Neha Narula

1.2k total citations · 1 hit paper
15 papers, 709 citations indexed

About

Neha Narula is a scholar working on Artificial Intelligence, Computer Networks and Communications and Information Systems. According to data from OpenAlex, Neha Narula has authored 15 papers receiving a total of 709 indexed citations (citations by other indexed papers that have themselves been cited), including 8 papers in Artificial Intelligence, 7 papers in Computer Networks and Communications and 7 papers in Information Systems. Recurrent topics in Neha Narula's work include Security and Verification in Computing (4 papers), Blockchain Technology Applications and Security (4 papers) and Network Security and Intrusion Detection (4 papers). Neha Narula is often cited by papers focused on Security and Verification in Computing (4 papers), Blockchain Technology Applications and Security (4 papers) and Network Security and Intrusion Detection (4 papers). Neha Narula collaborates with scholars based in United States, India and Austria. Neha Narula's co-authors include Bennet Yee, David Sehr, Robert Muth, Madars Virza, Ronald L. Rivest, Sunoo Park, Michael A. Specter, Robert Morris, Taesoo Kim and Nickolai Zeldovich and has published in prestigious journals such as SHILAP Revista de lepidopterología, Communications of the ACM and Journal of Physical Therapy Science.

In The Last Decade

Neha Narula

15 papers receiving 656 citations

Hit Papers

Native Client: A Sandbox for Portable, Untrusted x86 Nati... 2009 2026 2014 2020 2009 100 200 300

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Neha Narula United States 9 523 335 318 261 103 15 709
Olga Ohrimenko Australia 14 849 1.6× 328 1.0× 114 0.4× 212 0.8× 58 0.6× 35 971
Juanru Li China 16 297 0.6× 397 1.2× 415 1.3× 167 0.6× 50 0.5× 48 672
Michael Howard United States 9 282 0.5× 533 1.6× 292 0.9× 173 0.7× 21 0.2× 18 713
Jesús Molina United States 6 575 1.1× 605 1.8× 257 0.8× 345 1.3× 59 0.6× 9 886
Bowen Xu Singapore 15 404 0.8× 554 1.7× 111 0.3× 142 0.5× 22 0.2× 46 755
Gustavo Grieco United States 10 236 0.5× 421 1.3× 352 1.1× 100 0.4× 44 0.4× 16 640
Jinpeng Wei United States 13 293 0.6× 425 1.3× 202 0.6× 309 1.2× 62 0.6× 51 631
Mohan Dhawan United States 9 415 0.8× 526 1.6× 313 1.0× 413 1.6× 19 0.2× 13 892
Roxana Geambasu United States 14 324 0.6× 362 1.1× 130 0.4× 351 1.3× 43 0.4× 28 645
Cuiyun Gao China 14 305 0.6× 439 1.3× 173 0.5× 159 0.6× 15 0.1× 50 676

Countries citing papers authored by Neha Narula

Since Specialization
Citations

This map shows the geographic impact of Neha Narula's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Neha Narula with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Neha Narula more than expected).

Fields of papers citing papers by Neha Narula

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Neha Narula. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Neha Narula. The network helps show where Neha Narula may publish in the future.

Co-authorship network of co-authors of Neha Narula

This figure shows the co-authorship network connecting the top 25 collaborators of Neha Narula. A scholar is included among the top collaborators of Neha Narula based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Neha Narula. Neha Narula is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

15 of 15 papers shown
1.
Park, Sunoo, Michael A. Specter, Neha Narula, & Ronald L. Rivest. (2021). Going from bad to worse: from Internet voting to blockchain voting. 7(1). 64 indexed citations
2.
Auer, Raphael, et al.. (2021). Why Central Bank Digital Currencies. RePEc: Research Papers in Economics. 2 indexed citations
3.
Heilman, Ethan, et al.. (2020). Cryptanalysis of Curl-P and Other Attacks on the IOTA Cryptocurrency. SHILAP Revista de lepidopterología. 2 indexed citations
4.
Böhme, Rainer, Lisa Eckey, Tyler Moore, et al.. (2020). Responsible vulnerability disclosure in cryptocurrencies. Communications of the ACM. 63(10). 62–71. 7 indexed citations
5.
Heilman, Ethan, et al.. (2020). Cryptanalysis of Curl-P and Other Attacks on the IOTA Cryptocurrency. IACR Transactions on Symmetric Cryptology. 367–391. 22 indexed citations
6.
Narula, Neha, et al.. (2018). zkLedger: Privacy-Preserving Auditing for Distributed Ledgers. 65–80. 45 indexed citations
7.
Shetty, Gautam M., et al.. (2015). Effectiveness of device-based therapy for conservative management of low back pain. Journal of Physical Therapy Science. 27(7). 2139–2141. 9 indexed citations
8.
Narula, Neha, et al.. (2015). Comparative Analysis of DWT and DWT-SVD Watermarking Techniques in RGB Images. International Journal of Signal Processing Image Processing and Pattern Recognition. 8(4). 339–348. 11 indexed citations
9.
Narula, Neha, et al.. (2015). Transmission of Secured Image using DWT-SVD Technique for Applications in Wireless Sensor Network. International Journal of Computer Applications. 119(6). 11–18. 1 indexed citations
10.
Narula, Neha & Robert Morris. (2012). Executing web application queries on a partitioned database. 6–6. 2 indexed citations
11.
Chandra, Ramesh, et al.. (2011). Intrusion recovery for database-backed web applications. 101–114. 38 indexed citations
12.
Yee, Bennet, et al.. (2009). Native Client: A Sandbox for Portable, Untrusted x86 Native Code. 79–93. 374 indexed citations breakdown →
13.
Yip, Alexander, Neha Narula, Maxwell Krohn, & Robert Morris. (2009). Privacy-preserving browser-side scripting with BFlow. 233–246. 31 indexed citations
14.
Yee, Bennet, et al.. (2009). Will appear in the 2009 IEEE Symposium on Security and Privacy Native Client: A Sandbox for Portable, Untrusted x86 Native Code. 1 indexed citations
15.
Yee, Bennet, et al.. (2009). Native Client. Communications of the ACM. 53(1). 91–99. 100 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026