Mohammed Maray

778 total citations
58 papers, 369 citations indexed

About

Mohammed Maray is a scholar working on Computer Networks and Communications, Artificial Intelligence and Computer Vision and Pattern Recognition. According to data from OpenAlex, Mohammed Maray has authored 58 papers receiving a total of 369 indexed citations (citations by other indexed papers that have themselves been cited), including 25 papers in Computer Networks and Communications, 21 papers in Artificial Intelligence and 17 papers in Computer Vision and Pattern Recognition. Recurrent topics in Mohammed Maray's work include Network Security and Intrusion Detection (12 papers), Advanced Malware Detection Techniques (11 papers) and IoT and Edge/Fog Computing (8 papers). Mohammed Maray is often cited by papers focused on Network Security and Intrusion Detection (12 papers), Advanced Malware Detection Techniques (11 papers) and IoT and Edge/Fog Computing (8 papers). Mohammed Maray collaborates with scholars based in Saudi Arabia, Egypt and Pakistan. Mohammed Maray's co-authors include Junaid Shuja, Anand Paul, Jeonghong Kim, Muhammad Bilal, Mesfer Al Duhayyim, Fatma S. Alrayes, Saud S. Alotaibi, Faiz Abdullah Alotaibi, Saad Mustafa and Rana Alabdan and has published in prestigious journals such as Scientific Reports, IEEE Access and Sensors.

In The Last Decade

Mohammed Maray

47 papers receiving 348 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Mohammed Maray Saudi Arabia 11 142 115 76 58 45 58 369
M. Baskar India 11 137 1.0× 77 0.7× 63 0.8× 60 1.0× 43 1.0× 40 321
Pradeep Bedi India 13 116 0.8× 61 0.5× 73 1.0× 32 0.6× 20 0.4× 39 348
Mohammed Nasser Al-Andoli Malaysia 12 82 0.6× 122 1.1× 51 0.7× 33 0.6× 43 1.0× 32 325
Surendran Rajendran India 10 95 0.7× 71 0.6× 72 0.9× 33 0.6× 23 0.5× 30 336
B. Amutha India 10 167 1.2× 83 0.7× 62 0.8× 35 0.6× 53 1.2× 51 317
S. Prabu India 9 85 0.6× 77 0.7× 67 0.9× 56 1.0× 37 0.8× 26 322
Dongyang Li China 12 141 1.0× 174 1.5× 50 0.7× 81 1.4× 55 1.2× 64 409
V. Arulkumar India 10 97 0.7× 96 0.8× 96 1.3× 129 2.2× 39 0.9× 20 380
Meenu Chawla India 13 203 1.4× 126 1.1× 123 1.6× 78 1.3× 34 0.8× 60 520
Guanghua Zhang China 9 89 0.6× 153 1.3× 59 0.8× 41 0.7× 41 0.9× 41 298

Countries citing papers authored by Mohammed Maray

Since Specialization
Citations

This map shows the geographic impact of Mohammed Maray's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Mohammed Maray with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Mohammed Maray more than expected).

Fields of papers citing papers by Mohammed Maray

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Mohammed Maray. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Mohammed Maray. The network helps show where Mohammed Maray may publish in the future.

