Junaid Chaudhry

958 total citations
43 papers, 567 citations indexed

About

Junaid Chaudhry is a scholar working on Computer Networks and Communications, Information Systems and Artificial Intelligence. According to data from OpenAlex, Junaid Chaudhry has authored 43 papers receiving a total of 567 indexed citations (citations by other indexed papers that have themselves been cited), including 26 papers in Computer Networks and Communications, 15 papers in Information Systems and 10 papers in Artificial Intelligence. Recurrent topics in Junaid Chaudhry's work include User Authentication and Security Systems (8 papers), IoT and Edge/Fog Computing (6 papers) and Network Security and Intrusion Detection (5 papers). Junaid Chaudhry is often cited by papers focused on User Authentication and Security Systems (8 papers), IoT and Edge/Fog Computing (6 papers) and Network Security and Intrusion Detection (5 papers). Junaid Chaudhry collaborates with scholars based in Australia, United States and South Korea. Junaid Chaudhry's co-authors include Craig Valli, Shafique Ahmad Chaudhry, Kashif Saleem, Sohail Jabbar, Mudassar Ahmad, Guanglou Zheng, Ahmed Ibrahim, Mamoun Alazab, Wencheng Yang and Song Wang and has published in prestigious journals such as SHILAP Revista de lepidopterología, PLoS ONE and IEEE Access.

In The Last Decade

Junaid Chaudhry

42 papers receiving 530 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Junaid Chaudhry Australia 13 274 229 152 125 77 43 567
Faisal S. Alsubaei Saudi Arabia 13 336 1.2× 347 1.5× 172 1.1× 83 0.7× 45 0.6× 63 659
Victor Sucasas Portugal 13 227 0.8× 321 1.4× 237 1.6× 75 0.6× 215 2.8× 34 644
Ahmed Ibrahim Australia 12 227 0.8× 336 1.5× 154 1.0× 158 1.3× 68 0.9× 40 616
Ryan Alturki Saudi Arabia 15 158 0.6× 232 1.0× 196 1.3× 70 0.6× 118 1.5× 69 716
Young-Duk Seo South Korea 11 305 1.1× 221 1.0× 211 1.4× 41 0.3× 52 0.7× 37 594
Mohammed Bouhorma Morocco 13 108 0.4× 298 1.3× 89 0.6× 93 0.7× 136 1.8× 75 541
Na Ruan China 14 161 0.6× 201 0.9× 213 1.4× 106 0.8× 158 2.1× 45 614
Mohammad Tabrez Quasim Saudi Arabia 11 219 0.8× 200 0.9× 135 0.9× 33 0.3× 50 0.6× 51 495
Myeonghyun Kim South Korea 15 515 1.9× 383 1.7× 161 1.1× 71 0.6× 137 1.8× 33 751

Countries citing papers authored by Junaid Chaudhry

Since Specialization
Citations

This map shows the geographic impact of Junaid Chaudhry's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Junaid Chaudhry with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Junaid Chaudhry more than expected).

Fields of papers citing papers by Junaid Chaudhry

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Junaid Chaudhry. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Junaid Chaudhry. The network helps show where Junaid Chaudhry may publish in the future.

