Gauhar Ali

655 total citations
33 papers, 362 citations indexed

About

Gauhar Ali is a scholar working on Information Systems, Electrical and Electronic Engineering and Computer Networks and Communications. According to data from OpenAlex, Gauhar Ali has authored 33 papers receiving a total of 362 indexed citations (citations by other indexed papers that have themselves been cited), including 13 papers in Information Systems, 11 papers in Electrical and Electronic Engineering and 10 papers in Computer Networks and Communications. Recurrent topics in Gauhar Ali's work include Blockchain Technology Applications and Security (6 papers), Vehicular Ad Hoc Networks (VANETs) (5 papers) and Network Security and Intrusion Detection (4 papers). Gauhar Ali is often cited by papers focused on Blockchain Technology Applications and Security (6 papers), Vehicular Ad Hoc Networks (VANETs) (5 papers) and Network Security and Intrusion Detection (4 papers). Gauhar Ali collaborates with scholars based in Saudi Arabia, Pakistan and China. Gauhar Ali's co-authors include Naveed Ahmad, Yue Cao, Haitham Cruickshank, Mohammed ElAffendi, Muhammad Asif, Inayat Khan, Waheed ur Rehman, Saeed Ur Rahman, Inam Ullah and Mosleh Hmoud Al-Adhaileh and has published in prestigious journals such as SHILAP Revista de lepidopterología, PLoS ONE and Scientific Reports.

In The Last Decade

Gauhar Ali

29 papers receiving 350 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Gauhar Ali Saudi Arabia 10 191 184 122 86 40 33 362
Dawei Li China 12 267 1.4× 144 0.8× 157 1.3× 71 0.8× 45 1.1× 61 432
Chuang Ma China 14 199 1.0× 150 0.8× 202 1.7× 61 0.7× 78 1.9× 44 456
Filipe Araújo Portugal 14 176 0.9× 393 2.1× 101 0.8× 57 0.7× 38 0.9× 69 543
Ao Xiong China 11 159 0.8× 222 1.2× 109 0.9× 116 1.3× 24 0.6× 46 411
Zhuoqun Xia China 12 92 0.5× 177 1.0× 129 1.1× 133 1.5× 30 0.8× 41 366
Xuewen Dong China 15 314 1.6× 229 1.2× 236 1.9× 73 0.8× 28 0.7× 70 551
Alexios Lekidis Greece 12 117 0.6× 199 1.1× 141 1.2× 120 1.4× 23 0.6× 37 392
Zohaib Latif China 11 133 0.7× 349 1.9× 92 0.8× 131 1.5× 15 0.4× 23 515
A. Amuthan India 12 77 0.4× 162 0.9× 194 1.6× 98 1.1× 47 1.2× 45 381

Countries citing papers authored by Gauhar Ali

Since Specialization
Citations

This map shows the geographic impact of Gauhar Ali's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Gauhar Ali with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Gauhar Ali more than expected).

Fields of papers citing papers by Gauhar Ali

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Gauhar Ali. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Gauhar Ali. The network helps show where Gauhar Ali may publish in the future.

