Mohamed Roushdy

1.4k total citations
76 papers, 910 citations indexed

About

Mohamed Roushdy is a scholar working on Computer Vision and Pattern Recognition, Artificial Intelligence and Signal Processing. According to data from OpenAlex, Mohamed Roushdy has authored 76 papers receiving a total of 910 indexed citations (citations by other indexed papers that have themselves been cited), including 27 papers in Computer Vision and Pattern Recognition, 23 papers in Artificial Intelligence and 14 papers in Signal Processing. Recurrent topics in Mohamed Roushdy's work include AI in cancer detection (10 papers), Biometric Identification and Security (8 papers) and User Authentication and Security Systems (7 papers). Mohamed Roushdy is often cited by papers focused on AI in cancer detection (10 papers), Biometric Identification and Security (8 papers) and User Authentication and Security Systems (7 papers). Mohamed Roushdy collaborates with scholars based in Egypt, Yemen and France. Mohamed Roushdy's co-authors include Yasmeen George, Hala H. Zayed, Mohammed A.‐M. Salem, Bassant M. Elbagoury, M. Abdel-Aziz, Marco Alfonse, Mohamed M. El Nady, Walaa Gad, Abdel Halim Salem and Kenneth Revett and has published in prestigious journals such as SHILAP Revista de lepidopterología, Expert Systems with Applications and IEEE Access.

In The Last Decade

Mohamed Roushdy

72 papers receiving 841 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Mohamed Roushdy Egypt 15 386 332 231 97 89 76 910
Kesari Verma India 15 520 1.3× 263 0.8× 398 1.7× 72 0.7× 41 0.5× 50 928
Devvi Sarwinda Indonesia 14 330 0.9× 227 0.7× 280 1.2× 36 0.4× 79 0.9× 80 854
Sunil Aryal Australia 19 481 1.2× 259 0.8× 140 0.6× 43 0.4× 35 0.4× 66 1.1k
Changhee Han Japan 10 316 0.8× 325 1.0× 249 1.1× 63 0.6× 29 0.3× 27 762
Vatsala Anand India 18 454 1.2× 291 0.9× 294 1.3× 46 0.5× 31 0.3× 165 1.5k
Long Gao China 9 417 1.1× 269 0.8× 101 0.4× 40 0.4× 46 0.5× 22 800
Chaosheng Tang China 15 389 1.0× 286 0.9× 239 1.0× 35 0.4× 44 0.5× 55 1.1k
Sharjil Saeed Pakistan 15 262 0.7× 111 0.3× 89 0.4× 54 0.6× 67 0.8× 23 749
Feng Yan China 14 489 1.3× 360 1.1× 75 0.3× 45 0.5× 45 0.5× 47 946

Countries citing papers authored by Mohamed Roushdy

Since Specialization
Citations

This map shows the geographic impact of Mohamed Roushdy's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Mohamed Roushdy with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Mohamed Roushdy more than expected).

Fields of papers citing papers by Mohamed Roushdy

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Mohamed Roushdy. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Mohamed Roushdy. The network helps show where Mohamed Roushdy may publish in the future.

Co-authorship network of co-authors of Mohamed Roushdy

This figure shows the co-authorship network connecting the top 25 collaborators of Mohamed Roushdy. A scholar is included among the top collaborators of Mohamed Roushdy based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Mohamed Roushdy. Mohamed Roushdy is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Aref, Mostafa, et al.. (2024). STUDYING THE IMPACT OF DATASET BALANCING ON MACHINE LEARNING-BASED INTRUSION DETECTION SYSTEMS FOR IOT. 24(3). 41–57. 2 indexed citations
2.
Alfonse, Marco, et al.. (2024). Biometric systems for identification and verification scenarios using spatial footsteps components. Neural Computing and Applications. 36(7). 3817–3836. 1 indexed citations
3.
Aref, Mostafa, et al.. (2024). Attention-Driven Transfer Learning Model for Improved IoT Intrusion Detection. Big Data and Cognitive Computing. 8(9). 116–116. 4 indexed citations
4.
Roushdy, Mohamed, et al.. (2023). PREDICTION OF CUSTOMER CHURN IN THE BANKING SECTOR: REVIEW. Journal of Southwest Jiaotong University. 58(4).
5.
Gad, Walaa, et al.. (2023). Prediction Of O-Glycosylation Site Using Pre-Trained Language Model And Machine Learning. 23(1). 41–52. 2 indexed citations
6.
Roushdy, Mohamed, et al.. (2023). Optimizing anomaly-based attack detection using classification machine learning. Neural Computing and Applications. 36(6). 3239–3257. 6 indexed citations
7.
Gad, Walaa, et al.. (2023). GNNGLY: Graph Neural Networks for Glycan Classification. IEEE Access. 11. 51838–51847. 1 indexed citations
8.
Gad, Walaa, et al.. (2022). PUStackNGly: Positive-Unlabeled and Stacking Learning for N-Linked Glycosylation Site Prediction. IEEE Access. 10. 12702–12713. 12 indexed citations
9.
10.
Gad, Walaa, et al.. (2021). Artificial Intelligence for Glycation Site Prediction. 64. 1 indexed citations
11.
Alfonse, Marco, et al.. (2021). Classification of breast cancer using microarray gene expression data: A survey. Journal of Biomedical Informatics. 117. 103764–103764. 44 indexed citations
12.
Roushdy, Mohamed, et al.. (2021). Customer Retention: Detecting Churners in Telecoms Industry using Data Mining Techniques. International Journal of Advanced Computer Science and Applications. 12(3). 4 indexed citations
13.
Roushdy, Mohamed, et al.. (2021). A DEEP LEARNING FRAMEWORK TO IMPROVE CUSTOMER RETENTION. Journal of Southwest Jiaotong University. 56(6). 285–296. 1 indexed citations
14.
Moawad, Ibrahim F., et al.. (2019). Hybrid Method for Modeling User Interests based on Social Network. 242. 68–73. 1 indexed citations
15.
Salem, Mohammed A.‐M., et al.. (2019). Feature Extraction and Analysis for Lung Nodule Classification using Random Forest. 248–252. 9 indexed citations
16.
Roushdy, Mohamed, et al.. (2019). Modelling meme adoption pattern on online social networks. 17(3). 243–258. 3 indexed citations
17.
Alfonse, Marco, et al.. (2017). A comparative analysis of Cross Site Scripting (XSS) detecting and defensive techniques. 36–42. 12 indexed citations
18.
Roushdy, Mohamed, et al.. (2017). Effectiveness of the K-core Nodes as Seeds for Influence Maximisation in Dynamic Cascades. 2. 3 indexed citations
19.
Abdel-Aziz, M., et al.. (2012). Using GPU-accelerated Genetic Algorithm for non-linear motion deblurring in a single image. 2 indexed citations
20.
Salem, Abdel Halim, et al.. (2012). A survey of EEG based user authentication schemes. 32 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026