Chunlai Du

616 total citations · 1 hit paper
24 papers, 425 citations indexed

About

Chunlai Du is a scholar working on Computer Networks and Communications, Signal Processing and Artificial Intelligence. According to data from OpenAlex, Chunlai Du has authored 24 papers receiving a total of 425 indexed citations (citations by other indexed papers that have themselves been cited), including 11 papers in Computer Networks and Communications, 11 papers in Signal Processing and 8 papers in Artificial Intelligence. Recurrent topics in Chunlai Du's work include Advanced Malware Detection Techniques (11 papers), Network Security and Intrusion Detection (8 papers) and Software Testing and Debugging Techniques (4 papers). Chunlai Du is often cited by papers focused on Advanced Malware Detection Techniques (11 papers), Network Security and Intrusion Detection (8 papers) and Software Testing and Debugging Techniques (4 papers). Chunlai Du collaborates with scholars based in China, United States and Egypt. Chunlai Du's co-authors include Binxing Fang, Zhihong Tian, Jing Qiu, Shen Su, Yanhui Guo, Amira S. Ashour, Thomas A. Rothfus, Kemal Polat, Shenghui Liu and Hongli Zhang and has published in prestigious journals such as IEEE Access, IEEE Internet of Things Journal and Applied Soft Computing.

In The Last Decade

Chunlai Du

16 papers receiving 393 citations

Hit Papers

A Survey on Access Control in the Age of Internet of Things 2020 2026 2022 2024 2020 100 200 300

Peers

Chunlai Du
Hongyi Wu United States
Sungsu Lim South Korea
Mohammad Masum United States
Ron Bitton Israel
Hongyi Wu United States
Chunlai Du
Citations per year, relative to Chunlai Du Chunlai Du (= 1×) peers Hongyi Wu

Countries citing papers authored by Chunlai Du

Since Specialization
Citations

This map shows the geographic impact of Chunlai Du's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Chunlai Du with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Chunlai Du more than expected).

Fields of papers citing papers by Chunlai Du

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Chunlai Du. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Chunlai Du. The network helps show where Chunlai Du may publish in the future.

Co-authorship network of co-authors of Chunlai Du

This figure shows the co-authorship network connecting the top 25 collaborators of Chunlai Du. A scholar is included among the top collaborators of Chunlai Du based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Chunlai Du. Chunlai Du is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Guo, Yanhui, et al.. (2025). Using Hybrid Transformer and Convolutional Neural Network for Malware Detection in Internet of Things. International Journal of Pattern Recognition and Artificial Intelligence. 39(2).
2.
Du, Chunlai, Xin Gu, Yanhui Guo, et al.. (2025). A Transformer Based on Feedback Attention Mechanism for Diagnosis of Coronary Heart Disease Using Echocardiographic Images. Computers, materials & continua/Computers, materials & continua (Print). 83(2). 3435–3450.
3.
Du, Chunlai, et al.. (2024). A Novel Seed Generation Approach for Vulnerability Mining Based on Generative Adversarial Networks and Attention Mechanisms. Mathematics. 12(5). 745–745. 1 indexed citations
5.
Du, Chunlai, et al.. (2024). HotCFuzz: Enhancing Vulnerability Detection through Fuzzing and Hotspot Code Coverage Analysis. Electronics. 13(10). 1909–1909.
6.
Du, Chunlai, et al.. (2023). Toward Detecting Malware Based on Process-Aware Behaviors. Security and Communication Networks. 2023. 1–16. 2 indexed citations
7.
Du, Chunlai, et al.. (2023). MemConFuzz: Memory Consumption Guided Fuzzing with Data Flow Analysis. Mathematics. 11(5). 1222–1222.
8.
Du, Chunlai, et al.. (2022). Energy-Efficient Edge Caching and Task Deployment Algorithm Enabled by Deep Q-Learning for MEC. Electronics. 11(24). 4121–4121. 2 indexed citations
9.
Du, Chunlai, et al.. (2022). MalPro: Learning on Process-Aware Behaviors for Malware Detection. 1–7. 6 indexed citations
10.
Guo, Yanhui, et al.. (2021). Two-level K-nearest neighbors approach for invasive plants detection and classification. Applied Soft Computing. 108. 107523–107523. 14 indexed citations
11.
Jia, Binghao, Yanhui Guo, Hongmei Li, & Chunlai Du. (2021). A Method of Malicious Data Flow Detection Based on Convolutional Neural Network. 81. 409–412.
12.
Du, Chunlai, Tong Jin, Yanhui Guo, Binghao Jia, & Bin Li. (2021). FastAFLGo: Toward a Directed Greybox Fuzzing. Computers, materials & continua/Computers, materials & continua (Print). 69(3). 3845–3855. 1 indexed citations
13.
Du, Chunlai, et al.. (2021). RRPOT: A Record and Replay Based Honeypot System. Journal of Physics Conference Series. 1757(1). 12183–12183. 1 indexed citations
14.
Guo, Yanhui, et al.. (2020). Automatic myocardial infarction detection in contrast echocardiography based on polar residual network. Computer Methods and Programs in Biomedicine. 198. 105791–105791. 12 indexed citations
15.
Qiu, Jing, et al.. (2020). A Survey on Access Control in the Age of Internet of Things. IEEE Internet of Things Journal. 7(6). 4682–4696. 311 indexed citations breakdown →
16.
Guo, Yanhui, et al.. (2019). OCE-NGC: A neutrosophic graph cut algorithm using optimized clustering estimation algorithm for dermoscopic skin lesion segmentation. Applied Soft Computing. 86. 105931–105931. 21 indexed citations
17.
Ashour, Amira S., et al.. (2019). A Novel Neutrosophic Subsets Definition for Dermoscopic Image Segmentation. IEEE Access. 7. 151047–151053. 6 indexed citations
18.
Guo, Yanhui, et al.. (2019). Varied channels region proposal and classification network for wildlife image classification under complex environment. IET Image Processing. 14(4). 585–591. 11 indexed citations
19.
Ashour, Amira S., et al.. (2018). Optimised halftoning and inverse halftoning of dermoscopic images for supporting teledermoscopy system. IET Image Processing. 13(3). 529–536. 5 indexed citations
20.
Du, Chunlai, Mingzeng Hu, Hongli Zhang, & Weizhe Zhang. (2009). Anti-collusive Self-healing Key Distribution Scheme with Revocation Capability. Information Technology Journal. 8(4). 619–624. 12 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026