Omar Chowdhury

1.1k total citations
35 papers, 620 citations indexed

About

Omar Chowdhury is a scholar working on Artificial Intelligence, Signal Processing and Information Systems. According to data from OpenAlex, Omar Chowdhury has authored 35 papers receiving a total of 620 indexed citations (citations by other indexed papers that have themselves been cited), including 25 papers in Artificial Intelligence, 15 papers in Signal Processing and 14 papers in Information Systems. Recurrent topics in Omar Chowdhury's work include Advanced Malware Detection Techniques (14 papers), Security and Verification in Computing (10 papers) and Access Control and Trust (7 papers). Omar Chowdhury is often cited by papers focused on Advanced Malware Detection Techniques (14 papers), Security and Verification in Computing (10 papers) and Access Control and Trust (7 papers). Omar Chowdhury collaborates with scholars based in United States, Hong Kong and Belgium. Omar Chowdhury's co-authors include Elisa Bertino, Syed Rafiul Hussain, Ninghui Li, Shagufta Mehnaz, Ankush Singla, Cristina Nita-Rotaru, Aniket Kate, William H. Winsborough, Keith Irwin and Ting Yu and has published in prestigious journals such as SHILAP Revista de lepidopterología, IEEE Transactions on Dependable and Secure Computing and Systems.

In The Last Decade

Omar Chowdhury

33 papers receiving 602 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Omar Chowdhury United States 12 330 268 187 181 178 35 620
Syed Rafiul Hussain United States 14 471 1.4× 253 0.9× 238 1.3× 185 1.0× 154 0.9× 33 704
Tuomas Aura Finland 18 523 1.6× 242 0.9× 193 1.0× 202 1.1× 94 0.5× 61 750
Hsu‐Chun Hsiao Taiwan 14 475 1.4× 341 1.3× 124 0.7× 244 1.3× 127 0.7× 48 714
Ralf Sasse Switzerland 12 392 1.2× 337 1.3× 113 0.6× 315 1.7× 100 0.6× 27 629
Randy Marchany United States 13 624 1.9× 169 0.6× 161 0.9× 141 0.8× 225 1.3× 55 736
Ravishankar Borgaonkar Germany 12 398 1.2× 221 0.8× 214 1.1× 225 1.2× 142 0.8× 29 591
Saša Radomirović Switzerland 10 335 1.0× 191 0.7× 86 0.5× 290 1.6× 90 0.5× 23 507
René Rydhof Hansen Denmark 13 255 0.8× 224 0.8× 104 0.6× 235 1.3× 157 0.9× 66 641
Ashraf Matrawy Canada 15 878 2.7× 194 0.7× 277 1.5× 201 1.1× 165 0.9× 82 1.0k
Charles Reis United States 16 728 2.2× 372 1.4× 292 1.6× 366 2.0× 270 1.5× 20 1.2k

Countries citing papers authored by Omar Chowdhury

Since Specialization
Citations

This map shows the geographic impact of Omar Chowdhury's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Omar Chowdhury with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Omar Chowdhury more than expected).

Fields of papers citing papers by Omar Chowdhury

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Omar Chowdhury. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Omar Chowdhury. The network helps show where Omar Chowdhury may publish in the future.

Co-authorship network of co-authors of Omar Chowdhury

This figure shows the co-authorship network connecting the top 25 collaborators of Omar Chowdhury. A scholar is included among the top collaborators of Omar Chowdhury based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Omar Chowdhury. Omar Chowdhury is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
3.
Chowdhury, Omar, et al.. (2024). ARMOR: A Formally Verified Implementation of X.509 Certificate Chain Validation. 1462–1480. 1 indexed citations
5.
Chowdhury, Omar, et al.. (2023). VetIoT: On Vetting IoT Defenses Enforcing Policies at Runtime. 1–9. 1 indexed citations
6.
Moitra, Abha, et al.. (2021). VERDICT: A Language and Framework for Engineering Cyber Resilient and Safe System. Systems. 9(1). 18–18. 9 indexed citations
7.
Chowdhury, Omar, et al.. (2021). On Re-engineering the X.509 PKI with Executable Specification for Better Implementation Guarantees. 1388–1404. 4 indexed citations
8.
Chowdhury, Omar, et al.. (2021). All your Credentials are Belong to Us: On Insecure WPA2-Enterprise Configurations. 1100–1117. 5 indexed citations
9.
Reynolds, Andrew, et al.. (2020). SYSLITE: Syntax-Guided Synthesis of PLTL Formulas from Finite Traces. reposiTUm (TU Wien). 5 indexed citations
10.
Singla, Ankush, Syed Rafiul Hussain, Omar Chowdhury, Elisa Bertino, & Ninghui Li. (2020). Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks. SHILAP Revista de lepidopterología. 2020(1). 126–142. 13 indexed citations
12.
Hussain, Syed Rafiul, et al.. (2019). Insecure connection bootstrapping in cellular networks. 1–11. 41 indexed citations
13.
Hussain, Syed Rafiul, et al.. (2019). 5GReasoner. 669–684. 93 indexed citations
14.
Moitra, Abha, et al.. (2019). Architectural and Behavioral Analysis for Cyber Security. 1–10. 10 indexed citations
15.
Chowdhury, Omar, et al.. (2017). Analyzing Operational Behavior of Stateful Protocol Implementations for Detecting Semantic Bugs. 627–638. 20 indexed citations
16.
Yang, Wei‐Ning, Ninghui Li, Omar Chowdhury, Aiping Xiong, & Robert W. Proctor. (2016). An Empirical Study of Mnemonic Sentence-based Password Generation Strategies. 1216–1229. 21 indexed citations
17.
Wang, Tianhao, et al.. (2016). On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols. 603–615. 1 indexed citations
18.
Chen, Hai‐Ning, Omar Chowdhury, Jing Chen, Ninghui Li, & Robert W. Proctor. (2015). Towards quantification of firewall policy complexity. 1–2. 1 indexed citations
19.
Chowdhury, Omar, et al.. (2012). Ensuring authorization privileges for cascading user obligations. 33–44. 5 indexed citations
20.
Chowdhury, Omar, et al.. (2011). On the management of user obligations. 175–184. 11 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026