Jiwei Tian

1.4k total citations
47 papers, 913 citations indexed

About

Jiwei Tian is a scholar working on Artificial Intelligence, Electrical and Electronic Engineering and Aerospace Engineering. According to data from OpenAlex, Jiwei Tian has authored 47 papers receiving a total of 913 indexed citations (citations by other indexed papers that have themselves been cited), including 23 papers in Artificial Intelligence, 22 papers in Electrical and Electronic Engineering and 16 papers in Aerospace Engineering. Recurrent topics in Jiwei Tian's work include Adversarial Robustness in Machine Learning (15 papers), Smart Grid Security and Resilience (13 papers) and Anomaly Detection Techniques and Applications (9 papers). Jiwei Tian is often cited by papers focused on Adversarial Robustness in Machine Learning (15 papers), Smart Grid Security and Resilience (13 papers) and Anomaly Detection Techniques and Applications (9 papers). Jiwei Tian collaborates with scholars based in China, Singapore and United States. Jiwei Tian's co-authors include Buhong Wang, Kunrui Cao, Buhong Wang, Haiyang Ding, Fengkui Gong, Zhen Wang, Tengyao Li, Lu Lv, Xiaodong Wang and Jing Li and has published in prestigious journals such as SHILAP Revista de lepidopterología, Scientific Reports and IEEE Access.

In The Last Decade

Jiwei Tian

42 papers receiving 890 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Jiwei Tian China 16 415 318 307 266 177 47 913
Hassan El Ghazi Morocco 13 317 0.8× 146 0.5× 338 1.1× 269 1.0× 72 0.4× 49 816
Kunrui Cao China 13 401 1.0× 194 0.6× 216 0.7× 113 0.4× 149 0.8× 23 697
Mihalis Psarakis Greece 20 1.0k 2.5× 161 0.5× 428 1.4× 249 0.9× 88 0.5× 79 1.6k
Dongjin Xu China 10 316 0.8× 126 0.4× 416 1.4× 96 0.4× 242 1.4× 13 683
Jin Wei United States 15 655 1.6× 407 1.3× 556 1.8× 840 3.2× 138 0.8× 46 1.4k
Magnus Almgren Sweden 18 516 1.2× 276 0.9× 609 2.0× 176 0.7× 33 0.2× 84 999
Anwar Haque Canada 15 222 0.5× 530 1.7× 758 2.5× 103 0.4× 71 0.4× 90 1.1k
Hiroshi Esaki Japan 19 434 1.0× 411 1.3× 957 3.1× 97 0.4× 45 0.3× 186 1.4k
Xuefen Chi China 15 650 1.6× 179 0.6× 389 1.3× 73 0.3× 125 0.7× 80 1.1k
Suleyman Uludag United States 19 510 1.2× 215 0.7× 879 2.9× 448 1.7× 32 0.2× 63 1.3k

Countries citing papers authored by Jiwei Tian

Since Specialization
Citations

This map shows the geographic impact of Jiwei Tian's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Jiwei Tian with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Jiwei Tian more than expected).

Fields of papers citing papers by Jiwei Tian

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Jiwei Tian. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Jiwei Tian. The network helps show where Jiwei Tian may publish in the future.

Co-authorship network of co-authors of Jiwei Tian

This figure shows the co-authorship network connecting the top 25 collaborators of Jiwei Tian. A scholar is included among the top collaborators of Jiwei Tian based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Jiwei Tian. Jiwei Tian is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Wang, Buhong, et al.. (2025). Attack Impact Analysis of Service Function Chain in Aviation Communication Network. IEEE Sensors Journal. 25(14). 27628–27641.
3.
Tian, Jiwei, et al.. (2025). URAdv: A Novel Framework for Generating Ultra-Robust Adversarial Patches Against UAV Object Detection. Mathematics. 13(4). 591–591. 2 indexed citations
4.
Tian, Jiwei, Chao Shen, Chenhao Lin, et al.. (2025). ADMM-Based Adversarial False Data Injection Attacks Against Multi-Label Locational Detection. IEEE Transactions on Dependable and Secure Computing. 23(1). 263–277. 1 indexed citations
5.
6.
Tian, Jiwei, Chao Shen, Buhong Wang, et al.. (2024). EVADE: Targeted Adversarial False Data Injection Attacks for State Estimation in Smart Grid. IEEE Transactions on Sustainable Computing. 10(3). 534–546. 9 indexed citations
7.
Dong, Runze, Buhong Wang, Kunrui Cao, Jiwei Tian, & Tianhao Cheng. (2024). Secure Transmission Design of RIS Enabled UAV Communication Networks Exploiting Deep Reinforcement Learning. IEEE Transactions on Vehicular Technology. 73(6). 8404–8419. 21 indexed citations
9.
Tian, Jiwei, et al.. (2023). Evaluation of Air Combat Control Ability Based on Eye Movement Indicators and Combination Weighting GRA-TOPSIS. Aerospace. 10(5). 437–437. 4 indexed citations
11.
Cao, Kunrui, Haiyang Ding, Buhong Wang, et al.. (2022). Enhancing Physical-Layer Security for IoT With Nonorthogonal Multiple Access Assisted Semi-Grant-Free Transmission. IEEE Internet of Things Journal. 9(24). 24669–24681. 68 indexed citations
12.
Dong, Runze, et al.. (2022). Deep Reinforcement Learning Based UAV for Securing mmWave Communications. IEEE Transactions on Vehicular Technology. 72(4). 5429–5434. 13 indexed citations
13.
Wang, Buhong, et al.. (2021). ADS-B anomaly data detection model based on VAE-SVDD. Computers & Security. 104. 102213–102213. 26 indexed citations
14.
Wang, Buhong, et al.. (2021). Threat impact analysis to air traffic control systems through flight delay modeling. Computers & Industrial Engineering. 162. 107731–107731. 6 indexed citations
15.
Cao, Kunrui, Buhong Wang, Haiyang Ding, et al.. (2021). Achieving Reliable and Secure Communications in Wireless-Powered NOMA Systems. IEEE Transactions on Vehicular Technology. 70(2). 1978–1983. 105 indexed citations
16.
Cao, Kunrui, Buhong Wang, Haiyang Ding, et al.. (2020). On the Security Enhancement of Uplink NOMA Systems With Jammer Selection. IEEE Transactions on Communications. 68(9). 5747–5763. 47 indexed citations
17.
Cao, Kunrui, Buhong Wang, Haiyang Ding, et al.. (2020). Energy Harvesting Jammer Enabled Secure Communication for Cooperative NOMA Systems. 801–806. 5 indexed citations
18.
Tian, Jiwei, et al.. (2020). TOTAL: Optimal Protection Strategy Against Perfect and Imperfect False Data Injection Attacks on Power Grid Cyber–Physical Systems. IEEE Internet of Things Journal. 8(2). 1001–1015. 27 indexed citations
19.
Wang, Buhong, et al.. (2020). CPFuzz: Combining Fuzzing and Falsification of Cyber-Physical Systems. IEEE Access. 8. 166951–166962. 4 indexed citations
20.
Li, Tengyao, et al.. (2020). Dynamic temporal ADS-B data attack detection based on sHDP-HMM. Computers & Security. 93. 101789–101789. 11 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026