Hao Fu

430 total citations
16 papers, 231 citations indexed

About

Hao Fu is a scholar working on Computer Networks and Communications, Signal Processing and Information Systems. According to data from OpenAlex, Hao Fu has authored 16 papers receiving a total of 231 indexed citations (citations by other indexed papers that have themselves been cited), including 11 papers in Computer Networks and Communications, 11 papers in Signal Processing and 7 papers in Information Systems. Recurrent topics in Hao Fu's work include Advanced Malware Detection Techniques (11 papers), Network Security and Intrusion Detection (10 papers) and Internet Traffic Analysis and Secure E-voting (3 papers). Hao Fu is often cited by papers focused on Advanced Malware Detection Techniques (11 papers), Network Security and Intrusion Detection (10 papers) and Internet Traffic Analysis and Secure E-voting (3 papers). Hao Fu collaborates with scholars based in United States and China. Hao Fu's co-authors include Prasant Mohapatra, Pengfei Hu, Hongxing Li, Derya Cansever, Zizhan Zheng, Tianbo Gu, Trent Jaeger, Sencun Zhu, Zhiyun Qian and Zheng Fang and has published in prestigious journals such as SHILAP Revista de lepidopterología, IEEE Transactions on Mobile Computing and Tehnicki vjesnik - Technical Gazette.

In The Last Decade

Hao Fu

15 papers receiving 222 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Hao Fu United States 9 147 104 101 83 34 16 231
Gábor Pék Hungary 6 209 1.4× 138 1.3× 160 1.6× 130 1.6× 49 1.4× 9 300
Katharina Hofer-Schmitz Austria 8 179 1.2× 117 1.1× 101 1.0× 122 1.5× 39 1.1× 12 284
Pubali Datta United States 6 175 1.2× 134 1.3× 132 1.3× 119 1.4× 12 0.4× 11 297
Barbara Kordy Luxembourg 5 153 1.0× 228 2.2× 86 0.9× 55 0.7× 45 1.3× 9 281
Michael D. Iannacone United States 7 172 1.2× 123 1.2× 99 1.0× 157 1.9× 15 0.4× 12 265
D. Sangeetha India 9 213 1.4× 193 1.9× 183 1.8× 135 1.6× 13 0.4× 21 337
L. Lewis United States 10 233 1.6× 87 0.8× 65 0.6× 149 1.8× 22 0.6× 22 287
Faheem Ullah Australia 8 228 1.6× 131 1.3× 129 1.3× 119 1.4× 34 1.0× 23 311
Sowmya Myneni United States 6 334 2.3× 182 1.8× 211 2.1× 144 1.7× 66 1.9× 8 416

Countries citing papers authored by Hao Fu

Since Specialization
Citations

This map shows the geographic impact of Hao Fu's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Hao Fu with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Hao Fu more than expected).

Fields of papers citing papers by Hao Fu

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Hao Fu. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Hao Fu. The network helps show where Hao Fu may publish in the future.

Co-authorship network of co-authors of Hao Fu

This figure shows the co-authorship network connecting the top 25 collaborators of Hao Fu. A scholar is included among the top collaborators of Hao Fu based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Hao Fu. Hao Fu is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

16 of 16 papers shown
1.
Wang, Wenping, et al.. (2023). Integrity and Junkiness Failure Handling for Embedding-based Retrieval: A Case Study in Social Network Search. arXiv (Cornell University). 3250–3254. 5 indexed citations
2.
Fu, Hao, et al.. (2022). Towards System-Level Security Analysis of IoT Using Attack Graphs. IEEE Transactions on Mobile Computing. 23(2). 1142–1155. 2 indexed citations
3.
Fu, Hao, et al.. (2022). IOTA: A Framework for Analyzing System-Level Security of IoTs. 143–155. 7 indexed citations
4.
Fu, Hao, et al.. (2021). A Ring Signature Trust Model for Project Review Based on Blockchain Smart Contract. Tehnicki vjesnik - Technical Gazette. 28(2). 7 indexed citations
5.
Fang, Zheng, Hao Fu, Tianbo Gu, et al.. (2021). A model checking-based security analysis framework for IoT systems. SHILAP Revista de lepidopterología. 1(1). 100004–100004. 21 indexed citations
6.
Gu, Tianbo, et al.. (2020). Towards Learning-automation IoT Attack Detection through Reinforcement Learning. 88–97. 18 indexed citations
7.
Fu, Hao, Pengfei Hu, Zizhan Zheng, et al.. (2020). Towards Automatic Detection of Nonfunctional Sensitive Transmissions in Mobile Applications. IEEE Transactions on Mobile Computing. 20(10). 3066–3080. 10 indexed citations
8.
Fu, Hao, Zizhan Zheng, Sencun Zhu, & Prasant Mohapatra. (2019). Keeping Context In Mind: Automating Mobile App Access Control with User Interface Inspection. 2089–2097. 13 indexed citations
9.
Fang, Zheng, Hao Fu, Tianbo Gu, et al.. (2019). ForeSee: A Cross-Layer Vulnerability Detection Framework for the Internet of Things. 236–244. 8 indexed citations
10.
Fu, Hao, et al.. (2017). INSPIRED: Intention-based Privacy-preserving Permission Model.. 3 indexed citations
12.
Fu, Hao, et al.. (2016). Geochemical characteristics and genetic model of Cambrian dolomite in east Tarim basin. 40(2). 57.
13.
Fu, Hao, Zizhan Zheng, Aveek Das, et al.. (2016). FlowIntent: Detecting Privacy Leakage from User Intention to Network Traffic Mapping. 1–9. 12 indexed citations
14.
Chen, Shengbo, Hao Fu, & Huaikou Miao. (2016). Formal verification of security protocols using Spin. 1–6. 8 indexed citations
15.
Hu, Pengfei, Hongxing Li, Hao Fu, Derya Cansever, & Prasant Mohapatra. (2015). Dynamic defense strategy against advanced persistent threat with insiders. 747–755. 100 indexed citations
16.
Yang, Jianxin, Rusong Wang, Hao Fu, & Jingru Liu. (2004). Life cycle assessment of mobile phone housing.. PubMed. 16(1). 100–3. 5 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026