Bei-Tseng Chu

916 total citations
29 papers, 577 citations indexed

About

Bei-Tseng Chu is a scholar working on Information Systems, Computer Networks and Communications and Signal Processing. According to data from OpenAlex, Bei-Tseng Chu has authored 29 papers receiving a total of 577 indexed citations (citations by other indexed papers that have themselves been cited), including 19 papers in Information Systems, 10 papers in Computer Networks and Communications and 9 papers in Signal Processing. Recurrent topics in Bei-Tseng Chu's work include Advanced Malware Detection Techniques (9 papers), Information and Cyber Security (7 papers) and Spam and Phishing Detection (5 papers). Bei-Tseng Chu is often cited by papers focused on Advanced Malware Detection Techniques (9 papers), Information and Cyber Security (7 papers) and Spam and Phishing Detection (5 papers). Bei-Tseng Chu collaborates with scholars based in United States, India and Pakistan. Bei-Tseng Chu's co-authors include Gail‐Joon Ahn, Longhua Zhang, Ehab Al‐Shaer, Amirreza Niakanlahiji, Mohammad Ashiqur Rahman, Zahid Anwar, Jing Xie, Heather Richter Lipford, Jinpeng Wei and James A. Reggia and has published in prestigious journals such as Journal of the Association for Information Systems, Computers & Security and International Journal of Intelligent Systems.

In The Last Decade

Bei-Tseng Chu

28 papers receiving 528 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Bei-Tseng Chu United States 12 339 262 237 186 153 29 577
Dinusha Vatsalan Australia 16 285 0.8× 566 2.2× 78 0.3× 167 0.9× 81 0.5× 46 814
Antonis Michalas Finland 15 407 1.2× 398 1.5× 123 0.5× 136 0.7× 48 0.3× 60 651
Jerry den Hartog Netherlands 14 162 0.5× 238 0.9× 145 0.6× 241 1.3× 113 0.7× 37 521
Michael J. Covington United States 11 330 1.0× 410 1.6× 476 2.0× 359 1.9× 64 0.4× 14 806
Danny Yuxing Huang United States 13 305 0.9× 177 0.7× 122 0.5× 290 1.6× 201 1.3× 22 624
Nureni Ayofe Azeez Nigeria 13 268 0.8× 176 0.7× 52 0.2× 244 1.3× 171 1.1× 42 518
B. Thuraisingham United States 10 184 0.5× 199 0.8× 147 0.6× 134 0.7× 34 0.2× 35 439
Loredana Caruccio Italy 13 180 0.5× 287 1.1× 50 0.2× 114 0.6× 67 0.4× 36 511
Daniel Mellado Spain 11 452 1.3× 182 0.7× 42 0.2× 161 0.9× 141 0.9× 30 564
Steven A. Demurjian United States 12 217 0.6× 241 0.9× 155 0.7× 171 0.9× 44 0.3× 73 431

Countries citing papers authored by Bei-Tseng Chu

Since Specialization
Citations

This map shows the geographic impact of Bei-Tseng Chu's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Bei-Tseng Chu with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Bei-Tseng Chu more than expected).

Fields of papers citing papers by Bei-Tseng Chu

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Bei-Tseng Chu. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Bei-Tseng Chu. The network helps show where Bei-Tseng Chu may publish in the future.

