Hongsong Chen

873 total citations
59 papers, 582 citations indexed

About

Hongsong Chen is a scholar working on Computer Networks and Communications, Information Systems and Artificial Intelligence. According to data from OpenAlex, Hongsong Chen has authored 59 papers receiving a total of 582 indexed citations (citations by other indexed papers that have themselves been cited), including 40 papers in Computer Networks and Communications, 23 papers in Information Systems and 19 papers in Artificial Intelligence. Recurrent topics in Hongsong Chen's work include Network Security and Intrusion Detection (19 papers), Advanced Malware Detection Techniques (14 papers) and Security in Wireless Sensor Networks (9 papers). Hongsong Chen is often cited by papers focused on Network Security and Intrusion Detection (19 papers), Advanced Malware Detection Techniques (14 papers) and Security in Wireless Sensor Networks (9 papers). Hongsong Chen collaborates with scholars based in China, United States and Taiwan. Hongsong Chen's co-authors include Zhaoshun Wang, Aaron Zimba, Bharat Bhargava, Zhiguang Shan, Yongpeng Zhang, Dongyan Zhang, Jing Xie, Mingzeng Hu, Xintong Han and Zhenzhou Ji and has published in prestigious journals such as Expert Systems with Applications, IEEE Access and Future Generation Computer Systems.

In The Last Decade

Hongsong Chen

49 papers receiving 550 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Hongsong Chen China 12 383 203 181 181 72 59 582
Mohamed Kaâniche France 11 405 1.1× 304 1.5× 180 1.0× 169 0.9× 81 1.1× 32 625
Basil AsSadhan Saudi Arabia 14 317 0.8× 99 0.5× 173 1.0× 284 1.6× 45 0.6× 34 451
Natalija Vlajic Canada 14 531 1.4× 161 0.8× 180 1.0× 218 1.2× 156 2.2× 56 692
Claude Fachkha United Arab Emirates 10 360 0.9× 191 0.9× 224 1.2× 200 1.1× 152 2.1× 25 577
MingJian Tang Australia 11 192 0.5× 183 0.9× 84 0.5× 259 1.4× 80 1.1× 26 503
Mahdi Abadi Iran 16 429 1.1× 187 0.9× 373 2.1× 465 2.6× 68 0.9× 50 744
Youssif Al‐Nashif United States 13 383 1.0× 176 0.9× 125 0.7× 175 1.0× 112 1.6× 34 555
Bharat B. Madan United States 10 323 0.8× 217 1.1× 87 0.5× 96 0.5× 94 1.3× 35 515

Countries citing papers authored by Hongsong Chen

Since Specialization
Citations

This map shows the geographic impact of Hongsong Chen's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Hongsong Chen with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Hongsong Chen more than expected).

Fields of papers citing papers by Hongsong Chen

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Hongsong Chen. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Hongsong Chen. The network helps show where Hongsong Chen may publish in the future.

Co-authorship network of co-authors of Hongsong Chen

This figure shows the co-authorship network connecting the top 25 collaborators of Hongsong Chen. A scholar is included among the top collaborators of Hongsong Chen based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Hongsong Chen. Hongsong Chen is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Chen, Hongsong, et al.. (2025). Protecting social networks against Dual-Vector attacks using Swarm OpenAI, Large Language Models, Swarm Intelligence, and Transformers. Expert Systems with Applications. 278. 127307–127307. 2 indexed citations
2.
Latif, Zohaib, et al.. (2025). Security and privacy of industrial big data: Motivation, opportunities, and challenges. Journal of Network and Computer Applications. 237. 104130–104130. 8 indexed citations
3.
Chen, Hongsong, et al.. (2025). Advancing social network security with magteon-turing L3TM: A multi-layered defense system against cyber threats. Computer Networks. 267. 111375–111375. 1 indexed citations
4.
Chen, Hongsong, et al.. (2025). Hybrid transformer deep neural architectures for enhanced misinformation detection on social media. Expert Systems with Applications. 300. 130470–130470. 1 indexed citations
5.
Chen, Hongsong, et al.. (2025). Merkle multi-branch hash tree-based dynamic data integrity auditing for B5G network cloud storage. Journal of Information Security and Applications. 89. 103981–103981.
6.
Chen, Hongsong, et al.. (2024). Blockchain-as-a-Service for the Security Challenges and Solutions in the Internet of Things Environment. Wireless Personal Communications. 136(4). 2299–2327. 1 indexed citations
7.
Chen, Hongsong, et al.. (2024). Federated learning incentivize with privacy-preserving for IoT in edge computing in the context of B5G. Cluster Computing. 28(2). 4 indexed citations
8.
Chen, Hongsong, et al.. (2023). Multivariate time series anomaly detection by fusion of deep convolution residual autoencoding reconstruction model and ConvLstm forecasting model. Computers & Security. 137. 103581–103581. 7 indexed citations
9.
Chen, Hongsong, et al.. (2022). Security Issues and Solutions in Federate Learning Under IoT Critical Infrastructure. Wireless Personal Communications. 129(1). 475–500. 5 indexed citations
10.
Liu, Feng, Ruifeng Yang, Dongbo Chen, et al.. (2021). Prevention and control measures significantly curbed the SARS-CoV-2 and influenza epidemics in China. Journal of Virus Eradication. 7(2). 100040–100040. 7 indexed citations
11.
Zimba, Aaron, et al.. (2020). Modeling and detection of the multi-stages of Advanced Persistent Threats attacks based on semi-supervised learning and complex networks characteristics. Future Generation Computer Systems. 106. 501–517. 71 indexed citations
12.
Zimba, Aaron, Hongsong Chen, & Zhaoshun Wang. (2019). Bayesian network based weighted APT attack paths modeling in cloud computing. Future Generation Computer Systems. 96. 525–537. 43 indexed citations
13.
Chen, Hongsong, et al.. (2019). A novel SMP-based survivability evaluation metric and approach in wireless sensor network. Computer Science and Information Systems. 16(3). 733–751. 2 indexed citations
14.
Zimba, Aaron, Hongsong Chen, & Zhaoshun Wang. (2018). Bayesian-Boolean Logic Security Assessment Model for Malware-Free Intrusions.. Int. J. Netw. Secur.. 20. 558–567. 2 indexed citations
15.
Zimba, Aaron, Zhaoshun Wang, & Hongsong Chen. (2018). Multi-stage crypto ransomware attacks: A new emerging cyber threat to critical infrastructure and industrial control systems. ICT Express. 4(1). 14–18. 56 indexed citations
16.
Zhang, Dongyan & Hongsong Chen. (2011). Security analysis of disaster recovery systems using Stochastic Petri Nets. Journal of Tsinghua University(Science and Technology). 51(10). 1281–1286.
17.
Chen, Hongsong, et al.. (2011). Multi-agent collaboration based trust routing scheme for military ad hoc network. 2995. 37–42. 1 indexed citations
18.
Chen, Hongsong, et al.. (2011). A Novel Trust Routing Scheme Based on Node Behaviour Evaluation for Mobile AD Hoc Networks. Intelligent Automation & Soft Computing. 17(8). 1063–1074. 5 indexed citations
19.
Chen, Hongsong, et al.. (2011). Security and trust research in M2M system. 286–290. 30 indexed citations
20.
Chen, Hongsong, et al.. (2005). Design and performance evaluation of a multi-agent-based dynamic lifetime security scheme for AODV routing protocol. Journal of Network and Computer Applications. 30(1). 145–166. 26 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026