Qixu Wang

496 total citations
26 papers, 333 citations indexed

About

Qixu Wang is a scholar working on Computer Networks and Communications, Artificial Intelligence and Information Systems. According to data from OpenAlex, Qixu Wang has authored 26 papers receiving a total of 333 indexed citations (citations by other indexed papers that have themselves been cited), including 19 papers in Computer Networks and Communications, 14 papers in Artificial Intelligence and 13 papers in Information Systems. Recurrent topics in Qixu Wang's work include Network Security and Intrusion Detection (9 papers), Cloud Data Security Solutions (7 papers) and IoT and Edge/Fog Computing (6 papers). Qixu Wang is often cited by papers focused on Network Security and Intrusion Detection (9 papers), Cloud Data Security Solutions (7 papers) and IoT and Edge/Fog Computing (6 papers). Qixu Wang collaborates with scholars based in China, Canada and United States. Qixu Wang's co-authors include Xingshu Chen, Ning Zhang, Dajiang Chen, Zhiguang Qin, Xiao Lan, Zhen Qin, Yulong Wang, Xiaojie Fang, Xin Jin and Xuemei Zeng and has published in prestigious journals such as SHILAP Revista de lepidopterología, IEEE Access and IEEE Transactions on Industrial Informatics.

In The Last Decade

Qixu Wang

25 papers receiving 321 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Qixu Wang China 9 225 154 143 68 51 26 333
Nouha Oualha France 7 259 1.2× 164 1.1× 167 1.2× 56 0.8× 50 1.0× 28 408
Jeong‐Nyeo Kim South Korea 9 210 0.9× 138 0.9× 84 0.6× 105 1.5× 66 1.3× 61 326
Weifeng Chen United States 9 257 1.1× 91 0.6× 184 1.3× 61 0.9× 65 1.3× 25 364
Junsong Fu China 9 163 0.7× 136 0.9× 134 0.9× 47 0.7× 43 0.8× 51 314
Yizhou Shen China 11 256 1.1× 105 0.7× 115 0.8× 78 1.1× 56 1.1× 24 362
Sandeep Nair Narayanan United States 8 158 0.7× 65 0.4× 110 0.8× 71 1.0× 88 1.7× 15 255
Yulong Fu China 9 249 1.1× 59 0.4× 170 1.2× 112 1.6× 54 1.1× 15 350
Xuehui Du China 10 323 1.4× 119 0.8× 265 1.9× 157 2.3× 32 0.6× 53 463
Yu‐Sung Wu Taiwan 9 405 1.8× 193 1.3× 179 1.3× 149 2.2× 96 1.9× 34 496
Mohammed Mujib Alshahrani Saudi Arabia 11 221 1.0× 159 1.0× 98 0.7× 104 1.5× 65 1.3× 24 356

Countries citing papers authored by Qixu Wang

Since Specialization
Citations

This map shows the geographic impact of Qixu Wang's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Qixu Wang with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Qixu Wang more than expected).

Fields of papers citing papers by Qixu Wang

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Qixu Wang. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Qixu Wang. The network helps show where Qixu Wang may publish in the future.

Co-authorship network of co-authors of Qixu Wang

This figure shows the co-authorship network connecting the top 25 collaborators of Qixu Wang. A scholar is included among the top collaborators of Qixu Wang based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Qixu Wang. Qixu Wang is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Peng, Xiao, et al.. (2024). UAVs-assisted QoS guarantee scheme of IoT applications for reliable mobile edge computing. Computer Communications. 223. 55–67. 5 indexed citations
2.
Wang, Qixu, et al.. (2024). Few-Shot Website Fingerprinting With Distribution Calibration. IEEE Transactions on Dependable and Secure Computing. 22(1). 632–648. 1 indexed citations
3.
Huang, Guosheng, et al.. (2024). Enhancing the Availability and Security of Attestation Scheme for Multiparty-Involved DLaaS: A Circular Approach. IEEE Transactions on Cloud Computing. 13(1). 227–244.
4.
Huang, Guosheng, et al.. (2023). PIMS: An Efficient Process Integrity Monitoring System Based on Blockchain and Trusted Computing in Cloud-Native Context. Computer Modeling in Engineering & Sciences. 136(2). 1879–1898. 1 indexed citations
5.
Wang, Qixu, et al.. (2023). Enhancing the Trustworthiness of 6G Based on Trusted Multi-Cloud Infrastructure: A Practice of Cryptography Approach. Computer Modeling in Engineering & Sciences. 138(1). 957–979. 1 indexed citations
6.
Wang, Qixu, et al.. (2023). Chaotic Motion Planning for Mobile Robots: Progress, Challenges, and Opportunities. IEEE Access. 11. 134917–134939. 8 indexed citations
8.
Chen, Xingshu, et al.. (2022). Autoscaling cracker: an efficient asymmetric DDoS attack on serverless functions. GLOBECOM 2022 - 2022 IEEE Global Communications Conference. 4179–4184. 1 indexed citations
9.
Wang, Yulong, et al.. (2022). Unsupervised Anomaly Detection for Container Cloud Via BILSTM-Based Variational Auto-Encoder. ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). 3024–3028. 13 indexed citations
10.
Wang, Yulong, et al.. (2022). DockerWatch: a two-phase hybrid detection of malware using various static features in container cloud. Soft Computing. 27(2). 1015–1031. 7 indexed citations
11.
Zheng, Tao, et al.. (2022). ApkClassiFy: Identification and Classification of packed Android Malicious Applications. GLOBECOM 2022 - 2022 IEEE Global Communications Conference. 50. 2092–2097. 1 indexed citations
12.
Wang, Qixu, et al.. (2021). Enhancing Trustworthiness of Internet of Vehicles in Space–Air–Ground-Integrated Networks: Attestation Approach. IEEE Internet of Things Journal. 9(8). 5992–6002. 21 indexed citations
13.
Qin, Zhen, et al.. (2020). Random group recommendation model based on fuzzy clustering. SHILAP Revista de lepidopterología. 18(2). 100054–100054. 5 indexed citations
14.
Chen, Xingshu, et al.. (2019). Dynamics on Hybrid Complex Network: Botnet Modeling and Analysis of Medical IoT. Security and Communication Networks. 2019. 1–14. 11 indexed citations
15.
Zeng, Xuemei, et al.. (2019). Flow Context and Host Behavior Based Shadowsocks’s Traffic Identification. IEEE Access. 7. 41017–41032. 21 indexed citations
16.
Wang, Qixu, et al.. (2019). Enhancing Cloud-Based IoT Security Through Trustworthy Cloud Service: An Integration of Security and Reputation Approach. IEEE Access. 7. 9368–9383. 77 indexed citations
17.
Jin, Xin, et al.. (2018). SCCAF: A Secure and Compliant Continuous Assessment Framework in Cloud‐Based IoT Context. Wireless Communications and Mobile Computing. 2018(1). 8 indexed citations
18.
Wang, Qixu, et al.. (2017). PCP: A Privacy-Preserving Content-Based Publish–Subscribe Scheme With Differential Privacy in Fog Computing. IEEE Access. 5. 17962–17974. 42 indexed citations
20.
Wang, Qixu, et al.. (2017). LACS: A Lightweight Label-Based Access Control Scheme in IoT-Based 5G Caching Context. IEEE Access. 5. 4018–4027. 46 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026