Co-authorship network of co-authors of Bei-Tseng Chu

This figure shows the co-authorship network connecting the top 25 collaborators of Bei-Tseng Chu. A scholar is included among the top collaborators of Bei-Tseng Chu based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Bei-Tseng Chu. Bei-Tseng Chu is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Niakanlahiji, Amirreza, Jafar Haadi Jafarian, Bei-Tseng Chu, & Ehab Al‐Shaer. (2020). HoneyBug: Personalized Cyber Deception for Web Applications. Proceedings of the ... Annual Hawaii International Conference on System Sciences. 3 indexed citations
2.
Niakanlahiji, Amirreza, et al.. (2020). ShadowMove: A Stealthy Lateral Movement Strategy. Civil War Book Review. 559–576. 5 indexed citations
3.
Niakanlahiji, Amirreza, et al.. (2019). IoCMiner: Automatic Extraction of Indicators of Compromise from Twitter. 4747–4754. 14 indexed citations
4.
Qian, Kai, Dan Lo, Reza M. Parizi, et al.. (2018). Authentic Learning Secure Software Development (SSD) in Computing Education. 1–9. 11 indexed citations
5.
Niakanlahiji, Amirreza, Bei-Tseng Chu, & Ehab Al‐Shaer. (2018). PhishMon: A Machine Learning Framework for Detecting Phishing Webpages. 220–225. 30 indexed citations
6.
Anand, Ankesh, et al.. (2018). Phishing URL Detection with Oversampling based on Text Generative Adversarial Networks. 1168–1177. 32 indexed citations
7.
Niakanlahiji, Amirreza, Jinpeng Wei, & Bei-Tseng Chu. (2018). A Natural Language Processing Based Trend Analysis of Advanced Persistent Threat Techniques. 2995–3000. 21 indexed citations
8.
Yuan, Xiaohong, Kenneth Williams, Huiming Yu, et al.. (2017). Faculty Workshops for Teaching Information Assurance through Hands-On Exercises and Case Studies.. Journal of the Association for Information Systems. 28(1). 11–20. 4 indexed citations
9.
Niakanlahiji, Amirreza, et al.. (2017). Predicting Zero-day Malicious IP Addresses. 1–6. 7 indexed citations
10.
Yuan, Xiaohong, et al.. (2016). Secure Software Engineering Education: Knowledge Area, Curriculum and Resources. DigitalCommons - Kennesaw State University (Kennesaw State University). 2016(1). 17 indexed citations
11.
Yuan, Xiaohong, Kenneth Williams, Huiming Yu, et al.. (2014). Developing Faculty Expertise in Information Assurance through Case Studies and Hands-On Experiences. 4938–4945. 5 indexed citations
12.
Tozal, Mehmet Engin, Yongge Wang, Ehab Al‐Shaer, et al.. (2011). Adaptive Information Coding for Secure and Reliable Wireless Telesurgery Communications. Mobile Networks and Applications. 18(5). 697–711. 8 indexed citations
13.
Chu, Bei-Tseng, et al.. (2007). Collegiate Cyber Game Design Criteria and Participation. 3. 1036–1041. 3 indexed citations
14.
Ahn, Gail‐Joon, et al.. (2007). Collecting and Analyzing Bots in a Systematic Honeynet-based Testbed Environment. 3 indexed citations
15.
Chu, Bei-Tseng, et al.. (2006). USIS: A Unified Framework for Secured Information System Lifecycle. Advances in intelligent systems research.
16.
Zhang, Longhua, Gail‐Joon Ahn, & Bei-Tseng Chu. (2003). A rule-based framework for role-based delegation and revocation. ACM Transactions on Information and System Security. 6(3). 404–441. 113 indexed citations
17.
Chu, Bei-Tseng, et al.. (2001). Information technology curriculum development. 400–401. 6 indexed citations
18.
Zhang, Longhua, Gail‐Joon Ahn, & Bei-Tseng Chu. (2001). A rule-based framework for role based delegation. 153–162. 73 indexed citations
19.
Chu, Bei-Tseng, et al.. (2001). Information technology curriculum development. ACM SIGCSE Bulletin. 33(1). 400–401. 3 indexed citations
20.
Chu, Bei-Tseng. (1992). DIAGNOSIS WITH CONTINUOUS AND DISCRETE CAUSAL RELATIONSHIPS: KNOWLEDGE REPRESENTATION. International Journal of Pattern Recognition and Artificial Intelligence. 6(4). 731–751. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026