Bow-Yaw Wang

723 total citations
25 papers, 122 citations indexed

About

Bow-Yaw Wang is a scholar working on Artificial Intelligence, Computational Theory and Mathematics and Software. According to data from OpenAlex, Bow-Yaw Wang has authored 25 papers receiving a total of 122 indexed citations (citations by other indexed papers that have themselves been cited), including 19 papers in Artificial Intelligence, 12 papers in Computational Theory and Mathematics and 9 papers in Software. Recurrent topics in Bow-Yaw Wang's work include Formal Methods in Verification (11 papers), Software Testing and Debugging Techniques (9 papers) and Logic, programming, and type systems (6 papers). Bow-Yaw Wang is often cited by papers focused on Formal Methods in Verification (11 papers), Software Testing and Debugging Techniques (9 papers) and Logic, programming, and type systems (6 papers). Bow-Yaw Wang collaborates with scholars based in Taiwan, China and United States. Bow-Yaw Wang's co-authors include Ming-Hsien Tsai, Bo‐Yin Yang, Fei He, Yu‐Fang Chen, Chang-Hong Hsu, Peter Schwabe, Carl A. Gunter, Lijun Zhang, Tevfik Bultan and Fang Yu and has published in prestigious journals such as ACM SIGPLAN Notices, ACM Transactions on Software Engineering and Methodology and Journal of Automated Reasoning.

In The Last Decade

Bow-Yaw Wang

22 papers receiving 117 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Bow-Yaw Wang Taiwan 7 95 47 46 39 28 25 122
Leonidas Lampropoulos United States 5 53 0.6× 38 0.8× 80 1.7× 46 1.2× 25 0.9× 18 110
Aina Niemetz Austria 5 58 0.6× 54 1.1× 49 1.1× 30 0.8× 13 0.5× 14 110
Mathias Preiner Austria 5 52 0.5× 51 1.1× 44 1.0× 27 0.7× 12 0.4× 13 98
Grigory Fedyukovich United States 7 75 0.8× 72 1.5× 93 2.0× 39 1.0× 15 0.5× 22 139
Quang Loc Le United Kingdom 5 47 0.5× 28 0.6× 61 1.3× 48 1.2× 39 1.4× 9 111
Dilian Gurov Sweden 7 91 1.0× 92 2.0× 47 1.0× 23 0.6× 14 0.5× 38 140
Étienne Payet Réunion 5 92 1.0× 54 1.1× 73 1.6× 46 1.2× 58 2.1× 8 146
Lukáš Holík Czechia 9 80 0.8× 41 0.9× 58 1.3× 65 1.7× 10 0.4× 26 136
Therese Berg Sweden 4 90 0.9× 50 1.1× 87 1.9× 42 1.1× 12 0.4× 5 122
Mana Taghdiri United States 6 65 0.7× 43 0.9× 82 1.8× 41 1.1× 10 0.4× 9 106

Countries citing papers authored by Bow-Yaw Wang

Since Specialization
Citations

This map shows the geographic impact of Bow-Yaw Wang's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Bow-Yaw Wang with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Bow-Yaw Wang more than expected).

Fields of papers citing papers by Bow-Yaw Wang

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Bow-Yaw Wang. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Bow-Yaw Wang. The network helps show where Bow-Yaw Wang may publish in the future.

Co-authorship network of co-authors of Bow-Yaw Wang

This figure shows the co-authorship network connecting the top 25 collaborators of Bow-Yaw Wang. A scholar is included among the top collaborators of Bow-Yaw Wang based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Bow-Yaw Wang. Bow-Yaw Wang is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Tsai, Ming-Hsien, et al.. (2025). Algebraic Linear Analysis for Number Theoretic Transform in Lattice-Based Cryptography. IACR Transactions on Cryptographic Hardware and Embedded Systems. 2025(3). 668–692.
2.
Wang, Bow-Yaw, et al.. (2024). Ensuring Fairness with Transparent Auditing of Quantitative Bias in AI Systems. 25–32. 2 indexed citations
3.
Tsai, Ming-Hsien, et al.. (2023). llvm2CryptoLine: Verifying Arithmetic in Cryptographic C Programs. 2167–2171.
4.
Hwang, Vincent, Jiaxiang Liu, Gregor Seiler, et al.. (2022). Verified NTT Multiplications for NISTPQC KEM Lattice Finalists: Kyber, SABER, and NTRU. IACR Transactions on Cryptographic Hardware and Embedded Systems. 718–750. 8 indexed citations
5.
He, Fei, et al.. (2020). Incremental predicate analysis for regression verification. Proceedings of the ACM on Programming Languages. 4(OOPSLA). 1–25. 1 indexed citations
6.
He, Fei, et al.. (2020). Interval counterexamples for loop invariant learning. 111–122. 7 indexed citations
7.
Tsai, Ming-Hsien, et al.. (2019). Signed Cryptographic Program Verification with Typed CryptoLine. 1591–1606. 6 indexed citations
8.
Tsai, Ming-Hsien, et al.. (2019). Verifying Arithmetic in Cryptographic C Programs. 10206. 552–564. 3 indexed citations
9.
Tsai, Ming-Hsien, et al.. (2018). Verifying Arithmetic Assembly Programs in Cryptographic Primitives (Invited Talk). DROPS (Schloss Dagstuhl – Leibniz Center for Informatics). 4 indexed citations
10.
Luo, Chen, et al.. (2017). PSpec: A Formal Specification Language for Fine-Grained Control on Distributed Data Analytics. 47. 300–302. 2 indexed citations
11.
Tsai, Ming-Hsien, Bow-Yaw Wang, & Bo‐Yin Yang. (2017). Certified Verification of Algebraic Properties on Low-Level Mathematical Constructs in Cryptographic Programs. 1973–1987. 8 indexed citations
12.
He, Fei, et al.. (2016). Learning Weighted Assumptions for Compositional Verification of Markov Decision Processes. ACM Transactions on Software Engineering and Methodology. 25(3). 1–39. 6 indexed citations
13.
Yu, Fang, et al.. (2016). Optimal sanitization synthesis for web application vulnerability repair. 189–200. 10 indexed citations
14.
He, Fei, et al.. (2015). Leveraging Weighted Automata in Compositional Reasoning about Concurrent Probabilistic Systems. ACM SIGPLAN Notices. 50(1). 503–514.
16.
He, Fei, et al.. (2014). Symbolic assume-guarantee reasoning through BDD learning. 1071–1082. 5 indexed citations
17.
Kong, Soonho, et al.. (2014). Automatically inferring loop invariants via algorithmic learning. Mathematical Structures in Computer Science. 25(4). 892–915. 2 indexed citations
18.
Zhou, Min, Fei He, Bow-Yaw Wang, Ming Gu, & Jiaguang Sun. (2013). Array Theory of Bounded Elements and its Applications. Journal of Automated Reasoning. 52(4). 379–405. 4 indexed citations
19.
Wang, Bow-Yaw, et al.. (2013). Non-linear Interpolant Generation and Its Applications to Program Verification. 1 indexed citations
20.
Lee, Wonchan, et al.. (2012). Predicate Generation for Learning-Based Quantifier-Free Loop Invariant Inference. Logical Methods in Computer Science. Volume 8, Issue 3. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026