Norbert Tihanyi

1.0k total citations · 3 hit papers
31 papers, 383 citations indexed

About

Norbert Tihanyi is a scholar working on Artificial Intelligence, Computer Networks and Communications and Computer Vision and Pattern Recognition. According to data from OpenAlex, Norbert Tihanyi has authored 31 papers receiving a total of 383 indexed citations (citations by other indexed papers that have themselves been cited), including 13 papers in Artificial Intelligence, 10 papers in Computer Networks and Communications and 10 papers in Computer Vision and Pattern Recognition. Recurrent topics in Norbert Tihanyi's work include Chaos-based Image/Signal Encryption (10 papers), Advanced Malware Detection Techniques (8 papers) and Network Security and Intrusion Detection (6 papers). Norbert Tihanyi is often cited by papers focused on Chaos-based Image/Signal Encryption (10 papers), Advanced Malware Detection Techniques (8 papers) and Network Security and Intrusion Detection (6 papers). Norbert Tihanyi collaborates with scholars based in United Arab Emirates, Hungary and United Kingdom. Norbert Tihanyi's co-authors include Mohamed Amine Ferrag, Mérouane Debbah, Lucas C. Cordeiro, Ammar Battah, Thierry Lestable, Burak Kantarcı, Kim‐Kwang Raymond Choo, Othmane Friha, Djallel Hamouda and Muna Al-Hawawreh and has published in prestigious journals such as SHILAP Revista de lepidopterología, IEEE Communications Surveys & Tutorials and IEEE Access.

In The Last Decade

Norbert Tihanyi

25 papers receiving 354 citations

Hit Papers

Revolutionizing Cyber Threat Detection With Large Languag... 2024 2026 2025 2024 2024 2025 25 50 75 100

Peers

Norbert Tihanyi
Yulai Xie China
Norbert Tihanyi
Citations per year, relative to Norbert Tihanyi Norbert Tihanyi (= 1×) peers Yulai Xie

Countries citing papers authored by Norbert Tihanyi

Since Specialization
Citations

This map shows the geographic impact of Norbert Tihanyi's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Norbert Tihanyi with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Norbert Tihanyi more than expected).

Fields of papers citing papers by Norbert Tihanyi

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Norbert Tihanyi. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Norbert Tihanyi. The network helps show where Norbert Tihanyi may publish in the future.

Co-authorship network of co-authors of Norbert Tihanyi

This figure shows the co-authorship network connecting the top 25 collaborators of Norbert Tihanyi. A scholar is included among the top collaborators of Norbert Tihanyi based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Norbert Tihanyi. Norbert Tihanyi is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Ferrag, Mohamed Amine, et al.. (2026). From prompt injections to protocol exploits: Threats in LLM-powered AI agents workflows. SHILAP Revista de lepidopterología. 2 indexed citations
2.
Ferrag, Mohamed Amine, Mohamed Chahine Ghanem, Iqbal H. Sarker, et al.. (2025). Generative AI and LLMs for Critical Infrastructure Protection: Evaluation Benchmarks, Agentic AI, Challenges, and Opportunities. Sensors. 25(6). 1666–1666. 10 indexed citations
4.
Ferrag, Mohamed Amine, et al.. (2025). Generative AI in cybersecurity: A comprehensive review of LLM applications and vulnerabilities. SHILAP Revista de lepidopterología. 5. 1–46. 19 indexed citations breakdown →
5.
Ferrag, Mohamed Amine, Norbert Tihanyi, & Mérouane Debbah. (2025). Reasoning beyond limits: Advances and open problems for LLMs. ICT Express. 11(6). 1054–1096. 2 indexed citations
6.
Tihanyi, Norbert, et al.. (2024). Rapid Taint Assisted Concolic Execution (TACE). Research Explorer (The University of Manchester). 627–631. 2 indexed citations
7.
Kantarcı, Burak, et al.. (2024). From 5G to 6G Networks: A Survey on AI-Based Jamming and Interference Detection and Mitigation. IEEE Open Journal of the Communications Society. 5. 3920–3974. 16 indexed citations
9.
Tihanyi, Norbert, et al.. (2024). Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the Cleartext. IEEE Transactions on Information Forensics and Security. 19. 2981–2996. 2 indexed citations
10.
Ferrag, Mohamed Amine, et al.. (2024). Revolutionizing Cyber Threat Detection With Large Language Models: A Privacy-Preserving BERT-Based Lightweight Model for IoT/IIoT Devices. IEEE Access. 12. 23733–23750. 101 indexed citations breakdown →
11.
Tihanyi, Norbert, et al.. (2023). Simple chain automaton random number generator for IoT devices. Acta Informatica. 60(3). 317–329. 1 indexed citations
12.
Tihanyi, Norbert, et al.. (2023). The FormAI Dataset: Generative AI in Software Security through the Lens of Formal Verification. 33–43. 19 indexed citations
13.
Tihanyi, Norbert, et al.. (2023). On reciprocal sums of infinitely many arithmetic progressions with increasing prime power moduli. Acta Mathematica Academiae Scientiarum Hungaricae. 171(2). 203–220.
14.
Gáll, József, et al.. (2021). A Full Cycle Length Pseudorandom Number Generator Based on Compositions of Automata. Informatica. 45(2). 1 indexed citations
17.
Gáll, József, et al.. (2019). Some Remarks and Tests on the Dh1 Cryptosystem Based on Automata Compositions. Informatica. 43(2). 2 indexed citations
18.
19.
Tihanyi, Norbert. (2013). Comparison of two Hungarian password databases. Pollack Periodica. 8(2). 179–186.
20.
Tihanyi, Norbert, et al.. (2013). Efficient computing of n-dimensional simultaneous Diophantine approximation problems. SHILAP Revista de lepidopterología. 5(1). 16–34. 5 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026