Guanjun Lin

1.6k total citations · 1 hit paper
24 papers, 1.1k citations indexed

About

Guanjun Lin is a scholar working on Information Systems, Signal Processing and Software. According to data from OpenAlex, Guanjun Lin has authored 24 papers receiving a total of 1.1k indexed citations (citations by other indexed papers that have themselves been cited), including 17 papers in Information Systems, 16 papers in Signal Processing and 10 papers in Software. Recurrent topics in Guanjun Lin's work include Advanced Malware Detection Techniques (16 papers), Software Engineering Research (15 papers) and Software Reliability and Analysis Research (9 papers). Guanjun Lin is often cited by papers focused on Advanced Malware Detection Techniques (16 papers), Software Engineering Research (15 papers) and Software Reliability and Analysis Research (9 papers). Guanjun Lin collaborates with scholars based in China, Australia and Egypt. Guanjun Lin's co-authors include Yang Xiang, Jun Zhang, Qing‐Long Han, Sheng Wen, Lei Pan, Wei Luo, Paul Montague, Olivier De Vel, Yonghang Tai and Jun Zhang and has published in prestigious journals such as Proceedings of the IEEE, IEEE Access and IEEE Transactions on Fuzzy Systems.

In The Last Decade

Guanjun Lin

24 papers receiving 1.0k citations

Hit Papers

Software Vulnerability De... 2020 2026 2022 2024 2020 50 100 150 200 250

Author Peers

Peers are selected by citation overlap in the author's most active subfields. citations · hero ref

Author Last Decade Papers Cites
Guanjun Lin 753 581 421 328 282 24 1.1k
Naeem Esfahani 432 0.6× 218 0.4× 291 0.7× 440 1.3× 445 1.6× 24 770
Javam C. Machado 472 0.6× 70 0.1× 235 0.6× 349 1.1× 233 0.8× 122 765
Neil Walkinshaw 416 0.6× 52 0.1× 407 1.0× 202 0.6× 233 0.8× 52 749
Iván Porres 687 0.9× 55 0.1× 306 0.7× 574 1.8× 309 1.1× 89 1.1k
Daniele Sgandurra 589 0.8× 703 1.2× 209 0.5× 720 2.2× 288 1.0× 50 1.1k
Tingting Yu 433 0.6× 123 0.2× 434 1.0× 340 1.0× 207 0.7× 89 865
Ludovic Piètre-Cambacédès 406 0.5× 113 0.2× 135 0.3× 210 0.6× 119 0.4× 12 729
Shi Ying 702 0.9× 57 0.1× 576 1.4× 404 1.2× 293 1.0× 56 941
Andrii Shalaginov 314 0.4× 338 0.6× 56 0.1× 378 1.2× 221 0.8× 47 640
Phu H. Nguyen 238 0.3× 66 0.1× 64 0.2× 162 0.5× 153 0.5× 50 450

Countries citing papers authored by Guanjun Lin

Since Specialization
Citations

This map shows the geographic impact of Guanjun Lin's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Guanjun Lin with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Guanjun Lin more than expected).

Fields of papers citing papers by Guanjun Lin

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Guanjun Lin. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Guanjun Lin. The network helps show where Guanjun Lin may publish in the future.

