Donghong Sun

438 total citations
34 papers, 298 citations indexed

About

Donghong Sun is a scholar working on Artificial Intelligence, Computer Networks and Communications and Information Systems. According to data from OpenAlex, Donghong Sun has authored 34 papers receiving a total of 298 indexed citations (citations by other indexed papers that have themselves been cited), including 15 papers in Artificial Intelligence, 14 papers in Computer Networks and Communications and 12 papers in Information Systems. Recurrent topics in Donghong Sun's work include Network Security and Intrusion Detection (8 papers), Advanced Malware Detection Techniques (7 papers) and Topic Modeling (5 papers). Donghong Sun is often cited by papers focused on Network Security and Intrusion Detection (8 papers), Advanced Malware Detection Techniques (7 papers) and Topic Modeling (5 papers). Donghong Sun collaborates with scholars based in China, United States and Australia. Donghong Sun's co-authors include Guohua Liu, Zhijian Lin, Shan Chang, Di Cao, Guoguang Zhao, Cheng Ling, Wu Liu, Ping Ren, Haixin Duan and Zhou Li and has published in prestigious journals such as Neurocomputing, IEEE Transactions on Dependable and Secure Computing and International Journal of Experimental Pathology.

In The Last Decade

Donghong Sun

34 papers receiving 291 citations

Peers

Donghong Sun
Amrita Roy Chowdhury United States
Xu Ma China
Ali Shahin Shamsabadi United Kingdom
Ahoud Alhazmi Australia
Donghong Sun
Citations per year, relative to Donghong Sun Donghong Sun (= 1×) peers Yaqiong Qiao

Countries citing papers authored by Donghong Sun

Since Specialization
Citations

This map shows the geographic impact of Donghong Sun's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Donghong Sun with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Donghong Sun more than expected).

Fields of papers citing papers by Donghong Sun

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Donghong Sun. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Donghong Sun. The network helps show where Donghong Sun may publish in the future.

Co-authorship network of co-authors of Donghong Sun

This figure shows the co-authorship network connecting the top 25 collaborators of Donghong Sun. A scholar is included among the top collaborators of Donghong Sun based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Donghong Sun. Donghong Sun is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Li, Yitao, et al.. (2025). CodeSAGE: A multi-feature fusion vulnerability detection approach using code attribute graphs and attention mechanisms. Journal of Information Security and Applications. 89. 103973–103973. 1 indexed citations
2.
Zhang, Ling, Xin Xu, Donghong Sun, et al.. (2025). Silencing long non‐coding RNA linc00689 suppresses the growth and invasion of osteosarcoma cells by targeting miR‐129‐5p/NUSAP1. International Journal of Experimental Pathology. 106(2). e12524–e12524. 1 indexed citations
3.
Zhang, Yiming, Chao Zhang, Zhou Li, et al.. (2022). Automatic Generation of Adversarial Readable Chinese Texts. IEEE Transactions on Dependable and Secure Computing. 20(2). 1756–1770. 3 indexed citations
4.
Zhang, Zihan, Ning Shi, Bo Yuan, et al.. (2022). RoChBert: Towards Robust BERT Fine-tuning for Chinese. 3502–3516. 3 indexed citations
5.
Zhang, Yiming, et al.. (2021). Detecting and Characterizing SMS Spearphishing Attacks. Annual Computer Security Applications Conference. 930–943. 15 indexed citations
6.
Liu, Guohua, et al.. (2020). How to Keep an Online Learning Chatbot From Being Corrupted. 2018 janua. 1–8. 3 indexed citations
7.
Cao, Di, Shan Chang, Zhijian Lin, Guohua Liu, & Donghong Sun. (2019). Understanding Distributed Poisoning Attack in Federated Learning. 233–239. 165 indexed citations
8.
Ren, Ping, Wu Liu, Donghong Sun, Jianping Wu, & Ke Liu. (2016). Analysis and forensics for Behavior Characteristics of Malware in Internet. 3. 637–641. 2 indexed citations
10.
Zhao, Guoguang, Cheng Ling, & Donghong Sun. (2015). SparkSW: Scalable Distributed Computing System for Large-Scale Biological Sequence Alignment. 18. 845–852. 24 indexed citations
11.
Wang, Longhui, Guoguang Zhao, & Donghong Sun. (2015). Modeling Documents with Event Model. Algorithms. 8(3). 562–572. 1 indexed citations
12.
Sun, Donghong, et al.. (2014). A detection method of subliminal channel based on VoIP communication. 37–41. 2 indexed citations
13.
Sun, Donghong, et al.. (2012). Study on Man-in-the-Middle Attack and Defending Techniques in IPv6 Network. 3275–3278. 1 indexed citations
14.
Liu, Wu, et al.. (2012). Study on Anti-Attack Model for Low-Latency Anonymous Communication System. 327–328. 2 indexed citations
16.
Liu, Wu, Ping Ren, Donghong Sun, Yawei Zhao, & Jian Wu. (2012). Protocol Analysis and Online Forensics in IPv6 Network Environment. 11. 1–4. 1 indexed citations
17.
Liu, Wu, et al.. (2012). Mobile Intelligent Terminal Based Remote Monitoring and Management System. 25. 56–59. 2 indexed citations
18.
Sun, Donghong, Li Liu, Peng Zhang, Xingquan Zhu, & Yong Shi. (2011). Decision Rule Extraction for Regularized Multiple Criteria Linear Programming Model. International Journal of Data Warehousing and Mining. 7(3). 88–101. 2 indexed citations
19.
Sun, Donghong. (2008). With features of simulation,constructing comprehensive experiment teaching center of thermal energy and power engineering specialty. 1 indexed citations
20.
Zhang, Guodong, et al.. (2008). A LDCT Image Contrast Enhancement Algorithm Based on Single-Scale Retinex Theory. 13. 1282–1287. 6 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026