Clay Shields

4.9k total citations · 1 hit paper
43 papers, 3.1k citations indexed

About

Clay Shields is a scholar working on Computer Networks and Communications, Artificial Intelligence and Signal Processing. According to data from OpenAlex, Clay Shields has authored 43 papers receiving a total of 3.1k indexed citations (citations by other indexed papers that have themselves been cited), including 29 papers in Computer Networks and Communications, 26 papers in Artificial Intelligence and 16 papers in Signal Processing. Recurrent topics in Clay Shields's work include Internet Traffic Analysis and Secure E-voting (22 papers), Network Security and Intrusion Detection (19 papers) and Advanced Malware Detection Techniques (15 papers). Clay Shields is often cited by papers focused on Internet Traffic Analysis and Secure E-voting (22 papers), Network Security and Intrusion Detection (19 papers) and Advanced Malware Detection Techniques (15 papers). Clay Shields collaborates with scholars based in United States. Clay Shields's co-authors include Brian Neil Levine, Elizabeth M. Belding‐Royer, Carla E. Brodley, Micah Adler, Matthew Wright, J.J. Garcia‐Luna‐Aceves, Micah Sherr, Tavish Vaidya, Yuankai Zhang and Wenchao Zhou and has published in prestigious journals such as IEEE Journal on Selected Areas in Communications, ACM SIGCOMM Computer Communication Review and Computer Communications.

In The Last Decade

Clay Shields

42 papers receiving 2.7k citations

Hit Papers

A secure routing protocol for ad hoc networks 2003 2026 2010 2018 2003 250 500 750

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Clay Shields United States 21 2.3k 1.5k 647 533 386 43 3.1k
Andre Broido United States 13 1.7k 0.7× 1.2k 0.8× 339 0.5× 372 0.7× 275 0.7× 23 2.1k
Frans Kaashoek United States 22 3.7k 1.6× 901 0.6× 685 1.1× 414 0.8× 683 1.8× 31 4.2k
Shiuh‐Pyng Shieh Taiwan 19 1.2k 0.5× 689 0.5× 200 0.3× 503 0.9× 743 1.9× 85 1.7k
Maurizio Matteo Munafò Italy 18 1.3k 0.6× 500 0.3× 295 0.5× 154 0.3× 392 1.0× 66 1.6k
Zihui Ge United States 26 1.8k 0.8× 734 0.5× 292 0.5× 167 0.3× 267 0.7× 79 2.0k
Dirk Balfanz United States 20 1.1k 0.5× 846 0.6× 145 0.2× 385 0.7× 797 2.1× 40 1.9k
Carol Fung United States 22 1.2k 0.5× 656 0.4× 143 0.2× 369 0.7× 424 1.1× 109 1.6k
Kwangjo Kim South Korea 24 1.0k 0.4× 1.4k 0.9× 171 0.3× 294 0.6× 654 1.7× 129 1.9k
Antonio Nucci United States 27 1.3k 0.6× 881 0.6× 402 0.6× 469 0.9× 310 0.8× 72 1.7k
Haowen Chan United States 14 3.1k 1.4× 739 0.5× 376 0.6× 108 0.2× 225 0.6× 19 3.4k

Countries citing papers authored by Clay Shields

Since Specialization
Citations

This map shows the geographic impact of Clay Shields's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Clay Shields with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Clay Shields more than expected).

Fields of papers citing papers by Clay Shields

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Clay Shields. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Clay Shields. The network helps show where Clay Shields may publish in the future.

Co-authorship network of co-authors of Clay Shields

This figure shows the co-authorship network connecting the top 25 collaborators of Clay Shields. A scholar is included among the top collaborators of Clay Shields based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Clay Shields. Clay Shields is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Vaidya, Tavish, Isaac Pedisich, Jingyu Qian, et al.. (2018). DeDoS. 712–722. 5 indexed citations
2.
Vaidya, Tavish, Isaac Pedisich, Jingyu Qian, et al.. (2017). A Demonstration of the DeDoS Platform for Defusing Asymmetric DDoS Attacks in Data Centers. 71–73. 2 indexed citations
3.
Carlini, Nicholas, Pratyush Mishra, Tavish Vaidya, et al.. (2016). Hidden voice commands. USENIX Security Symposium. 513–530. 161 indexed citations
4.
Bates, Adam, Kevin Butler, Micah Sherr, et al.. (2015). Accountable wiretapping – or – I know they can hear you now. Journal of Computer Security. 23(2). 167–195. 3 indexed citations
5.
Bates, Adam, Kevin Butler, Micah Sherr, et al.. (2012). Accountable Wiretapping -or- I know they can hear you now.. Network and Distributed System Security Symposium. 6 indexed citations
6.
Wacek, Chris, Matt Blaze, Boon Thau Loo, et al.. (2012). Collaborative red teaming for anonymity system evaluation. Southern Medical Journal. 60(6). 9–9. 2 indexed citations
7.
Shields, Clay, et al.. (2011). A system for the proactive, continuous, and efficient collection of digital forensic evidence. Digital Investigation. 8. S3–S13. 34 indexed citations
8.
Shields, Clay. (2010). Towards Proactive Forensic Evidentiary Collection. 1–9. 3 indexed citations
9.
Bein, Doina, Linda Morales, Wolfgang Bein, et al.. (2008). Clustering and the Biclique Partition Problem. Hawaii International Conference on System Sciences. 475–475. 6 indexed citations
10.
Heydari, Mohammad, Linda Morales, Clay Shields, & I. Hal Sudborough. (2007). Computing Cross Associations for Attack Graphs and Other Applications. 270b–270b. 4 indexed citations
11.
Brodley, Carla E., et al.. (2004). IP covert timing channels. 178–187. 316 indexed citations
12.
Carrier, Brian D. & Clay Shields. (2003). A recursive session token protocol for use in computer forensics and TCP traceback. 3. 1540–1546. 15 indexed citations
13.
Buchholz, Florian & Clay Shields. (2002). Providing Process Origin Information to Aid in Network Traceback. USENIX Annual Technical Conference. 261–274. 11 indexed citations
14.
Wright, Matthew, Micah Adler, Brian Neil Levine, & Clay Shields. (2002). An Analysis of the Degradation of Anonymous Protocols.. Network and Distributed System Security Symposium. 1–12. 112 indexed citations
15.
Shields, Clay, et al.. (2002). Challenges to automated attack traceback. IT Professional. 4(3). 12–18. 7 indexed citations
16.
Levine, Brian Neil & Clay Shields. (2002). Hordes: a multicast based protocol for anonymity1. Journal of Computer Security. 10(3). 213–240. 64 indexed citations
17.
Shields, Clay, et al.. (2001). Tracing the Source of Network Attack: A Technical, Legal and Societal Problem. 27 indexed citations
18.
Shields, Clay & J.J. Garcia‐Luna‐Aceves. (2000). HIP—a protocol for hierarchical multicast routing. Computer Communications. 23(7). 628–641. 4 indexed citations
19.
Shields, Clay & J.J. Garcia‐Luna‐Aceves. (1998). The HIP protocol for hierarchical multicast routing. 257–266. 21 indexed citations
20.
Shields, Clay. (1996). Ordered Core Based Trees. Defense Technical Information Center (DTIC). 2 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026