Mansour Ahmadi

1.3k total citations
14 papers, 653 citations indexed

About

Mansour Ahmadi is a scholar working on Computer Networks and Communications, Signal Processing and Information Systems. According to data from OpenAlex, Mansour Ahmadi has authored 14 papers receiving a total of 653 indexed citations (citations by other indexed papers that have themselves been cited), including 10 papers in Computer Networks and Communications, 10 papers in Signal Processing and 8 papers in Information Systems. Recurrent topics in Mansour Ahmadi's work include Advanced Malware Detection Techniques (10 papers), Network Security and Intrusion Detection (9 papers) and Spam and Phishing Detection (6 papers). Mansour Ahmadi is often cited by papers focused on Advanced Malware Detection Techniques (10 papers), Network Security and Intrusion Detection (9 papers) and Spam and Phishing Detection (6 papers). Mansour Ahmadi collaborates with scholars based in Italy, Iran and Mexico. Mansour Ahmadi's co-authors include Giorgio Giacinto, Mikhail Trofimov, Dmitry Ulyanov, Johannes Kinder, Santanu Kumar Dash, Lorenzo Cavallaro, Guillermo Suárez‐Tangil, Ashkan Sami, Kimberly Tam and Babak Yadegari and has published in prestigious journals such as IBM Systems Journal, Natural Language Engineering and Security and Communication Networks.

In The Last Decade

Mansour Ahmadi

13 papers receiving 619 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Mansour Ahmadi Italy 9 606 533 304 176 168 14 653
Theodoor Scholte France 4 591 1.0× 503 0.9× 375 1.2× 146 0.8× 202 1.2× 4 674
ElMouatez Billah Karbab Canada 11 461 0.8× 459 0.9× 258 0.8× 139 0.8× 143 0.9× 17 554
Santanu Kumar Dash United Kingdom 7 437 0.7× 375 0.7× 244 0.8× 194 1.1× 144 0.9× 21 518
Clemens Kolbitsch United States 6 531 0.9× 394 0.7× 315 1.0× 123 0.7× 251 1.5× 6 595
Ekta Gandotra India 11 472 0.8× 424 0.8× 260 0.9× 94 0.5× 162 1.0× 31 520
Joshua Saxe Finland 5 435 0.7× 379 0.7× 175 0.6× 43 0.2× 254 1.5× 7 494
Dhilung Kirat United States 9 363 0.6× 303 0.6× 195 0.6× 80 0.5× 166 1.0× 12 413
Philipp Trinius Germany 5 511 0.8× 468 0.9× 285 0.9× 102 0.6× 171 1.0× 8 563
Silvio Cesare Australia 8 342 0.6× 268 0.5× 236 0.8× 100 0.6× 118 0.7× 14 403
Ching-Hao Mao Taiwan 9 523 0.9× 498 0.9× 281 0.9× 256 1.5× 159 0.9× 29 648

Countries citing papers authored by Mansour Ahmadi

Since Specialization
Citations

This map shows the geographic impact of Mansour Ahmadi's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Mansour Ahmadi with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Mansour Ahmadi more than expected).

Fields of papers citing papers by Mansour Ahmadi

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Mansour Ahmadi. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Mansour Ahmadi. The network helps show where Mansour Ahmadi may publish in the future.

Co-authorship network of co-authors of Mansour Ahmadi

This figure shows the co-authorship network connecting the top 25 collaborators of Mansour Ahmadi. A scholar is included among the top collaborators of Mansour Ahmadi based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Mansour Ahmadi. Mansour Ahmadi is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

14 of 14 papers shown
1.
Ahmadi, Mansour, et al.. (2021). PTAuth: Temporal Memory Safety via Robust Points-to Authentication.. USENIX Security Symposium. 1037–1054. 2 indexed citations
2.
Ahmadi, Mansour, et al.. (2021). Finding Bugs Using Your Own Code: Detecting Functionally-similar yet Inconsistent Code. USENIX Security Symposium. 2025–2040. 4 indexed citations
3.
Suárez‐Tangil, Guillermo, Santanu Kumar Dash, Mansour Ahmadi, et al.. (2017). DroidSieve. Research Portal (King's College London). 309–320. 142 indexed citations
4.
Ahmadi, Mansour, et al.. (2016). Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification. UNICA IRIS Institutional Research Information System (University of Cagliari). 183–194. 224 indexed citations
5.
Ahmadi, Mansour, Battista Biggio, Steven Arzt, Davide Ariu, & Giorgio Giacinto. (2016). Detecting Misuse of Google Cloud Messaging in Android Badware. UNICA IRIS Institutional Research Information System (University of Cagliari). 103–112. 13 indexed citations
6.
Dash, Santanu Kumar, Guillermo Suárez‐Tangil, Kimberly Tam, et al.. (2016). DroidScribe: Classifying Android Malware Based on Runtime Behavior. Research Portal (King's College London). 252–261. 117 indexed citations
7.
Ariu, Davide, et al.. (2015). Clustering android malware families by http traffic. UNICA IRIS Institutional Research Information System (University of Cagliari). 128–135. 30 indexed citations
8.
Ahmadi, Mansour, et al.. (2015). DLLMiner: structural mining for malware detection. Security and Communication Networks. 8(18). 3311–3322. 35 indexed citations
9.
Ahmadi, Mansour, et al.. (2013). Malware detection by behavioural sequential patterns. Computer Fraud & Security. 2013(8). 11–19. 43 indexed citations
10.
Ahmadi, Mansour, et al.. (2013). SePaS: Word sense disambiguation bysequentialpatterns insentences. Natural Language Engineering. 21(2). 251–269. 4 indexed citations
11.
Sami, Ashkan, et al.. (2012). Semantic Malware Detection by Deploying Graph Mining. 27 indexed citations
12.
Ahmadi, Mansour. (2012). The application of system dynamics and discrete event simulation in supply chain management of Swedish manufacturing industries. KTH Publication Database DiVA (KTH Royal Institute of Technology). 2 indexed citations
13.
Ahmadi, Mansour, et al.. (2012). A novel approach toward spam detection based on iterative patterns. 37. 318–323. 2 indexed citations
14.
Ahmadi, Mansour, et al.. (1988). NetView/PC. IBM Systems Journal. 27(1). 32–44. 8 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026