Co-authorship network of co-authors of Guanjun Lin

This figure shows the co-authorship network connecting the top 25 collaborators of Guanjun Lin. A scholar is included among the top collaborators of Guanjun Lin based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Guanjun Lin. Guanjun Lin is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Lin, Guanjun, et al.. (2025). A comprehensive evaluation of deep learning approaches for ground-level ozone prediction across different regions. Ecological Informatics. 86. 103024–103024. 3 indexed citations
2.
Lin, Guanjun, Mahmoud Abdel-Salam, Gang Hu, & Heming Jia. (2025). Adaptive Differentiated Parrot Optimization: A Multi-Strategy Enhanced Algorithm for Global Optimization with Wind Power Forecasting Applications. Biomimetics. 10(8). 542–542. 1 indexed citations
3.
Wang, Shuang, Heming Jia, Abdelazim G. Hussien, et al.. (2024). Boosting aquila optimizer by marine predators algorithm for combinatorial optimization. Journal of Computational Design and Engineering. 11(2). 37–69. 6 indexed citations
4.
Yuan, Xue, et al.. (2024). Software vulnerable functions discovery based on code composite feature. Journal of Information Security and Applications. 81. 103718–103718. 2 indexed citations
5.
Lin, Guanjun, et al.. (2024). Enhancing vulnerability detection efficiency: An exploration of light-weight LLMs with hybrid code features. Journal of Information Security and Applications. 88. 103925–103925. 4 indexed citations
6.
Lin, Guanjun, et al.. (2023). Detecting vulnerabilities in IoT software: New hybrid model and comprehensive data analysis. Journal of Information Security and Applications. 74. 103467–103467. 7 indexed citations
7.
Lin, Guanjun, et al.. (2023). Multi-theme hierarchical monitoring method for wireless sensor networks. Wireless Networks. 30(8). 6761–6771. 1 indexed citations
8.
Yuan, Xue, Guanjun Lin, Yonghang Tai, & Jun Zhang. (2022). Deep Neural Embedding for Software Vulnerability Discovery: Comparison and Optimization. Security and Communication Networks. 2022. 1–12. 24 indexed citations
9.
Zeng, Peng, Guanjun Lin, Jun Zhang, & Ying Zhang. (2022). Intelligent detection of vulnerable functions in software through neural embedding‐based code analysis. International Journal of Network Management. 33(3). 5 indexed citations
10.
Lin, Guanjun, Heming Jia, & Di Wu. (2022). Distilled and Contextualized Neural Models Benchmarked for Vulnerable Function Detection. Mathematics. 10(23). 4482–4482. 4 indexed citations
11.
Zhu, Yuhui, et al.. (2022). The application of neural network for software vulnerability detection: a review. Neural Computing and Applications. 35(2). 1279–1301. 8 indexed citations
12.
Lin, Guanjun, Xiao Wei, Leo Yu Zhang, et al.. (2021). Deep neural-based vulnerability discovery demystified: data, model and performance. Neural Computing and Applications. 33(20). 13287–13300. 20 indexed citations
13.
Lin, Guanjun, et al.. (2020). Neural Model Stealing Attack to Smart Mobile Device on Intelligent Medical Platform. Wireless Communications and Mobile Computing. 2020. 1–10. 6 indexed citations
14.
Zeng, Peng, Guanjun Lin, Lei Pan, Yonghang Tai, & Jun Zhang. (2020). Software Vulnerability Analysis and Discovery Using Deep Learning Techniques: A Survey. IEEE Access. 8. 197158–197172. 46 indexed citations
15.
Lin, Guanjun, Sheng Wen, Qing‐Long Han, Jun Zhang, & Yang Xiang. (2020). Software Vulnerability Detection Using Deep Neural Networks: A Survey. Proceedings of the IEEE. 108(10). 1825–1848. 295 indexed citations breakdown →
16.
Zhang, Jun, Lin Li, Guanjun Lin, et al.. (2020). Cyber Resilience in Healthcare Digital Twin on Lung Cancer. IEEE Access. 8. 201900–201913. 80 indexed citations
17.
Lin, Guanjun, Lizhen Qu, Jun Zhang, et al.. (2020). CD-VulD: Cross-Domain Vulnerability Discovery Based on Deep Domain Adaptation. IEEE Transactions on Dependable and Secure Computing. 19(1). 438–451. 53 indexed citations
18.
Lin, Guanjun, Jun Zhang, Wei Luo, et al.. (2019). Software Vulnerability Discovery via Learning Multi-Domain Knowledge Bases. IEEE Transactions on Dependable and Secure Computing. 18(5). 2469–2485. 84 indexed citations
19.
Lin, Guanjun, Jun Zhang, Wei Luo, et al.. (2018). Cross-Project Transfer Representation Learning for Vulnerable Function Discovery. IEEE Transactions on Industrial Informatics. 14(7). 3289–3297. 148 indexed citations
20.
Lin, Guanjun, Jun Zhang, Wei Luo, Lei Pan, & Yang Xiang. (2017). POSTER. Swinburne Research Bank (Swinburne University of Technology). 2539–2541. 92 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026