Kehe Wu

739 total citations
73 papers, 499 citations indexed

About

Kehe Wu is a scholar working on Artificial Intelligence, Computer Networks and Communications and Information Systems. According to data from OpenAlex, Kehe Wu has authored 73 papers receiving a total of 499 indexed citations (citations by other indexed papers that have themselves been cited), including 34 papers in Artificial Intelligence, 33 papers in Computer Networks and Communications and 26 papers in Information Systems. Recurrent topics in Kehe Wu's work include Network Security and Intrusion Detection (18 papers), Advanced Malware Detection Techniques (12 papers) and Smart Grid and Power Systems (9 papers). Kehe Wu is often cited by papers focused on Network Security and Intrusion Detection (18 papers), Advanced Malware Detection Techniques (12 papers) and Smart Grid and Power Systems (9 papers). Kehe Wu collaborates with scholars based in China. Kehe Wu's co-authors include Zuge Chen, Wei Li, Xiaoliang Zhang, Wei Li, Jie Tong, Wei Li, Chenyi Zhang, Gang Ma, Fei Chen and Long Chen and has published in prestigious journals such as IEEE Access, Energy and Energies.

In The Last Decade

Kehe Wu

61 papers receiving 455 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Kehe Wu China 10 319 290 149 123 78 73 499
Basil AsSadhan Saudi Arabia 14 317 1.0× 284 1.0× 173 1.2× 99 0.8× 45 0.6× 34 451
Xiaobin Tan China 13 444 1.4× 168 0.6× 89 0.6× 109 0.9× 85 1.1× 91 569
Grégory Blanc France 12 323 1.0× 259 0.9× 211 1.4× 156 1.3× 41 0.5× 33 569
Youngsoo Kim South Korea 13 377 1.2× 180 0.6× 194 1.3× 109 0.9× 86 1.1× 41 500
Forough Ja’fari Iran 15 386 1.2× 144 0.5× 110 0.7× 182 1.5× 90 1.2× 32 546
Eduardo K. Viegas Brazil 13 458 1.4× 355 1.2× 289 1.9× 92 0.7× 32 0.4× 58 591
Amjad Alsirhani Saudi Arabia 14 253 0.8× 175 0.6× 150 1.0× 125 1.0× 66 0.8× 31 434
Rahamatullah Khondoker Germany 12 501 1.6× 176 0.6× 147 1.0× 95 0.8× 106 1.4× 43 610
Hamed HaddadPajouh Canada 7 545 1.7× 306 1.1× 401 2.7× 228 1.9× 69 0.9× 10 714

Countries citing papers authored by Kehe Wu

Since Specialization
Citations

This map shows the geographic impact of Kehe Wu's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Kehe Wu with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Kehe Wu more than expected).

Fields of papers citing papers by Kehe Wu

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Kehe Wu. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Kehe Wu. The network helps show where Kehe Wu may publish in the future.

Co-authorship network of co-authors of Kehe Wu

This figure shows the co-authorship network connecting the top 25 collaborators of Kehe Wu. A scholar is included among the top collaborators of Kehe Wu based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Kehe Wu. Kehe Wu is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
2.
Wu, Kehe, et al.. (2023). Design and Implementation of the Zero Trust Model in the Power Internet of Things. International Transactions on Electrical Energy Systems. 2023. 1–13. 5 indexed citations
4.
Wu, Kehe, et al.. (2022). Research on Power Price Forecasting Based on PSO-XGBoost. Electronics. 11(22). 3763–3763. 21 indexed citations
5.
Deng, Chunyu & Kehe Wu. (2021). Residential Demand Response Strategy Based on Deep Deterministic Policy Gradient. Processes. 9(4). 660–660. 3 indexed citations
6.
Wu, Kehe, Shi Jin, Zhimin Guo, Zheng Zhang, & Junfei Cai. (2021). Research on Security Strategy of Power Internet of Things Devices Based on Zero-Trust. 79–83. 4 indexed citations
7.
Wu, Kehe, et al.. (2020). A lightweight SM2-based security authentication scheme for smart grids. Alexandria Engineering Journal. 60(1). 435–446. 14 indexed citations
8.
Wu, Kehe, et al.. (2017). Time Series Data Storage System Based on Big Data Technologies: Architecture and Implementation. International Journal of Emerging Electric Power Systems. 18(3). 1 indexed citations
9.
Wu, Kehe, Yi Li, Fei Chen, & Long Chen. (2015). A method for describing industrial control system network attack using object Petri net. IEEJ Transactions on Electrical and Electronic Engineering. 11(2). 216–227. 2 indexed citations
10.
Wu, Kehe, et al.. (2013). An Information Security Risk Evaluation Scheme Based on OWA Operator and Grey System Theory. International Journal of Applied Mathematics & Statistics. 43(13). 232–238. 1 indexed citations
11.
Wu, Kehe, et al.. (2013). Smart Caching Based on Mobile Agent of Power WebGIS Platform. The Scientific World JOURNAL. 2013(1). 757182–757182.
12.
Wu, Kehe, et al.. (2013). Design and Implementation of Open Source WebGIS Client Framework Based on Flex. 1. 1405–1408. 2 indexed citations
13.
Wu, Kehe. (2012). Application of ODS technology in evaluation support system of power grid investment benefit. Power System Protection and Control.
14.
Zhang, Tong, Kehe Wu, Gang Ma, & Wei Li. (2012). A Network Business Security Model Based on Developed BLP Model in Electric Power Enterprise. PRZEGLĄD ELEKTROTECHNICZNY. 63–66. 1 indexed citations
15.
16.
Ma, Gang, et al.. (2012). A Method of Workflow Model Structure Verification Based on Graph Theory. Journal of Convergence Information Technology. 7(17). 350–356. 1 indexed citations
17.
Wu, Kehe, Tao Ding, & Jianping He. (2011). The research of intrusion detection technology based on heuristic analysis. 164–166. 1 indexed citations
18.
Wu, Kehe, et al.. (2011). Research of spatial index & caching for power GIS. 26. 354–357.
19.
Wu, Kehe, Tong Zhang, Li Wei, & Gang Ma. (2009). Security Model Based on Network Business Security. 577–580. 8 indexed citations
20.
Wu, Kehe, et al.. (2009). The Technique of Network Diode. 24. 1923–1926. 3 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026