Junfeng Wang

3.1k total citations
164 papers, 2.0k citations indexed

About

Junfeng Wang is a scholar working on Computer Networks and Communications, Signal Processing and Artificial Intelligence. According to data from OpenAlex, Junfeng Wang has authored 164 papers receiving a total of 2.0k indexed citations (citations by other indexed papers that have themselves been cited), including 80 papers in Computer Networks and Communications, 45 papers in Signal Processing and 45 papers in Artificial Intelligence. Recurrent topics in Junfeng Wang's work include Advanced Malware Detection Techniques (44 papers), Network Security and Intrusion Detection (36 papers) and Software Engineering Research (12 papers). Junfeng Wang is often cited by papers focused on Advanced Malware Detection Techniques (44 papers), Network Security and Intrusion Detection (36 papers) and Software Engineering Research (12 papers). Junfeng Wang collaborates with scholars based in China, United States and Canada. Junfeng Wang's co-authors include Weishi Li, Zhou Ming-tian, Lei Li, Qi Li, Peng Wu, Zhiyang Fang, Qi Li, Fang Wang, Farhan Ullah and Dong Liu and has published in prestigious journals such as FEBS Letters, Automatica and Green Chemistry.

In The Last Decade

Junfeng Wang

146 papers receiving 1.9k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Junfeng Wang China 25 1.1k 802 647 569 309 164 2.0k
S. Felix Wu United States 25 1.2k 1.1× 376 0.5× 269 0.4× 815 1.4× 279 0.9× 136 2.0k
Sandeep Kumar India 21 845 0.8× 494 0.6× 970 1.5× 540 0.9× 38 0.1× 115 1.8k
Youjian Zhao China 20 1.5k 1.3× 711 0.9× 207 0.3× 1.3k 2.4× 217 0.7× 71 2.2k
Ding Yuan China 26 1.3k 1.2× 146 0.2× 1.3k 1.9× 572 1.0× 309 1.0× 145 2.7k
Hong Gao China 27 1.3k 1.2× 576 0.7× 594 0.9× 745 1.3× 101 0.3× 208 2.6k
Kui Ren China 32 643 0.6× 693 0.9× 909 1.4× 1.9k 3.4× 112 0.4× 163 3.5k
Chunming Wu China 24 881 0.8× 326 0.4× 411 0.6× 683 1.2× 24 0.1× 209 1.8k
Hui Song China 18 794 0.7× 82 0.1× 446 0.7× 427 0.8× 81 0.3× 155 1.4k
Yang Xin China 16 1.1k 0.9× 722 0.9× 481 0.7× 954 1.7× 18 0.1× 128 1.9k
Mohammad Ashiqur Rahman United States 21 1.0k 0.9× 267 0.3× 458 0.7× 392 0.7× 271 0.9× 155 2.3k

Countries citing papers authored by Junfeng Wang

Since Specialization
Citations

This map shows the geographic impact of Junfeng Wang's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Junfeng Wang with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Junfeng Wang more than expected).

Fields of papers citing papers by Junfeng Wang

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Junfeng Wang. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Junfeng Wang. The network helps show where Junfeng Wang may publish in the future.

Co-authorship network of co-authors of Junfeng Wang

This figure shows the co-authorship network connecting the top 25 collaborators of Junfeng Wang. A scholar is included among the top collaborators of Junfeng Wang based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Junfeng Wang. Junfeng Wang is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Li, Yuanyuan, et al.. (2025). Perturbation-Resilient for Temporal-Camouflaged IoT Attacks. IEEE Internet of Things Journal. 12(17). 36488–36501. 1 indexed citations
2.
Wang, Junfeng, Xiao Tang, Jinxin Liu, et al.. (2025). Multiple STAR-RISs-Empowered Multi-User Communications With Diversified QoS Provisioning. IEEE Transactions on Vehicular Technology. 75(2). 3406–3411.
3.
Wang, Junfeng, et al.. (2024). Exploring the potential of ChatGPT in medical dialogue summarization: a study on consistency with human preferences. BMC Medical Informatics and Decision Making. 24(1). 75–75. 13 indexed citations
4.
Li, Shuangcheng, et al.. (2024). GMADV: An android malware variant generation and classification adversarial training framework. Journal of Information Security and Applications. 84. 103800–103800. 6 indexed citations
6.
Chen, Xiangru, et al.. (2024). Contrastive Learning with Transformer Initialization and Clustering Prior for Text Representation. Applied Soft Computing. 166. 112162–112162.
7.
Wang, Junfeng, et al.. (2024). MetaCluster: A Universal Interpretable Classification Framework for Cybersecurity. IEEE Transactions on Information Forensics and Security. 19. 3829–3843. 4 indexed citations
8.
Wang, Peng, et al.. (2023). TTDAT: Two-Step Training Dual Attention Transformer for Malware Classification Based on API Call Sequences. Applied Sciences. 14(1). 92–92. 1 indexed citations
9.
Wang, Junfeng, et al.. (2023). A survey of strategy-driven evasion methods for PE malware: Transformation, concealment, and attack. Computers & Security. 137. 103595–103595. 13 indexed citations
10.
Wang, Junfeng, et al.. (2023). Explainable cyber threat behavior identification based on self-adversarial topic generation. Computers & Security. 132. 103369–103369. 7 indexed citations
11.
Li, Fan, et al.. (2023). Transportation of Service Enhancement Based on Virtualization Cloud Desktop. Electronics. 12(7). 1572–1572.
12.
Wang, Junfeng, et al.. (2023). STIOCS: Active learning-based semi-supervised training framework for IOC extraction. Computers & Electrical Engineering. 112. 108981–108981. 7 indexed citations
13.
Fang, Zhiyang, et al.. (2021). A Systematic Overview of Android Malware Detection. Applied Artificial Intelligence. 36(1). 22 indexed citations
14.
Zha, Lisha, Xinyue Chang, Hongxin Zhao, et al.. (2021). Development of a Vaccine against SARS-CoV-2 Based on the Receptor-Binding Domain Displayed on Virus-Like Particles. Vaccines. 9(4). 395–395. 36 indexed citations
15.
Shen, Xiaojing, et al.. (2019). Optimal Prediction and Update for Box Set-Membership Filter. IEEE Access. 7. 41636–41646. 2 indexed citations
16.
Ullah, Farhan, Junfeng Wang, Sohail Jabbar, Fadi Al‐Turjman, & Mamoun Alazab. (2019). Source Code Authorship Attribution Using Hybrid Approach of Program Dependence Graph and Deep Learning Model. IEEE Access. 7. 141987–141999. 36 indexed citations
17.
Ullah, Farhan, et al.. (2018). LSA Based Smart Assessment Methodology for SDN Infrastructure in IoT Environment. International Journal of Parallel Programming. 48(2). 162–177. 17 indexed citations
18.
Qiao, Shaojie, et al.. (2017). Predicting Long-Term Trajectories of Connected Vehicles via the Prefix-Projection Technique. IEEE Transactions on Intelligent Transportation Systems. 19(7). 2305–2315. 52 indexed citations
19.
Wang, Junfeng, Zhong Li, Hongya Xie, Kai Xu, & Bin Ni. (2015). [Single-port VATS resection for some pulmonary diseases:strategies of the incision location in different gender].. PubMed. 95(31). 2542–6. 1 indexed citations
20.
Wang, Junfeng. (2013). Improved adaptive thresholding algorithm used in barcode reading. Jisuanji gongcheng yu sheji. 2 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026