Derui Wang

1.5k total citations · 1 hit paper
29 papers, 770 citations indexed

About

Derui Wang is a scholar working on Artificial Intelligence, Computer Networks and Communications and Signal Processing. According to data from OpenAlex, Derui Wang has authored 29 papers receiving a total of 770 indexed citations (citations by other indexed papers that have themselves been cited), including 17 papers in Artificial Intelligence, 8 papers in Computer Networks and Communications and 7 papers in Signal Processing. Recurrent topics in Derui Wang's work include Adversarial Robustness in Machine Learning (9 papers), Network Security and Intrusion Detection (5 papers) and Advanced Malware Detection Techniques (5 papers). Derui Wang is often cited by papers focused on Adversarial Robustness in Machine Learning (9 papers), Network Security and Intrusion Detection (5 papers) and Advanced Malware Detection Techniques (5 papers). Derui Wang collaborates with scholars based in Australia, China and United States. Derui Wang's co-authors include ‪Surya Nepal‬, Sheng Wen, Yang Xiang, Shiping Chen, Damith C. Ranasinghe, Yansong Gao, Chaoran Li, Xiao Chen, Jun Zhang and Kui Ren and has published in prestigious journals such as Marine Pollution Bulletin, Australasian Journal of Paramedicine and IEEE Transactions on Cybernetics.

In The Last Decade

Derui Wang

23 papers receiving 749 citations

Hit Papers

STRIP 2019 2026 2021 2023 2019 100 200 300

Author Peers

Peers are selected by citation overlap in the author's most active subfields. citations · hero ref

Author Last Decade Papers Cites
Derui Wang 539 323 239 145 114 29 770
Mohamad Fadli Zolkipli 452 0.8× 326 1.0× 472 2.0× 190 1.3× 222 1.9× 50 817
Yuanshun Yao 927 1.7× 317 1.0× 190 0.8× 238 1.6× 126 1.1× 11 1.1k
Ahmed Abusnaina 359 0.7× 247 0.8× 240 1.0× 61 0.4× 107 0.9× 27 550
Yousra Aafer 919 1.7× 516 1.6× 263 1.1× 204 1.4× 215 1.9× 25 1.2k
Ambra Demontis 484 0.9× 203 0.6× 115 0.5× 55 0.4× 60 0.5× 25 587
Zhongshu Gu 569 1.1× 337 1.0× 325 1.4× 194 1.3× 317 2.8× 25 880
Xuhong Zhang 235 0.4× 111 0.3× 151 0.6× 67 0.5× 132 1.2× 85 502
Hisham Alasmary 290 0.5× 251 0.8× 413 1.7× 43 0.3× 245 2.1× 44 691
Xinyun Chen 455 0.8× 100 0.3× 84 0.4× 106 0.7× 105 0.9× 39 622
Danish Vasan 407 0.8× 662 2.0× 608 2.5× 97 0.7× 276 2.4× 13 882

Countries citing papers authored by Derui Wang

Since Specialization
Citations

This map shows the geographic impact of Derui Wang's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Derui Wang with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Derui Wang more than expected).

Fields of papers citing papers by Derui Wang

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Derui Wang. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Derui Wang. The network helps show where Derui Wang may publish in the future.

Co-authorship network of co-authors of Derui Wang

This figure shows the co-authorship network connecting the top 25 collaborators of Derui Wang. A scholar is included among the top collaborators of Derui Wang based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Derui Wang. Derui Wang is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Ye, Dayong, Tianqing Zhu, Derui Wang, et al.. (2025). Reinforcement Unlearning.
2.
Ma, Wanlun, Derui Wang, Yiliao Song, et al.. (2025). TrapNet: Model Inversion Defense via Trapdoor. IEEE Transactions on Information Forensics and Security. 20. 4469–4483.
3.
Wang, Derui, et al.. (2025). Provably Unlearnable Data Examples. 1 indexed citations
4.
Chen, Huajie, Tianqing Zhu, Lefeng Zhang, et al.. (2025). QUEEN: Query Unlearning Against Model Extraction. IEEE Transactions on Information Forensics and Security. 20. 2143–2156. 2 indexed citations
5.
Zhang, Yuexin, et al.. (2025). Anonymous and Efficient (t, n)-Threshold Ownership Transfer for Cloud EMRs Auditing. IEEE Transactions on Information Forensics and Security. 20. 1710–1723.
6.
Cao, Yuxin, et al.. (2024). LogoStyleFool: Vitiating Video Recognition Systems via Logo Style Transfer. Proceedings of the AAAI Conference on Artificial Intelligence. 38(2). 945–953. 3 indexed citations
7.
Zhang, Hui, Yaxi Li, Zhen Lu, et al.. (2024). Seasonal distribution of caffeine in the Bohai Sea, Yellow Sea, and estuaries of Yantai City, China. Marine Pollution Bulletin. 199. 116008–116008. 1 indexed citations
8.
Cao, Yuxin, Xi Xiao, Derui Wang, et al.. (2024). LocalStyleFool: Regional Video Style Transfer Attack Using Segment Anything Model. 48–56. 1 indexed citations
9.
Wang, Derui, et al.. (2024). Endogenous Merger Decisions Among Competitors: Impact of Limited Capacity and Loyal Segments. SSRN Electronic Journal. 1 indexed citations
10.
Ma, Wanlun, et al.. (2024). LocGuard: A Location Privacy Defender for Image Sharing. IEEE Transactions on Dependable and Secure Computing. 21(6). 5526–5537. 3 indexed citations
12.
Ma, Wanlun, Derui Wang, Ruoxi Sun, et al.. (2023). The "Beatrix" Resurrections: Robust Backdoor Detection via Gram Matrices. 33 indexed citations
13.
Cao, Yuxin, et al.. (2023). StyleFool: Fooling Video Classification Systems via Style Transfer. 1631–1648. 14 indexed citations
14.
Wang, Derui, Chaoran Li, Sheng Wen, et al.. (2021). Daedalus: Breaking Nonmaximum Suppression in Object Detection via Adversarial Examples. IEEE Transactions on Cybernetics. 52(8). 7427–7440. 54 indexed citations
15.
Li, Chaoran, Xiao Chen, Derui Wang, et al.. (2021). Backdoor Attack on Machine Learning Based Android Malware Detectors. IEEE Transactions on Dependable and Secure Computing. 19(5). 3357–3370. 34 indexed citations
16.
Wang, Derui, Chaoran Li, Sheng Wen, ‪Surya Nepal‬, & Yang Xiang. (2020). Defending Against Adversarial Attack Towards Deep Neural Networks Via Collaborative Multi-Task Training. IEEE Transactions on Dependable and Secure Computing. 19(2). 953–965. 24 indexed citations
17.
Chen, Xiao, Chaoran Li, Derui Wang, et al.. (2018). Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection. arXiv (Cornell University). 220 indexed citations
18.
Wang, Derui & Zhongmin Wang. (2017). An investigation on the influencing factors of second child fertility willingness in Dalian. Chin J Postgrad Med. 40(10). 879–883.
19.
Wang, Derui, Sheng Wen, Yang Xiang, et al.. (2017). Catch Me If You Can: Detecting Compromised Users Through Partial Observation on Networks. Swinburne Research Bank (Swinburne University of Technology). 2417–2422. 3 indexed citations
20.
Wang, Derui, Tingmin Wu, Sheng Wen, et al.. (2017). STC: Exposing Hidden Compromised Devices in Networked Sustainable Green Smart Computing Platforms by Partial Observation. IEEE Transactions on Sustainable Computing. 4(2). 178–190. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026