Dave Tian

1.1k total citations
44 papers, 701 citations indexed

About

Dave Tian is a scholar working on Artificial Intelligence, Signal Processing and Computer Networks and Communications. According to data from OpenAlex, Dave Tian has authored 44 papers receiving a total of 701 indexed citations (citations by other indexed papers that have themselves been cited), including 29 papers in Artificial Intelligence, 26 papers in Signal Processing and 19 papers in Computer Networks and Communications. Recurrent topics in Dave Tian's work include Security and Verification in Computing (26 papers), Advanced Malware Detection Techniques (26 papers) and Network Security and Intrusion Detection (7 papers). Dave Tian is often cited by papers focused on Security and Verification in Computing (26 papers), Advanced Malware Detection Techniques (26 papers) and Network Security and Intrusion Detection (7 papers). Dave Tian collaborates with scholars based in United States, South Korea and China. Dave Tian's co-authors include Kevin Butler, Adam Bates, Thomas Moyer, Patrick Traynor, Dongyan Xu, Antonio Bianchi, Nolen Scaife, Bradley Reaves, Kevin Liao and Christopher W. Fletcher and has published in prestigious journals such as Communications of the ACM, IEEE Transactions on Software Engineering and IEEE Transactions on Information Forensics and Security.

In The Last Decade

Dave Tian

41 papers receiving 683 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Dave Tian United States 16 353 344 322 311 80 44 701
Yonghwi Kwon United States 16 324 0.9× 273 0.8× 271 0.8× 299 1.0× 37 0.5× 50 591
Anh Nguyen‐Tuong United States 13 415 1.2× 466 1.4× 241 0.7× 451 1.5× 183 2.3× 42 799
Junghwan Rhee United States 19 595 1.7× 914 2.7× 655 2.0× 591 1.9× 162 2.0× 61 1.3k
Sangho Lee United States 14 425 1.2× 282 0.8× 332 1.0× 709 2.3× 197 2.5× 39 917
Syed Rafiul Hussain United States 14 154 0.4× 471 1.4× 185 0.6× 253 0.8× 36 0.5× 33 704
Yueqiang Cheng United States 14 418 1.2× 255 0.7× 177 0.5× 563 1.8× 150 1.9× 46 731
Hong Hu China 13 451 1.3× 216 0.6× 240 0.7× 476 1.5× 82 1.0× 41 700
Mario Polino Italy 9 581 1.6× 243 0.7× 332 1.0× 401 1.3× 120 1.5× 23 877
Salmin Sultana United States 14 108 0.3× 362 1.1× 215 0.7× 162 0.5× 23 0.3× 23 580

Countries citing papers authored by Dave Tian

Since Specialization
Citations

This map shows the geographic impact of Dave Tian's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Dave Tian with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Dave Tian more than expected).

Fields of papers citing papers by Dave Tian

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Dave Tian. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Dave Tian. The network helps show where Dave Tian may publish in the future.

Co-authorship network of co-authors of Dave Tian

This figure shows the co-authorship network connecting the top 25 collaborators of Dave Tian. A scholar is included among the top collaborators of Dave Tian based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Dave Tian. Dave Tian is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
2.
Okhravi, Hamed, et al.. (2024). Security Challenges of Intent-Based Networking. Communications of the ACM. 67(7). 56–65. 2 indexed citations
3.
Xu, Dongyan, et al.. (2024). SoK: The Long Journey of Exploiting and Defending the Legacy of King Harald Bluetooth. 2847–228066. 4 indexed citations
5.
Butler, Kevin, et al.. (2022). ENCIDER: Detecting Timing and Cache Side Channels in SGX Enclaves and Cryptographic APIs. IEEE Transactions on Dependable and Secure Computing. 20(2). 1577–1595. 9 indexed citations
6.
Kim, Kyung‐Tae, Taegyu Kim, Byoungyoung Lee, et al.. (2022). FuzzUSB: Hybrid Stateful Fuzzing of USB Gadget Stacks. 2212–2229. 11 indexed citations
7.
Tian, Dave, et al.. (2021). Towards Improving Container Security by Preventing Runtime Escapes. OSTI OAI (U.S. Department of Energy Office of Scientific and Technical Information). 38–46. 15 indexed citations
8.
Kim, Hyungsub, et al.. (2021). {M2MON}: Building an {MMIO-based} Security Reference Monitor for Unmanned Vehicles. USENIX Security Symposium. 285–302. 7 indexed citations
9.
Tian, Dave, Kristopher Micinski, Anurag Yadav, et al.. (2020). {BigMAC}: {Fine-Grained} Policy Analysis of Android Firmware. USENIX Security Symposium. 271–287. 8 indexed citations
10.
Kim, Kyung‐Tae, Chung Hwan Kim, Junghwan Rhee, et al.. (2020). Vessels. 462–476. 26 indexed citations
11.
Nan, Yuhong, et al.. (2020). BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy.. 14 indexed citations
12.
Datta, Pubali, Wajih Ul Hassan, Adam Bates, et al.. (2020). Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution. 42 indexed citations
13.
Liao, Kevin, et al.. (2020). Logging to the Danger Zone: Race Condition Attacks and Defenses on System Audit Frameworks. 1551–1574. 29 indexed citations
14.
Tian, Dave, et al.. (2019). ProXray: Protocol Model Learning and Guided Firmware Analysis. IEEE Transactions on Software Engineering. 1–1. 8 indexed citations
15.
Tian, Dave, et al.. (2017). Securing ARP/NDP From the Ground Up. IEEE Transactions on Information Forensics and Security. 12(9). 2131–2143. 12 indexed citations
16.
Tian, Dave, et al.. (2017). FirmUSB. arXiv (Cornell University). 2245–2262. 58 indexed citations
17.
Tian, Dave, Nolen Scaife, Adam Bates, Kevin Butler, & Patrick Traynor. (2016). Making {USB} Great Again with {USBFILTER}. USENIX Security Symposium. 415–430. 22 indexed citations
18.
Reaves, Bradley, et al.. (2016). Detecting SMS Spam in the Age of Legitimate Bulk Messaging. 165–170. 20 indexed citations
19.
Reaves, Bradley, et al.. (2016). Sending Out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways. 339–356. 34 indexed citations
20.
Bates, Adam, Dave Tian, Kevin Butler, & Thomas Moyer. (2015). Trustworthy whole-system provenance for the Linux kernel. USENIX Security Symposium. 319–334. 111 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026