Co-authorship network of co-authors of Junaid Chaudhry

This figure shows the co-authorship network connecting the top 25 collaborators of Junaid Chaudhry. A scholar is included among the top collaborators of Junaid Chaudhry based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Junaid Chaudhry. Junaid Chaudhry is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Chaudhry, Junaid, et al.. (2021). Data Security Through Zero-Knowledge Proof and Statistical Fingerprinting in Vehicle-to-Healthcare Everything (V2HX) Communications. IEEE Transactions on Intelligent Transportation Systems. 22(6). 3869–3879. 12 indexed citations
2.
Wang, Shulan, Haiyan Wang, Jianqiang Li, et al.. (2020). A Fast CP-ABE System for Cyber-Physical Security and Privacy in Mobile Healthcare Network. IEEE Transactions on Industry Applications. 1–1. 67 indexed citations
3.
Adedimeji, Adebola, Jean d’Amour Sinayobye, Brenda Asiimwe‐Kateera, et al.. (2019). Social contexts as mediator of risk behaviors in Rwandan men who have sex with men (MSM): Implications for HIV and STI transmission. PLoS ONE. 14(1). e0211099–e0211099. 26 indexed citations
4.
Zheng, Guanglou, Wencheng Yang, Craig Valli, et al.. (2019). Fingerprint Access Control for Wireless Insulin Pump Systems Using Cancelable Delaunay Triangulations. IEEE Access. 7. 75629–75641. 9 indexed citations
5.
Chaudhry, Junaid, Al‐Sakib Khan Pathan, Mubashir Husain Rehmani, & Ali Kashif Bashir. (2018). Threats to critical infrastructure from AI and human intelligence. The Journal of Supercomputing. 74(10). 4865–4866. 6 indexed citations
6.
Ibrahim, Ahmed, et al.. (2018). A security review of local government using NIST CSF: a case study. The Journal of Supercomputing. 74(10). 5171–5186. 35 indexed citations
7.
Hussain, Syed Jawad, Junaid Chaudhry, Kashif Saleem, et al.. (2018). Risk Analysis of Cloud Sourcing in Healthcare and Public Health Industry. IEEE Access. 6. 19140–19150. 23 indexed citations
8.
Yang, Wencheng, Song Wang, Jiankun Hu, et al.. (2018). Securing Mobile Healthcare Data: A Smart Card Based Cancelable Finger-Vein Bio-Cryptosystem. IEEE Access. 6. 36939–36947. 46 indexed citations
9.
Al‐Muhtadi, Jalal, Khan Zeb, Junaid Chaudhry, et al.. (2018). A Critical Analysis of Mobility Management Related Issues of Wireless Sensor Networks in Cyber Physical Systems. IEEE Access. 6. 16363–16376. 9 indexed citations
10.
Saleem, Kashif, Junaid Chaudhry, Mehmet A. Orgun, & Jalal Al‐Muhtadi. (2017). A bio-inspired secure IPv6 communication protocol for Internet of Things. 1–6. 11 indexed citations
11.
Chaudhry, Junaid, Kashif Saleem, Rafiqul Islam, et al.. (2017). AZSPM: Autonomic Zero-Knowledge Security Provisioning Model for Medical Control Systems in Fog Computing Environments. Australasian Journal of Paramedicine. 121–127. 10 indexed citations
12.
Ahmed, Zafar, et al.. (2016). TRENDS AND PATTERNS OF SUICIDE IN PEOPLE OF CHITRAL, KHYBER PAKHTUNKHWA, PAKISTAN. SHILAP Revista de lepidopterología. 5 indexed citations
13.
Chaudhry, Junaid, et al.. (2014). Sinkhole Vulnerabilities in Wireless Sensor Networks. International Journal of Security and Its Applications. 8(1). 401–410. 9 indexed citations
14.
Chaudhry, Junaid, et al.. (2013). Dealing with Sinkhole Attacks in Wireless Sensor Networks. 7–12. 14 indexed citations
15.
Chaudhry, Junaid, et al.. (2012). Vulnerabilities and verification of cryptographic protocols and their future in Wireless Body Area Networks. Qatar University QSpace (Qatar University). 1–5. 3 indexed citations
16.
Chaudhry, Junaid & Uvais Qidwai. (2012). On critical point avoidance among mobile terminals in healthcare monitoring applications: Saving lives through reliable communication software. Qatar University QSpace (Qatar University). 5. 1–5. 2 indexed citations
17.
Chaudhry, Junaid, Saqib Ali, Md Asri Ngadi, & Abdul Hanan Abdullah. (2011). AUTONOMIC SERVICE COMPOSITION THROUGH CONTEXT ORIENTATION APPROACH. Journal of Theoretical and Applied Information Technology. 34(1). 50–56. 2 indexed citations
18.
Chaudhry, Junaid, et al.. (2008). Towards a General Entity Representation Model.. Institutional Research Information System (Università degli Studi di Trento). 6 indexed citations
19.
Chaudhry, Junaid, Themis Palpanas, Periklis Andritsos, & Antonio Maña. (2008). Entity Lifecycle Management for OKKAM.. Institutional Research Information System (Università degli Studi di Trento). 1 indexed citations
20.
Chaudhry, Junaid, et al.. (2006). Some Enabling Technologies for Ubiquitous Networks. Journal of Computer Science. 2(8). 627–633. 2 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026