autoencoder and Bayesian Gaussian Mixture Model. Mathematics. 11(9). 2048–2048. 4 indexed citations
8.
Wang, Zibo, et al.. (2023). A risk assessment model for similar attack scenarios in industrial control system. The Journal of Supercomputing. 79(14). 15955–15979. 2 indexed citations
9.
Wang, Zibo, Zhiyao Liu, Tongtong Li, et al.. (2022). A Prioritizing Interdiction Surface‐Based Vulnerability Remediation Composite Metric for Industrial Control Systems. Wireless Communications and Mobile Computing. 2022(1). 1 indexed citations
10.
Wang, Bailing, et al.. (2021). A Novel Collective User Web Behavior Simulation Method. Computers, materials & continua/Computers, materials & continua (Print). 66(3). 2539–2553. 3 indexed citations
11.
Wang, Bailing, et al.. (2021). On Man-in-the-Middle Attack Risks of the VPN Gate Relay System. Security and Communication Networks. 2021. 1–7. 2 indexed citations
12.
Wang, Bailing, et al.. (2020). Attack Graph-Based Quantitative Assessment for Industrial Control System Security. 1748–1753. 5 indexed citations
13.
Liu, Yang, et al.. (2020). Intrusion Detection based on Non-negative Positive-unlabeled Learning. 1015–1020. 1 indexed citations
14.
Wang, Bailing, et al.. (2019). Information Dissemination Model of Microblogging with Internet Marketers. Journal of Information Processing Systems. 15(4). 853–864. 2 indexed citations
15.
Wang, Bailing, et al.. (2018). Research progress on pharmacological action of trillium tschonoskii Maxim. Traditional Chinese Medicine. 40(5). 478–480. 2 indexed citations
16.
Du, Xiaojiang, et al.. (2017). Massive Fishing Website URL Parallel Filtering Method. IEEE Access. 6. 2378–2388. 4 indexed citations
17.
Wang, Bailing, et al.. (2015). Exploring Cultural Effects on Teaching Styles of Chinese and American Professors.. 11(2). 1–7. 3 indexed citations
18.
Wang, Bailing, Tao Li, Xiaozhen Lv, et al.. (2014). The Influence of Education on Chinese Version of Montreal Cognitive Assessment in Detecting Amnesic Mild Cognitive Impairment among Older People in a Beijing Rural Community. The Scientific World JOURNAL. 2014. 1–7. 36 indexed citations
19.
Hu, Xiang‐Shun, et al.. (2014). A MODEL TO ANALYZE WEATHER IMPACT ON APHID POPULATION DYNAMICS: AN APPLICATION ON SWALLOWTAIL CATASTROPHE MODEL. European Scientific Journal ESJ. 10(18). 3 indexed citations
20.
Liu, Yang, et al.. (2013). IOT Secure Transmission Based on Integration of IBE and PKI/CA. International Journal of Control and Automation. 6(2). 245–254. 7 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026