Chonghua Wang

414 total citations
35 papers, 249 citations indexed

About

Chonghua Wang is a scholar working on Computer Networks and Communications, Artificial Intelligence and Information Systems. According to data from OpenAlex, Chonghua Wang has authored 35 papers receiving a total of 249 indexed citations (citations by other indexed papers that have themselves been cited), including 18 papers in Computer Networks and Communications, 18 papers in Artificial Intelligence and 9 papers in Information Systems. Recurrent topics in Chonghua Wang's work include Network Security and Intrusion Detection (11 papers), Advanced Malware Detection Techniques (8 papers) and Internet Traffic Analysis and Secure E-voting (6 papers). Chonghua Wang is often cited by papers focused on Network Security and Intrusion Detection (11 papers), Advanced Malware Detection Techniques (8 papers) and Internet Traffic Analysis and Secure E-voting (6 papers). Chonghua Wang collaborates with scholars based in China, United States and Italy. Chonghua Wang's co-authors include Lihua Yin, Chao Li, Chunsheng Zhu, Zhihong Tian, Bailing Wang, Bo Jiang, Xiaochun Cheng, Chao Wang, Xueying Zhang and Zhigang Lü and has published in prestigious journals such as IEEE Access, Future Generation Computer Systems and Computer Networks.

In The Last Decade

Chonghua Wang

28 papers receiving 237 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Chonghua Wang China 7 135 108 59 45 35 35 249
Shaashwat Agrawal India 5 187 1.4× 228 2.1× 51 0.9× 56 1.2× 35 1.0× 6 335
Nacira Ghoualmi‐Zine Algeria 9 168 1.2× 141 1.3× 61 1.0× 59 1.3× 28 0.8× 41 303
Sagnik Sarkar India 6 187 1.4× 229 2.1× 51 0.9× 56 1.2× 35 1.0× 10 346
Terpsichori-Helen Velivassaki Greece 10 226 1.7× 117 1.1× 74 1.3× 50 1.1× 53 1.5× 28 376
Peter Hannay Australia 8 140 1.0× 86 0.8× 136 2.3× 91 2.0× 38 1.1× 36 303
Weiqi Zhang China 9 115 0.9× 131 1.2× 69 1.2× 54 1.2× 11 0.3× 52 279
Mario Sanz Spain 8 175 1.3× 92 0.9× 37 0.6× 65 1.4× 26 0.7× 16 280
Sathish Kumar United States 10 114 0.8× 72 0.7× 84 1.4× 34 0.8× 19 0.5× 26 232
Ilkyeun Ra United States 9 209 1.5× 53 0.5× 112 1.9× 40 0.9× 23 0.7× 41 289
Mahshid Helali Moghadam Sweden 8 84 0.6× 68 0.6× 42 0.7× 23 0.5× 61 1.7× 27 204

Countries citing papers authored by Chonghua Wang

Since Specialization
Citations

This map shows the geographic impact of Chonghua Wang's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Chonghua Wang with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Chonghua Wang more than expected).

Fields of papers citing papers by Chonghua Wang

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Chonghua Wang. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Chonghua Wang. The network helps show where Chonghua Wang may publish in the future.

Co-authorship network of co-authors of Chonghua Wang

This figure shows the co-authorship network connecting the top 25 collaborators of Chonghua Wang. A scholar is included among the top collaborators of Chonghua Wang based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Chonghua Wang. Chonghua Wang is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
2.
Wang, Chonghua, et al.. (2024). BotChat: Evaluating LLMs’ Capabilities of Having Multi-Turn Dialogues. 3184–3200. 4 indexed citations
3.
Wang, Zibo, et al.. (2023). A Survey on Programmable Logic Controller Vulnerabilities, Attacks, Detections, and Forensics. Processes. 11(3). 918–918. 15 indexed citations
4.
Li, Chao, et al.. (2023). An Anomaly Detection Approach Based on Integrated LSTM for IoT Big Data. Security and Communication Networks. 2023. 1–10. 5 indexed citations
5.
Qin, Jian, et al.. (2023). Network Traffic Classification Based on SD Sampling and Hierarchical Ensemble Learning. Security and Communication Networks. 2023. 1–16. 5 indexed citations
6.
Li, Chao, Junjian Li, Ruoyu Wang, Ran Li, & Chonghua Wang. (2023). YUCML-An usage control policy language for end-to-end data sharing. 5. 350–355.
7.
Wang, Chao, et al.. (2023). Intrusion Detection System Based on One-Class Support Vector Machine and Gaussian Mixture Model. Electronics. 12(4). 930–930. 21 indexed citations
8.
Yin, Lihua, et al.. (2022). IoV-SDCM: An IoV Secure Data Communication Model Based on Network Encoding and Relay Collaboration. Security and Communication Networks. 2022. 1–13. 2 indexed citations
9.
Wang, Chonghua, et al.. (2022). Anomaly Detection in Encrypted Identity Resolution Traffic based on Machine Learning. 264–275. 1 indexed citations
10.
Yin, Lihua, et al.. (2022). WaterPurifier: A scalable system to prevent the DNS water torture attack in 5G-enabled SIoT network. Computer Communications. 199. 186–195. 2 indexed citations
11.
Lü, Zhigang, Bo Jiang, Yuling Liu, et al.. (2020). STIDM: A Spatial and Temporal Aware Intrusion Detection Model. 370–377. 20 indexed citations
12.
Wang, Chonghua, et al.. (2020). Identification of important nodes on large-scale Internet based on unsupervised learning. 121–129. 2 indexed citations
13.
Fu, Ye, et al.. (2020). Conflict Detection of Device Linkage Rules in Smart Home Systems. 3160–3166. 1 indexed citations
14.
Wang, Wen‐Hui, et al.. (2020). Network Security Situation Awareness Technology Based on Multi-source Heterogeneous Data. 420–424. 1 indexed citations
15.
Wang, Chonghua, et al.. (2019). Research on Industrial Internet Platform Security Protection. 19(9). 6. 2 indexed citations
16.
Wang, Chonghua, Libo Yin, Jun Z. Li, et al.. (2019). HProve: A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware. View. 5(18). 157417–157417.
17.
Hao, Zhiyu, et al.. (2016). A Hybrid Monitoring Mechanism in Virtualized Environments. 3. 1038–1045. 3 indexed citations
18.
Wang, Chonghua. (2010). Co-simulation on uprising dynamic load factor of quayside container crane with VVVF control system. Journal of Shanghai, Maritime University.
19.
Wang, Chonghua. (2008). Coal Mine EAM System Based on B/S Multichamber Structural. Coal Technology. 1 indexed citations
20.
Wang, Chonghua. (2006). System modeling of port container crane training simulator based on object-oriented method. Chinese journal of construction machinery.

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026