Hayawardh Vijayakumar

565 total citations
20 papers, 318 citations indexed

About

Hayawardh Vijayakumar is a scholar working on Artificial Intelligence, Signal Processing and Computer Networks and Communications. According to data from OpenAlex, Hayawardh Vijayakumar has authored 20 papers receiving a total of 318 indexed citations (citations by other indexed papers that have themselves been cited), including 17 papers in Artificial Intelligence, 12 papers in Signal Processing and 10 papers in Computer Networks and Communications. Recurrent topics in Hayawardh Vijayakumar's work include Security and Verification in Computing (17 papers), Advanced Malware Detection Techniques (12 papers) and Network Security and Intrusion Detection (8 papers). Hayawardh Vijayakumar is often cited by papers focused on Security and Verification in Computing (17 papers), Advanced Malware Detection Techniques (12 papers) and Network Security and Intrusion Detection (8 papers). Hayawardh Vijayakumar collaborates with scholars based in United States, Canada and Bolivia. Hayawardh Vijayakumar's co-authors include Trent Jaeger, Joshua Schiffman, Patrick McDaniel, Thomas Moyer, Rohan Padhye, Koushik Sen, Sandra Rueda, Laurent Simon, Caroline Lemieux and Yuqiong Sun and has published in prestigious journals such as IEEE Transactions on Dependable and Secure Computing, Proceedings of the ACM on Programming Languages and USENIX Security Symposium.

In The Last Decade

Hayawardh Vijayakumar

19 papers receiving 300 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Hayawardh Vijayakumar United States 11 211 206 153 85 58 20 318
Adwait Nadkarni United States 11 145 0.7× 167 0.8× 225 1.5× 103 1.2× 66 1.1× 19 300
Georg Merzdovnik Austria 7 160 0.8× 123 0.6× 155 1.0× 82 1.0× 46 0.8× 13 279
Steven Van Acker Belgium 11 284 1.3× 395 1.9× 281 1.8× 82 1.0× 29 0.5× 16 459
Dongseok Jang United States 5 229 1.1× 154 0.7× 190 1.2× 56 0.7× 43 0.7× 6 281
Ruian Duan United States 9 71 0.3× 171 0.8× 176 1.2× 109 1.3× 76 1.3× 10 269
Stephan Heuser Germany 7 196 0.9× 231 1.1× 332 2.2× 116 1.4× 85 1.5× 14 378
Cristian-Alexandru Staicu Germany 9 138 0.7× 246 1.2× 182 1.2× 55 0.6× 114 2.0× 14 306
Xunchao Hu United States 7 151 0.7× 91 0.4× 152 1.0× 89 1.0× 25 0.4× 8 239
Yung Ryn Choe United States 7 118 0.6× 68 0.3× 96 0.6× 156 1.8× 23 0.4× 19 254
Asmaa Sallam United States 8 99 0.5× 127 0.6× 148 1.0× 197 2.3× 42 0.7× 14 258

Countries citing papers authored by Hayawardh Vijayakumar

Since Specialization
Citations

This map shows the geographic impact of Hayawardh Vijayakumar's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Hayawardh Vijayakumar with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Hayawardh Vijayakumar more than expected).

Fields of papers citing papers by Hayawardh Vijayakumar

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Hayawardh Vijayakumar. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Hayawardh Vijayakumar. The network helps show where Hayawardh Vijayakumar may publish in the future.

