Guowei Shen

959 total citations
43 papers, 609 citations indexed

About

Guowei Shen is a scholar working on Computer Networks and Communications, Artificial Intelligence and Electrical and Electronic Engineering. According to data from OpenAlex, Guowei Shen has authored 43 papers receiving a total of 609 indexed citations (citations by other indexed papers that have themselves been cited), including 21 papers in Computer Networks and Communications, 15 papers in Artificial Intelligence and 11 papers in Electrical and Electronic Engineering. Recurrent topics in Guowei Shen's work include Network Security and Intrusion Detection (18 papers), Indoor and Outdoor Localization Technologies (9 papers) and Internet Traffic Analysis and Secure E-voting (8 papers). Guowei Shen is often cited by papers focused on Network Security and Intrusion Detection (18 papers), Indoor and Outdoor Localization Technologies (9 papers) and Internet Traffic Analysis and Secure E-voting (8 papers). Guowei Shen collaborates with scholars based in China, Germany and United States. Guowei Shen's co-authors include Reiner S. Thomä, Rudolf Zetík, Yunhe Cui, Chun Guo, Miao Yu, Huanlai Xing, Youliang Tian, Lianshan Yan, Xin Jin and Yanping Chen and has published in prestigious journals such as Journal of Cleaner Production, IEEE Transactions on Geoscience and Remote Sensing and IEEE Internet of Things Journal.

In The Last Decade

Guowei Shen

40 papers receiving 570 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Guowei Shen China 13 246 240 217 177 121 43 609
Joaquim Bastos Portugal 11 170 0.7× 318 1.3× 110 0.5× 62 0.4× 185 1.5× 37 554
Vladimir Atanasovski North Macedonia 17 621 2.5× 606 2.5× 75 0.3× 84 0.5× 85 0.7× 98 940
Wen‐Hua Ju United States 7 523 2.1× 474 2.0× 250 1.2× 324 1.8× 121 1.0× 8 881
Marcel Kyas Germany 11 268 1.1× 114 0.5× 150 0.7× 38 0.2× 54 0.4× 57 429
Guangquan Xu China 10 72 0.3× 271 1.1× 113 0.5× 133 0.8× 138 1.1× 22 461
Anu Jagannath United States 10 285 1.2× 208 0.9× 280 1.3× 87 0.5× 32 0.3× 23 609
Hamid Esmaeili Najafabadi Canada 10 111 0.5× 102 0.4× 101 0.5× 58 0.3× 72 0.6× 28 418
Jia Liu China 15 260 1.1× 536 2.2× 112 0.5× 45 0.3× 48 0.4× 123 735
Kazuya Sakai Japan 14 158 0.6× 354 1.5× 87 0.4× 91 0.5× 106 0.9× 89 576

Countries citing papers authored by Guowei Shen

Since Specialization
Citations

This map shows the geographic impact of Guowei Shen's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Guowei Shen with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Guowei Shen more than expected).

Fields of papers citing papers by Guowei Shen

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Guowei Shen. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Guowei Shen. The network helps show where Guowei Shen may publish in the future.

Co-authorship network of co-authors of Guowei Shen

This figure shows the co-authorship network connecting the top 25 collaborators of Guowei Shen. A scholar is included among the top collaborators of Guowei Shen based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Guowei Shen. Guowei Shen is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Ji, Zhigang, et al.. (2025). Towards saturation attack detection in SDN: a multi-edge representation learning-based method. Journal of King Saud University - Computer and Information Sciences. 37(6).
2.
Chen, Yi, Hongxia Wang, Yunhe Cui, et al.. (2025). A multi-level additive distortion method for security improvement in palette image steganography. Journal of Visual Communication and Image Representation. 110. 104463–104463.
3.
Li, Jiajia, S. Rahaman, Yi Zhu, et al.. (2024). Engrailed-1 inactivation leads to scarless skin wound healing through extracellular matrix remodeling. Genes & Diseases. 12(3). 101484–101484. 2 indexed citations
4.
Guo, Chun, et al.. (2024). SNDMI: Spyware network traffic detection method based on inducement operations. Computers & Security. 140. 103806–103806. 3 indexed citations
5.
Chen, Yi, et al.. (2024). Robust Image Watermarking Based on Hybrid Transform and Position-Adaptive Selection. Circuits Systems and Signal Processing. 44(4). 2802–2829. 3 indexed citations
6.
Shen, Guowei, et al.. (2023). BFLS: Blockchain and Federated Learning for sharing threat detection models as Cyber Threat Intelligence. Computer Networks. 224. 109604–109604. 33 indexed citations
7.
Guo, Chun, et al.. (2023). Remote access trojan traffic early detection method based on Markov matrices and deep learning. Computers & Security. 137. 103628–103628. 1 indexed citations
8.
Guo, Chun, et al.. (2023). MCTVD: A malware classification method based on three-channel visualization and deep learning. Computers & Security. 126. 103084–103084. 21 indexed citations
9.
Cui, Yunhe, et al.. (2022). KIND: A Novel Image-Mutual-Information-Based Decision Fusion Method for Saturation Attack Detection in SD-IoT. IEEE Internet of Things Journal. 9(23). 23750–23771. 4 indexed citations
10.
Shen, Guowei, et al.. (2022). SAD: Website Fingerprinting Defense Based on Adversarial Examples. Security and Communication Networks. 2022. 1–12. 3 indexed citations
11.
Yin, Wencheng, et al.. (2021). DIAMOND: A Structured Coevolution Feature Optimization Method for LDDoS Detection in SDN‐IoT. Wireless Communications and Mobile Computing. 2021(1). 4 indexed citations
12.
Guo, Chun, et al.. (2021). 2-SPIFF: a 2-stage packer identification method based on function call graph and file attributes. Applied Intelligence. 51(12). 9038–9053. 4 indexed citations
13.
Guo, Chun, et al.. (2021). Image-based malware classification using section distribution information. Computers & Security. 110. 102420–102420. 33 indexed citations
14.
Shen, Guowei, et al.. (2021). EX-Action: Automatically Extracting Threat Actions from Cyber Threat Intelligence Report Based on Multimodal Learning. Security and Communication Networks. 2021. 1–12. 19 indexed citations
15.
Cui, Yunhe, Chun Guo, Guowei Shen, et al.. (2021). Towards DDoS detection mechanisms in Software-Defined Networking. Journal of Network and Computer Applications. 190. 103156–103156. 60 indexed citations
16.
Yang, Wu, et al.. (2015). Anomaly Detection in Microblogging via Co-Clustering. Journal of Computer Science and Technology. 30(5). 1097–1108. 15 indexed citations
17.
Shen, Guowei, et al.. (2011). Localization of active UWB sensor nodes in multipath and NLOS environments. European Conference on Antennas and Propagation. 126–130. 2 indexed citations
18.
Shen, Guowei, et al.. (2010). Time Domain UWB Bistatic SAR Ambiguity Function. 1–4. 1 indexed citations
19.
Shen, Guowei, et al.. (2010). Time of arrival estimation for range-based localization in UWB sensor networks. 1–4. 38 indexed citations
20.
Zetík, Rudolf, Guowei Shen, & Reiner S. Thomä. (2010). Evaluation of requirements for UWB localization systems in home-entertainment applications. 1–8. 10 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026