Gaurav Varshney

411 total citations
28 papers, 276 citations indexed

About

Gaurav Varshney is a scholar working on Information Systems, Signal Processing and Computer Networks and Communications. According to data from OpenAlex, Gaurav Varshney has authored 28 papers receiving a total of 276 indexed citations (citations by other indexed papers that have themselves been cited), including 20 papers in Information Systems, 14 papers in Signal Processing and 8 papers in Computer Networks and Communications. Recurrent topics in Gaurav Varshney's work include Spam and Phishing Detection (16 papers), Advanced Malware Detection Techniques (12 papers) and User Authentication and Security Systems (10 papers). Gaurav Varshney is often cited by papers focused on Spam and Phishing Detection (16 papers), Advanced Malware Detection Techniques (12 papers) and User Authentication and Security Systems (10 papers). Gaurav Varshney collaborates with scholars based in India, United States and Ireland. Gaurav Varshney's co-authors include Manoj Misra, Pradeep K. Atrey, Sanjeev Kumar Shukla, Sushil Kumar, V. K. Katiyar, Pudhari Srilatha, K.V. Nagaraja, K. Vinutha, K. Chandan and J. K. Madhukesh and has published in prestigious journals such as Computers & Security, Journal of Computer Information Systems and Journal of Information Security and Applications.

In The Last Decade

Gaurav Varshney

25 papers receiving 261 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Gaurav Varshney India 8 216 130 94 71 34 28 276
Faiza Medjek Algeria 8 55 0.3× 48 0.4× 39 0.4× 273 3.8× 16 0.5× 10 356
Nabil Djedjig Algeria 8 55 0.3× 45 0.3× 37 0.4× 270 3.8× 18 0.5× 9 355
Minghong Fang United States 8 65 0.3× 15 0.1× 172 1.8× 34 0.5× 14 0.4× 22 215
Mohammad Masudur Rahman Bangladesh 9 41 0.2× 7 0.1× 40 0.4× 45 0.6× 34 1.0× 29 177
Y. Sreenivasa Rao India 5 92 0.4× 4 0.0× 100 1.1× 61 0.9× 48 1.4× 12 186
Shafique Ahmad Chaudhry Oman 8 82 0.4× 34 0.3× 35 0.4× 185 2.6× 11 0.3× 22 250
Andrew J. Kalafut United States 11 74 0.3× 59 0.5× 139 1.5× 177 2.5× 9 0.3× 20 253
Ashraf Masood Pakistan 9 89 0.4× 17 0.1× 53 0.6× 175 2.5× 15 0.4× 18 240
Mohit Kumar India 7 68 0.3× 34 0.3× 63 0.7× 41 0.6× 10 0.3× 30 170
Jabeen Nazeer Saudi Arabia 8 31 0.1× 28 0.2× 42 0.4× 64 0.9× 15 0.4× 33 167

Countries citing papers authored by Gaurav Varshney

Since Specialization
Citations

This map shows the geographic impact of Gaurav Varshney's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Gaurav Varshney with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Gaurav Varshney more than expected).

Fields of papers citing papers by Gaurav Varshney

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Gaurav Varshney. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Gaurav Varshney. The network helps show where Gaurav Varshney may publish in the future.

Co-authorship network of co-authors of Gaurav Varshney

This figure shows the co-authorship network connecting the top 25 collaborators of Gaurav Varshney. A scholar is included among the top collaborators of Gaurav Varshney based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Gaurav Varshney. Gaurav Varshney is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Varshney, Gaurav, et al.. (2025). A passwordless MFA utilizing biometrics, proximity, and contactless communication. Information Security Journal A Global Perspective. 34(6). 633–654.
2.
Varshney, Gaurav, et al.. (2025). Poster Abstract: SRAM PUF-Based Logic Locking for Secure Authentication and IP Protection. 660–661. 1 indexed citations
3.
Shukla, Sanjeev Kumar, Manoj Misra, & Gaurav Varshney. (2024). Counting Malicious Host Behind NAT Using Ensemble Machine Learning Approach. 20–24.
4.
Shukla, Sanjeev Kumar, Manoj Misra, & Gaurav Varshney. (2024). Email bombing attack detection and mitigation using machine learning. International Journal of Information Security. 23(4). 2939–2949. 1 indexed citations
5.
Shukla, Sanjeev Kumar, Manoj Misra, & Gaurav Varshney. (2023). HTTP header based phishing attack detection using machine learning. Transactions on Emerging Telecommunications Technologies. 35(1). 10 indexed citations
6.
Kaur, Harkeerat, et al.. (2021). Pseudo-Biometric Identity Framework: Achieving Self-Sovereignity for Biometrics on Blockchain. 2021 IEEE International Conference on Systems, Man, and Cybernetics (SMC). 945–951. 7 indexed citations
7.
Varshney, Gaurav, et al.. (2021). Evading DoH via Live Memory Forensics for Phishing Detection and Content Filtering. 1–4. 6 indexed citations
8.
Shukla, Sanjeev Kumar, Manoj Misra, & Gaurav Varshney. (2020). Identification of Spoofed Emails by applying Email Forensics and Memory Forensics. 109–114. 5 indexed citations
9.
Singh, Deepti, et al.. (2020). IntelliSpect: Personal Information Search Tool. 556–561. 1 indexed citations
10.
Misra, Manoj, et al.. (2020). Secure and User Efficient EAP-based Authentication Protocol for IEEE 802.11 Wireless LANs. Research Repository UCD (University College Dublin). 576–584. 5 indexed citations
11.
Varshney, Gaurav, Manoj Misra, & Pradeep K. Atrey. (2018). Secure authentication scheme to thwart RT MITM, CR MITM and malicious browser extension based phishing attacks. Journal of Information Security and Applications. 42. 1–17. 9 indexed citations
12.
Varshney, Gaurav, Manoj Misra, & Pradeep K. Atrey. (2017). A new secure authentication scheme for web login using BLE smart devices. 95–98. 2 indexed citations
13.
Atrey, Pradeep K., et al.. (2017). Email spoofing detection using volatile memory forensics. 14. 619–625. 8 indexed citations
14.
Varshney, Gaurav, Manoj Misra, & Pradeep K. Atrey. (2017). Browshing a new way of phishing using a malicious browser extension. 2017 Innovations in Power and Advanced Computing Technologies (i-PACT). 1–5. 6 indexed citations
15.
Varshney, Gaurav & Manoj Misra. (2017). Push notification based login using BLE devices. 479–484. 4 indexed citations
16.
Varshney, Gaurav, Manoj Misra, & Pradeep K. Atrey. (2016). A phish detector using lightweight search features. Computers & Security. 62. 213–228. 64 indexed citations
17.
Varshney, Gaurav, et al.. (2016). SecureCEdit: An approach for secure cloud-based document editing. 561–564. 1 indexed citations
18.
Varshney, Gaurav, et al.. (2012). Secret information display based authentication technique towards preventing phishing attacks. 602–608. 4 indexed citations
19.
Varshney, Gaurav, V. K. Katiyar, & Sushil Kumar. (2010). NUMERICAL MODELING OF PULSATILE FLOW OF BLOOD THROUGH A STENOSED TAPERED ARTERY UNDER PERIODIC BODY ACCELERATION. Journal of Mechanics in Medicine and Biology. 10(2). 251–272. 15 indexed citations
20.
Varshney, Gaurav, V. K. Katiyar, & Sushil Kumar. (2010). Mathematical Modeling of Pulsatile Blood Flow and Heat Transfer Characteristics in Stenosed Artery. International Journal of Fluid Mechanics Research. 37(4). 305–324.

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026