David Lie

3.8k total citations · 2 hit papers
66 papers, 2.3k citations indexed

About

David Lie is a scholar working on Artificial Intelligence, Signal Processing and Information Systems. According to data from OpenAlex, David Lie has authored 66 papers receiving a total of 2.3k indexed citations (citations by other indexed papers that have themselves been cited), including 44 papers in Artificial Intelligence, 30 papers in Signal Processing and 22 papers in Information Systems. Recurrent topics in David Lie's work include Security and Verification in Computing (36 papers), Advanced Malware Detection Techniques (30 papers) and Software Testing and Debugging Techniques (13 papers). David Lie is often cited by papers focused on Security and Verification in Computing (36 papers), Advanced Malware Detection Techniques (30 papers) and Software Testing and Debugging Techniques (13 papers). David Lie collaborates with scholars based in Canada, United States and Nigeria. David Lie's co-authors include Zhen Huang, Lionel Litty, Yi Zhou, Mark Horowitz, Chandramohan A. Thekkath, H. Andrés Lagar-Cavilla, Christopher A. Choquette-Choo, Varun Chandrasekaran, Baiwu Zhang and Hengrui Jia and has published in prestigious journals such as ACM Computing Surveys, IEEE Transactions on Computers and Mechanism and Machine Theory.

In The Last Decade

David Lie

66 papers receiving 2.1k citations

Hit Papers

PScout 2012 2026 2016 2021 2012 2021 100 200 300 400

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
David Lie Canada 20 1.2k 1.2k 1.1k 828 544 66 2.3k
Yan Shoshitaishvili United States 20 1.1k 0.9× 1.7k 1.4× 1.1k 1.0× 604 0.7× 1.1k 2.1× 61 2.5k
Yulei Sui Australia 27 1.0k 0.8× 1.0k 0.8× 1.3k 1.2× 580 0.7× 1.1k 1.9× 120 2.3k
Aurélien Francillon France 21 1.1k 0.9× 1.2k 1.0× 584 0.5× 637 0.8× 347 0.6× 55 1.8k
Brendan Dolan-Gavitt United States 19 1.2k 1.0× 892 0.7× 769 0.7× 504 0.6× 404 0.7× 33 2.1k
Kehuan Zhang Hong Kong 23 1.1k 0.9× 1.3k 1.1× 1.0k 1.0× 812 1.0× 202 0.4× 56 2.1k
Kun Sun United States 28 950 0.8× 908 0.7× 914 0.9× 1.4k 1.7× 127 0.2× 135 2.3k
Galen Hunt United States 22 1.4k 1.1× 629 0.5× 1.1k 1.0× 1.6k 1.9× 212 0.4× 47 2.5k
Michael Pradel Germany 33 818 0.7× 823 0.7× 2.1k 1.9× 887 1.1× 1.9k 3.5× 115 3.0k
John Viega United States 18 706 0.6× 511 0.4× 817 0.8× 374 0.5× 272 0.5× 37 1.5k
Binyu Zang China 30 1.5k 1.2× 928 0.8× 1.7k 1.6× 1.8k 2.1× 178 0.3× 131 3.1k

Countries citing papers authored by David Lie

Since Specialization
Citations

This map shows the geographic impact of David Lie's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by David Lie with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites David Lie more than expected).

Fields of papers citing papers by David Lie

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by David Lie. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by David Lie. The network helps show where David Lie may publish in the future.

Co-authorship network of co-authors of David Lie

This figure shows the co-authorship network connecting the top 25 collaborators of David Lie. A scholar is included among the top collaborators of David Lie based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with David Lie. David Lie is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Yang, Mingyue, David Lie, & Nicolas Papernot. (2024). Exploring Strategies for Guiding Symbolic Analysis with Machine Learning Prediction. 659–669. 1 indexed citations
2.
Austin, Lisa M. & David Lie. (2021). Data Trusts and the Governance of Smart Environments: Lessons from the Failure of Sidewalk Labs’ Urban Data Trust. Surveillance & Society. 19(2). 255–261. 15 indexed citations
3.
Peddinti, Sai Teja, et al.. (2021). A Large Scale Study of User Behavior, Expectations and Engagement with Android Permissions. USENIX Security Symposium. 803–820. 7 indexed citations
4.
Yang, Mingyue, David Lie, & Nicolas Papernot. (2021). Accelerating Symbolic Analysis for Android Apps. 47–52. 1 indexed citations
6.
Austin, Lisa M. & David Lie. (2019). Safe Sharing Sites. SSRN Electronic Journal. 1 indexed citations
7.
Huang, Zhen, David Lie, Gang Tan, & Trent Jaeger. (2019). Using Safety Properties to Generate Vulnerability Patches. 539–554. 49 indexed citations
8.
Huang, Wei, et al.. (2019). Using Inputs and Context to Verify User Intentions in Internet Services. 76–83. 3 indexed citations
9.
Lie, David, et al.. (2018). Tackling runtime-based obfuscation in Android with {TIRO}. USENIX Security Symposium. 1247–1262. 25 indexed citations
10.
Austin, Lisa M., et al.. (2018). Towards Dynamic Transparency: The AppTrans (Transparency for Android Applications) Project. SSRN Electronic Journal. 1 indexed citations
11.
Zhou, Yi, et al.. (2012). PScout. 217–228. 477 indexed citations breakdown →
12.
Lie, David, et al.. (2012). Auditing cloud management using information flow tracking. 79–84. 9 indexed citations
13.
Gill, Phillipa, Yashar Ganjali, Bernard Wong, & David Lie. (2010). Dude, where’s that IP?: circumventing measurement-based IP geolocation. USENIX Security Symposium. 16–16. 38 indexed citations
14.
Lie, David & Cheng-Kuo Sung. (2009). Synchronous brake analysis for a bicycle. Mechanism and Machine Theory. 45(4). 543–554. 11 indexed citations
15.
Litty, Lionel, H. Andrés Lagar-Cavilla, & David Lie. (2008). Hypervisor support for identifying covertly executing binaries. USENIX Security Symposium. 243–258. 135 indexed citations
16.
Gurfinkel, Arie, et al.. (2008). PtYasm: Software Model Checking with Proof Templates. 2304. 479–480. 3 indexed citations
17.
Litty, Lionel, et al.. (2006). Splitting interfaces: making trust between applications and operating systems configurable. Operating Systems Design and Implementation. 279–292. 119 indexed citations
18.
Litty, Lionel, et al.. (2006). Using VMM-based sensors to monitor honeypots. 13–23. 38 indexed citations
19.
Lie, David, Chandramohan A. Thekkath, & Mark Horowitz. (2002). Separating Protection and Resource Management in Operating Systems. 1 indexed citations
20.
Lie, David, Chandramohan A. Thekkath, Mark L. Mitchell, et al.. (2000). Architectural support for copy and tamper resistant software. ACM SIGPLAN Notices. 35(11). 168–177. 92 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026