Co-authorship network of co-authors of Mohammed Maray

This figure shows the co-authorship network connecting the top 25 collaborators of Mohammed Maray. A scholar is included among the top collaborators of Mohammed Maray based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Mohammed Maray. Mohammed Maray is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Alotaibi, Sultan, et al.. (2025). Two-Tiered Privacy Preserving Framework for Software-Defined Networking Driven Defence Mechanism for Consumer Platforms. IEEE Access. 13. 26684–26694. 1 indexed citations
2.
Alrayes, Fatma S., et al.. (2025). Ensuring Zero Trust Security in Consumer Internet of Things Using Federated Learning-Based Attack Detection Model. IEEE Access. 13. 54423–54438. 1 indexed citations
3.
Shuja, Junaid, et al.. (2024). Deep Neural Networks meet computation offloading in mobile edge networks: Applications, taxonomy, and open issues. Journal of Network and Computer Applications. 226. 103886–103886. 10 indexed citations
4.
Maray, Mohammed, et al.. (2024). Mathematical modelling-based blockchain with attention deep learning model for cybersecurity in IoT-consumer electronics. Alexandria Engineering Journal. 113. 366–377. 2 indexed citations
5.
Almuqren, Latifah, et al.. (2024). Optimal Deep Learning Empowered Malicious User Detection for Spectrum Sensing in Cognitive Radio Networks. IEEE Access. 12. 35300–35308. 6 indexed citations
6.
Alabduallah, Bayan, Mohammed Maray, Nuha Alruwais, et al.. (2024). Class imbalanced data handling with cyberattack classification using Hybrid Salp Swarm Algorithm with deep learning approach. Alexandria Engineering Journal. 106. 654–663. 2 indexed citations
8.
Maray, Mohammed, et al.. (2024). Intelligent Pattern Recognition Using Equilibrium Optimizer With Deep Learning Model for Android Malware Detection. IEEE Access. 12. 24516–24524. 6 indexed citations
9.
Alruwais, Nuha, et al.. (2024). SMART SURVEILLANCE: ADVANCED DEEP LEARNING-BASED VEHICLE DETECTION AND TRACKING MODEL ON UAV IMAGERY. Fractals. 33(2). 2 indexed citations
10.
Chiroma, Haruna, Mohamed Hashem, & Mohammed Maray. (2024). Bibliometric analysis for artificial intelligence in the internet of medical things: mapping and performance analysis. Frontiers in Artificial Intelligence. 7. 1347815–1347815. 2 indexed citations
11.
Maray, Mohammed, et al.. (2023). Energy aware routing with optimal deep learning based anomaly detection in 6G-IoT networks. Sustainable Energy Technologies and Assessments. 60. 103494–103494. 5 indexed citations
12.
Alonazi, Mohammed, et al.. (2023). Automated Facial Emotion Recognition Using the Pelican Optimization Algorithm with a Deep Convolutional Neural Network. Electronics. 12(22). 4608–4608. 15 indexed citations
13.
Alabdan, Rana, et al.. (2023). Modified Bald Eagle Search Algorithm With Deep Learning-Driven Sleep Quality Prediction for Healthcare Monitoring Systems. IEEE Access. 11. 135385–135393. 3 indexed citations
14.
Hamza, Manar Ahmed, Hamed Alqahtani, Dalia H. Elkamchouchi, et al.. (2022). Hyperparameter Tuned Deep Autoencoder Model for Road Classification Model in Intelligent Transportation Systems. Applied Sciences. 12(20). 10605–10605. 2 indexed citations
15.
Maray, Mohammed, Fatma S. Alrayes, Saud S. Alotaibi, et al.. (2022). Intelligent metaheuristics with optimal machine learning approach for malware detection on IoT‐enabled maritime transportation systems. Expert Systems. 39(10). 9 indexed citations
16.
Hilal, Anwer Mustafa, Dalia H. Elkamchouchi, Saud S. Alotaibi, et al.. (2022). Manta Ray Foraging Optimization with Transfer Learning Driven Facial Emotion Recognition. Sustainability. 14(21). 14308–14308. 6 indexed citations
18.
Alqahtani, Hamed, Saud S. Alotaibi, Fatma S. Alrayes, et al.. (2022). Evolutionary Algorithm with Deep Auto Encoder Network Based Website Phishing Detection and Classification. Applied Sciences. 12(15). 7441–7441. 8 indexed citations
19.
Muralidharan, C., et al.. (2022). FogDedupe: A Fog-Centric Deduplication Approach Using Multi-Key Homomorphic Encryption Technique. Journal of Sensors. 2022. 1–16. 7 indexed citations
20.
Alrayes, Fatma S., Mohammed Maray, Ayman Yafoz, et al.. (2022). Modeling of Botnet Detection Using Barnacles Mating Optimizer with Machine Learning Model for Internet of Things Environment. Electronics. 11(20). 3411–3411. 12 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026