Chen Hajaj

559 total citations
44 papers, 296 citations indexed

About

Chen Hajaj is a scholar working on Artificial Intelligence, Computer Networks and Communications and Signal Processing. According to data from OpenAlex, Chen Hajaj has authored 44 papers receiving a total of 296 indexed citations (citations by other indexed papers that have themselves been cited), including 20 papers in Artificial Intelligence, 17 papers in Computer Networks and Communications and 15 papers in Signal Processing. Recurrent topics in Chen Hajaj's work include Network Security and Intrusion Detection (16 papers), Advanced Malware Detection Techniques (12 papers) and Internet Traffic Analysis and Secure E-voting (9 papers). Chen Hajaj is often cited by papers focused on Network Security and Intrusion Detection (16 papers), Advanced Malware Detection Techniques (12 papers) and Internet Traffic Analysis and Secure E-voting (9 papers). Chen Hajaj collaborates with scholars based in Israel, United States and France. Chen Hajaj's co-authors include David Sarne, Amit Dvir, Noam Hazon, Anat Goldstein, Yevgeniy Vorobeychik, John P. Dickerson, Chaowei Xiao, Tüomas Sandholm, Avinatan Hassidim and Itshak Lapidot and has published in prestigious journals such as Expert Systems with Applications, IEEE Access and Nutrients.

In The Last Decade

Chen Hajaj

38 papers receiving 288 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Chen Hajaj Israel 12 119 90 86 63 50 44 296
Michael Benisch United States 11 127 1.1× 43 0.5× 43 0.5× 100 1.6× 51 1.0× 29 367
Javier Parra‐Arnau Spain 14 288 2.4× 69 0.8× 30 0.3× 23 0.4× 158 3.2× 42 491
Hugues Bouchard United States 8 182 1.5× 19 0.2× 47 0.5× 101 1.6× 225 4.5× 16 517
Lu Ning China 5 225 1.9× 64 0.7× 39 0.5× 40 0.6× 56 1.1× 19 380
Sofia Anna Menesidou Greece 8 101 0.8× 111 1.2× 66 0.8× 13 0.2× 80 1.6× 16 309
Maliheh Izadi Netherlands 9 165 1.4× 49 0.5× 33 0.4× 26 0.4× 274 5.5× 28 356
Ramón Hermoso Spain 13 138 1.2× 84 0.9× 17 0.2× 42 0.7× 163 3.3× 37 374
Tieke He China 12 187 1.6× 71 0.8× 57 0.7× 17 0.3× 229 4.6× 39 408
Andrew Byde United Kingdom 12 146 1.2× 109 1.2× 22 0.3× 227 3.6× 84 1.7× 26 393
Manish Bhide India 7 121 1.0× 139 1.5× 25 0.3× 20 0.3× 83 1.7× 18 290

Countries citing papers authored by Chen Hajaj

Since Specialization
Citations

This map shows the geographic impact of Chen Hajaj's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Chen Hajaj with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Chen Hajaj more than expected).

Fields of papers citing papers by Chen Hajaj

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Chen Hajaj. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Chen Hajaj. The network helps show where Chen Hajaj may publish in the future.

Co-authorship network of co-authors of Chen Hajaj

This figure shows the co-authorship network connecting the top 25 collaborators of Chen Hajaj. A scholar is included among the top collaborators of Chen Hajaj based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Chen Hajaj. Chen Hajaj is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
2.
Hajaj, Chen, et al.. (2024). The art of time-bending: Data augmentation and early prediction for efficient traffic classification. Expert Systems with Applications. 252. 124166–124166.
3.
Dvir, Amit, et al.. (2024). Extending limited datasets with GAN-like self-supervision for SMS spam detection. Computers & Security. 145. 103998–103998. 2 indexed citations
4.
Dvir, Amit, et al.. (2024). A classification-by-retrieval framework for few-shot anomaly detection to detect API injection. Computers & Security. 150. 104249–104249. 2 indexed citations
5.
Izhakian, Shimon, et al.. (2024). Phenotypical characteristics of nontuberculous mycobacterial infection in patients with bronchiectasis. Respiratory Research. 25(1). 278–278.
6.
Dvir, Amit, et al.. (2023). OSF-EIMTC: An open-source framework for standardized encrypted internet traffic classification. Computer Communications. 213. 271–284. 3 indexed citations
8.
Ben‐Shalom, Uzi, et al.. (2023). Online Temporary Learning Groups in Higher Education – Interactions, Compensation, and Maximisation of Achievements in an Israeli Case Study. Journal of Education Culture and Society. 14(1). 619–633. 1 indexed citations
9.
Hajaj, Chen, et al.. (2023). Detecting Parallel Covert Data Transmission Channels in Video Conferencing Using Machine Learning. Electronics. 12(5). 1091–1091. 1 indexed citations
10.
Hajaj, Chen, et al.. (2022). SimCSE for Encrypted Traffic Detection and Zero-Day Attack Detection. IEEE Access. 10. 56952–56960. 11 indexed citations
11.
Goldstein, Anat & Chen Hajaj. (2022). The hidden conversion funnel of mobile vs. desktop consumers. Electronic Commerce Research and Applications. 53. 101135–101135. 13 indexed citations
12.
Hajaj, Chen, et al.. (2022). MalDIST: From Encrypted Traffic Classification to Malware Traffic Detection and Classification. 527–533. 18 indexed citations
13.
Hajaj, Chen, et al.. (2021). Robust coordination in adversarial social networks: From human behavior to agent-based modeling. Network Science. 9(3). 255–290. 1 indexed citations
14.
Hajaj, Chen, et al.. (2021). Prediction model for the spread of the COVID-19 outbreak in the global environment. Heliyon. 7(7). e07416–e07416. 8 indexed citations
15.
Hajaj, Chen, et al.. (2021). Crystal Ball: From Innovative Attacks to Attack Effectiveness Classifier. IEEE Access. 10. 1317–1333. 2 indexed citations
16.
Liang, Tong, Bo Li, Chen Hajaj, Chaowei Xiao, & Yevgeniy Vorobeychik. (2017). Hardening Classifiers against Evasion: the Good, the Bad, and the Ugly. arXiv (Cornell University). 2 indexed citations
17.
Liang, Tong, Bo Li, Chen Hajaj, Chaowei Xiao, & Yevgeniy Vorobeychik. (2017). A Framework for Validating Models of Evasion Attacks on Machine Learning, with Application to PDF Malware Detection. arXiv (Cornell University). 7 indexed citations
18.
Li, Bo, et al.. (2017). Feature Conservation in Adversarial Classifier Evasion: A Case Study.. arXiv (Cornell University). 4 indexed citations
19.
Hajaj, Chen, et al.. (2014). Advanced service schemes for a self-interested information platform. Adaptive Agents and Multi-Agents Systems. 1413–1414. 1 indexed citations
20.
Hajaj, Chen & David Sarne. (2014). Strategic information platforms. 839–856. 8 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026