Co-authorship network of co-authors of Hayawardh Vijayakumar

This figure shows the co-authorship network connecting the top 25 collaborators of Hayawardh Vijayakumar. A scholar is included among the top collaborators of Hayawardh Vijayakumar based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Hayawardh Vijayakumar. Hayawardh Vijayakumar is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Lee, Y., Hai‐Ning Chen, William Enck, et al.. (2023). PolyScope: Multi-Policy Access Control Analysis to Triage Android Scoped Storage. IEEE Transactions on Dependable and Secure Computing. 1–14. 4 indexed citations
2.
Enck, William, Hai‐Ning Chen, Hayawardh Vijayakumar, et al.. (2021). PolyScope: Multi-policy access control analysis to compute authorized attack operations in android systems. 2579–2596. 3 indexed citations
3.
Harrison, Lee H., Hayawardh Vijayakumar, Rohan Padhye, Koushik Sen, & Michael Grace. (2020). {PARTEMU}: Enabling Dynamic Analysis of Real-World TrustZone Software Using Emulation. USENIX Security Symposium. 789–806. 21 indexed citations
4.
Padhye, Rohan, Caroline Lemieux, Koushik Sen, Laurent Simon, & Hayawardh Vijayakumar. (2019). FuzzFactory: domain-specific fuzzing with waypoints. Proceedings of the ACM on Programming Languages. 3(OOPSLA). 1–29. 41 indexed citations
5.
Chen, Yaohui, Yuping Li, Long Lu, et al.. (2018). InstaGuard: Instantly Deployable Hot-patches for Vulnerable System Programs on Android. 15 indexed citations
6.
Tian, Dave, Patrick Traynor, Hayawardh Vijayakumar, et al.. (2018). ATtention Spanned: Comprehensive Vulnerability Analysis of {AT} Commands Within the Android Ecosystem. 273–290. 18 indexed citations
7.
Chen, Yaohui, Dongli Zhang, Ruowen Wang, et al.. (2017). NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64. 304–319. 22 indexed citations
8.
Sun, Yuqiong, Giuseppe Petracca, Trent Jaeger, Hayawardh Vijayakumar, & Joshua Schiffman. (2015). Cloud Armor: Protecting Cloud Commands from Compromised Cloud Services. 253–260. 7 indexed citations
9.
Vijayakumar, Hayawardh, Xinyang Ge, Mathias Payer, & Trent Jaeger. (2014). JIGSAW: protecting resource access by inferring programmer expectations. Infoscience (Ecole Polytechnique Fédérale de Lausanne). 973–988. 21 indexed citations
10.
Vijayakumar, Hayawardh, Xinyang Ge, & Trent Jaeger. (2014). Policy models to protect resource retrieval. 211–222.
11.
Vijayakumar, Hayawardh, Joshua Schiffman, & Trent Jaeger. (2013). Process firewalls. 57–70. 11 indexed citations
12.
Schiffman, Joshua, Yuqiong Sun, Hayawardh Vijayakumar, & Trent Jaeger. (2013). Cloud Verifier: Verifiable Auditing Service for IaaS Clouds. 239–246. 22 indexed citations
13.
Vijayakumar, Hayawardh, Joshua Schiffman, & Trent Jaeger. (2012). STING: finding name resolution vulnerabilities in programs. USENIX Security Symposium. 41–41. 15 indexed citations
14.
Muthukumaran, Divya, et al.. (2012). Transforming commodity security policies to enforce Clark-Wilson integrity. 269–278. 3 indexed citations
15.
Vijayakumar, Hayawardh, et al.. (2012). Integrity walls. 75–76. 27 indexed citations
16.
Vijayakumar, Hayawardh, Joshua Schiffman, & Trent Jaeger. (2011). A Rose by Any Other Name or an Insane Root? Adventures in Name Resolution. 22. 1–8. 1 indexed citations
17.
Vijayakumar, Hayawardh, et al.. (2010). Physical and financial performance of selected regulated markets in Karnataka.. Journal of Farm Sciences. 23(2). 379–381. 1 indexed citations
18.
Muthukumaran, Divya, Sandra Rueda, Hayawardh Vijayakumar, & Trent Jaeger. (2010). Cut me some security. 75–78. 2 indexed citations
19.
Schiffman, Joshua, Thomas Moyer, Hayawardh Vijayakumar, Trent Jaeger, & Patrick McDaniel. (2010). Seeding clouds with trust anchors. 43–46. 80 indexed citations
20.
Rueda, Sandra, Hayawardh Vijayakumar, & Trent Jaeger. (2009). Analysis of virtual machine system policies. 227–236. 4 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026