Chunhe Xia

1.1k total citations · 1 hit paper
103 papers, 662 citations indexed

About

Chunhe Xia is a scholar working on Computer Networks and Communications, Information Systems and Artificial Intelligence. According to data from OpenAlex, Chunhe Xia has authored 103 papers receiving a total of 662 indexed citations (citations by other indexed papers that have themselves been cited), including 72 papers in Computer Networks and Communications, 45 papers in Information Systems and 40 papers in Artificial Intelligence. Recurrent topics in Chunhe Xia's work include Network Security and Intrusion Detection (48 papers), Opportunistic and Delay-Tolerant Networks (18 papers) and Advanced Malware Detection Techniques (18 papers). Chunhe Xia is often cited by papers focused on Network Security and Intrusion Detection (48 papers), Opportunistic and Delay-Tolerant Networks (18 papers) and Advanced Malware Detection Techniques (18 papers). Chunhe Xia collaborates with scholars based in China, Australia and Canada. Chunhe Xia's co-authors include Tianbo Wang, Xiaojian Li, Yi Ji, Long Chen, Peng Cui, Qiong Jia, Yang Xiang, Wenchao Li, Weidong Zhou and Zhong Li and has published in prestigious journals such as IEEE Access, Sensors and ACM Computing Surveys.

In The Last Decade

Chunhe Xia

88 papers receiving 636 citations

Hit Papers

HIDIM: A novel framework of network intrusion detection f... 2024 2026 2025 2024 10 20 30 40

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Chunhe Xia China 14 380 245 198 164 71 103 662
P. Santhi Thilagam India 19 537 1.4× 385 1.6× 458 2.3× 258 1.6× 85 1.2× 68 938
Kevin A. Kwiat United States 17 410 1.1× 218 0.9× 440 2.2× 165 1.0× 54 0.8× 55 817
Qiying Cao China 15 509 1.3× 110 0.4× 137 0.7× 101 0.6× 85 1.2× 50 683
Eugene Y. Vasserman United States 13 441 1.2× 306 1.2× 260 1.3× 107 0.7× 20 0.3× 45 754
Mathias Fischer Germany 13 713 1.9× 328 1.3× 196 1.0× 223 1.4× 35 0.5× 75 836
Kai Zhao China 13 315 0.8× 380 1.6× 240 1.2× 86 0.5× 50 0.7× 51 787
Šarūnas Girdzijauskas Sweden 14 371 1.0× 213 0.9× 162 0.8× 45 0.3× 48 0.7× 56 620
Martin Husák Czechia 15 532 1.4× 305 1.2× 380 1.9× 273 1.7× 24 0.3× 59 700

Countries citing papers authored by Chunhe Xia

Since Specialization
Citations

This map shows the geographic impact of Chunhe Xia's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Chunhe Xia with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Chunhe Xia more than expected).

Fields of papers citing papers by Chunhe Xia

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Chunhe Xia. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Chunhe Xia. The network helps show where Chunhe Xia may publish in the future.

Co-authorship network of co-authors of Chunhe Xia

This figure shows the co-authorship network connecting the top 25 collaborators of Chunhe Xia. A scholar is included among the top collaborators of Chunhe Xia based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Chunhe Xia. Chunhe Xia is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Xia, Chunhe, et al.. (2025). Enhancing encrypted traffic analysis via source APIs: A robust approach for malicious traffic detection. Computers & Security. 156. 104529–104529.
2.
Xia, Chunhe, et al.. (2024). Input and Output Matter: Malicious Traffic Detection With Explainability. IEEE Network. 39(2). 259–267. 21 indexed citations
3.
Xia, Chunhe, et al.. (2024). HL-DPoS: An enhanced anti-long-range attack DPoS algorithm. Computer Networks. 249. 110473–110473. 8 indexed citations
4.
Xia, Chunhe, et al.. (2024). BRFL: A blockchain-based byzantine-robust federated learning model. Journal of Parallel and Distributed Computing. 196. 104995–104995. 1 indexed citations
5.
Zhou, Weidong, et al.. (2024). HIDIM: A novel framework of network intrusion detection for hierarchical dependency and class imbalance. Computers & Security. 148. 104155–104155. 48 indexed citations breakdown →
6.
Li, Wenchao, et al.. (2024). Secure Data Integrity Check Based on Verified Public Key Encryption With Equality Test for Multi-Cloud Storage. IEEE Transactions on Dependable and Secure Computing. 21(6). 5359–5373. 23 indexed citations
8.
Xia, Chunhe, et al.. (2023). GRASS: Learning Spatial–Temporal Properties From Chainlike Cascade Data for Microscopic Diffusion Prediction. IEEE Transactions on Neural Networks and Learning Systems. 35(11). 16313–16327. 59 indexed citations
9.
Xia, Chunhe, et al.. (2023). FedDroidMeter: A Privacy Risk Evaluator for FL-Based Android Malware Classification Systems. Entropy. 25(7). 1053–1053. 1 indexed citations
10.
Xia, Chunhe, et al.. (2022). CRCS: Learning Synergistic Cascade Correlation for Microscopic Cascade Prediction. abs 2107 12576. 1152–1159.
11.
Xia, Chunhe, et al.. (2021). A Heterogeneous Graph Attention Network-Based Web Service Link Prediction. 102–108. 2 indexed citations
12.
Wang, Tianbo, Chunhe Xia, Xiaojian Li, & Yang Xiang. (2020). Epidemic Heterogeneity and Hierarchy: A Study of Wireless Hybrid Worm Propagation. IEEE Transactions on Mobile Computing. 21(5). 1639–1656. 8 indexed citations
13.
Wang, Shizhao, Chunhe Xia, & Tianbo Wang. (2019). A Novel Intrusion Detector Based on Deep Learning Hybrid Methods. 300–305. 13 indexed citations
14.
Wang, Tianbo, et al.. (2017). SADI: A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks. IEEE Transactions on Dependable and Secure Computing. 16(1). 142–155. 11 indexed citations
15.
Liang, Xiaoyan, et al.. (2014). Modeling and global conflict analysis of firewall policy. China Communications. 11(5). 124–135. 3 indexed citations
16.
Xia, Chunhe. (2010). A Modeling Approach to Survivability Model for MANET.
17.
Xia, Chunhe. (2009). Research and Practice of Computer Networks Curriculum Teaching for Graduated Students. Computer education.
18.
Xia, Chunhe. (2008). Computer network defense description language for attack and defense exercise. Jisuanji gongcheng yu sheji. 1 indexed citations
19.
Xia, Chunhe, et al.. (2008). Computer network defense policy model. Beijing Hangkong Hangtian Daxue xuebao. 34(8). 925.
20.
Xia, Chunhe, et al.. (2007). P2P worm detection based on application identification. Frontiers of Computer Science in China. 1(1). 114–122. 5 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026