Co-authorship network of co-authors of Gauhar Ali

This figure shows the co-authorship network connecting the top 25 collaborators of Gauhar Ali. A scholar is included among the top collaborators of Gauhar Ali based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Gauhar Ali. Gauhar Ali is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Ahmad, Naved, et al.. (2025). Optimizing IoT intrusion detection with cosine similarity based dataset balancing and hybrid deep learning. Scientific Reports. 15(1). 30939–30939. 3 indexed citations
2.
Chandra, Shalini, et al.. (2025). AndroMD: An Android malware detection framework based on source code analysis and permission scanning. Results in Engineering. 28. 107050–107050.
3.
Ali, Gauhar, Sajid Shah, & Mohammed ElAffendi. (2025). Enhancing cybersecurity incident response: AI-driven optimization for strengthened advanced persistent threat detection. Results in Engineering. 25. 104078–104078. 7 indexed citations
4.
Hadi, Hassan Jalil, et al.. (2024). Securing Blockchain-Based Supply Chain Management: Textual Data Encryption and Access Control. SHILAP Revista de lepidopterología. 12(7). 110–110. 4 indexed citations
5.
He, Jianbiao, et al.. (2024). GaitSTAR: Spatial–Temporal Attention-Based Feature-Reweighting Architecture for Human Gait Recognition. Mathematics. 12(16). 2458–2458. 2 indexed citations
6.
Ahmad, Arshad, et al.. (2024). Classification and Comprehension of Software Requirements Using Ensemble Learning. Computers, materials & continua/Computers, materials & continua (Print). 80(2). 2839–2855. 2 indexed citations
7.
Muhammad, Arshad, et al.. (2024). A Resource Aware Memory Requirement Calculation Model for Memory Constrained Context-Aware Systems. IEEE Access. 12. 19320–19329.
8.
Liu, Yuanchao, et al.. (2023). Robust Benchmark for Propagandist Text Detection and Mining High-Quality Data. Mathematics. 11(12). 2668–2668. 8 indexed citations
9.
Al-kahtani, Mohammed S., et al.. (2023). Intrusion Detection in the Internet of Things Using Fusion of GRU-LSTM Deep Learning Model. Intelligent Automation & Soft Computing. 37(2). 2279–2290. 21 indexed citations
10.
ElAffendi, Mohammed, et al.. (2023). A Method for Predicting the Visual Attention Area in Real-Time Using Evolving Neuro-Fuzzy Models. Electronics. 12(10). 2243–2243. 1 indexed citations
11.
Khan, Inayat, et al.. (2023). NPR-LBN: next point of interest recommendation using large bipartite networks with edge and cloud computing. Journal of Cloud Computing Advances Systems and Applications. 12(1). 5 indexed citations
12.
Abrar, Muhammad Faisal, Muhammad Sohail Khan, Inayat Khan, Gauhar Ali, & Sajid Shah. (2023). Digital Information Credibility: Towards a Set of Guidelines for Quality Assessment of Grey Literature in Multivocal Literature Review. Applied Sciences. 13(7). 4483–4483. 3 indexed citations
13.
Ali, Gauhar, Mohammed ElAffendi, & Naveed Ahmad. (2023). BlockAuth: A blockchain-based framework for secure vehicle authentication and authorization. PLoS ONE. 18(9). e0291596–e0291596. 8 indexed citations
14.
Ali, Gauhar, et al.. (2023). Hardware Trojan Mitigation Technique in Network-on-Chip (NoC). Micromachines. 14(4). 828–828. 3 indexed citations
15.
Akhtar, Sohail, et al.. (2022). Rating Batters in Test Cricket. Mathematical Problems in Engineering. 2022. 1–10.
16.
Rahman, Saeed Ur, Inam Ullah, Inayat Khan, et al.. (2022). A UAV-Swarm-Communication Model Using a Machine-Learning Approach for Search-and-Rescue Applications. Drones. 6(12). 372–372. 38 indexed citations
17.
Ashfaq, Tehreem, Muhammad Irfan Khalid, Gauhar Ali, et al.. (2022). An Efficient and Secure Energy Trading Approach with Machine Learning Technique and Consortium Blockchain. Sensors. 22(19). 7263–7263. 20 indexed citations
18.
Ali, Gauhar, et al.. (2020). xDBAuth: Blockchain Based Cross Domain Authentication and Authorization Framework for Internet of Things. IEEE Access. 8. 58800–58816. 66 indexed citations
19.
Ahmad, Naveed, et al.. (2019). ASPA: Advanced Strong Pseudonym based Authentication in Intelligent Transport System. PLoS ONE. 14(8). e0221213–e0221213. 11 indexed citations
20.
Ali, Gauhar, et al.. (2019). Blockchain based permission delegation and access control in Internet of Things (BACI). Computers & Security. 86. 318–334. 66 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026