Raheem Beyah

4.9k total citations
181 papers, 3.1k citations indexed

About

Raheem Beyah is a scholar working on Computer Networks and Communications, Artificial Intelligence and Information Systems. According to data from OpenAlex, Raheem Beyah has authored 181 papers receiving a total of 3.1k indexed citations (citations by other indexed papers that have themselves been cited), including 95 papers in Computer Networks and Communications, 66 papers in Artificial Intelligence and 36 papers in Information Systems. Recurrent topics in Raheem Beyah's work include Internet Traffic Analysis and Secure E-voting (32 papers), Network Security and Intrusion Detection (32 papers) and Advanced Malware Detection Techniques (32 papers). Raheem Beyah is often cited by papers focused on Internet Traffic Analysis and Secure E-voting (32 papers), Network Security and Intrusion Detection (32 papers) and Advanced Malware Detection Techniques (32 papers). Raheem Beyah collaborates with scholars based in United States, China and Netherlands. Raheem Beyah's co-authors include Shouling Ji, A. Selcuk Uluagac, John A. Copeland, Yingshu Li, Cherita Corbett, David Formby, Weiqing Li, Prateek Mittal, Zhipeng Cai and Xiaojing Liao and has published in prestigious journals such as Advanced Functional Materials, Proceedings of the IEEE and IEEE Communications Surveys & Tutorials.

In The Last Decade

Raheem Beyah

170 papers receiving 2.9k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Raheem Beyah United States 29 1.6k 1.3k 794 793 562 181 3.1k
Huy Kang Kim South Korea 29 1.9k 1.2× 1.2k 0.9× 784 1.0× 1.4k 1.8× 1.2k 2.2× 159 3.4k
Cristina Nita-Rotaru United States 30 2.7k 1.7× 1.3k 1.0× 832 1.0× 801 1.0× 619 1.1× 147 3.9k
Earlence Fernandes United States 16 795 0.5× 1.5k 1.2× 671 0.8× 1.2k 1.5× 270 0.5× 40 2.5k
Duminda Wijesekera United States 21 1.3k 0.8× 919 0.7× 1.1k 1.3× 579 0.7× 325 0.6× 176 2.3k
Bruno Crispo Italy 29 1.6k 1.0× 1.2k 0.9× 1.6k 2.0× 1.1k 1.3× 461 0.8× 177 3.4k
Dijiang Huang United States 35 3.0k 1.9× 1.7k 1.3× 1.7k 2.2× 628 0.8× 896 1.6× 167 4.5k
Dong Hoon Lee South Korea 30 1.5k 1.0× 1.9k 1.4× 1.2k 1.6× 593 0.7× 1.2k 2.2× 247 3.8k
Alberto Coen‐Porisini Italy 20 1.6k 1.0× 692 0.5× 1.1k 1.3× 432 0.5× 268 0.5× 75 2.5k
Mohammad Zulkernine Canada 26 1.7k 1.1× 1.4k 1.1× 1.1k 1.4× 984 1.2× 308 0.5× 173 2.8k
Georgios Kambourakis Greece 33 3.5k 2.3× 2.3k 1.7× 1.5k 1.9× 2.0k 2.5× 724 1.3× 144 4.8k

Countries citing papers authored by Raheem Beyah

Since Specialization
Citations

This map shows the geographic impact of Raheem Beyah's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Raheem Beyah with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Raheem Beyah more than expected).

Fields of papers citing papers by Raheem Beyah

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Raheem Beyah. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Raheem Beyah. The network helps show where Raheem Beyah may publish in the future.

Co-authorship network of co-authors of Raheem Beyah

This figure shows the co-authorship network connecting the top 25 collaborators of Raheem Beyah. A scholar is included among the top collaborators of Raheem Beyah based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Raheem Beyah. Raheem Beyah is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
2.
Stebner, Aaron P., et al.. (2025). One Video to Steal Them All: 3D-Printing IP Theft through Optical Side-Channels. ArXiv.org. 723–737.
5.
Zhao, Binbin, Shouling Ji, Yuan Tian, et al.. (2023). One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware. IEEE Transactions on Dependable and Secure Computing. 21(3). 1372–1389. 2 indexed citations
7.
Su, Jie, Zhen Hong, Lei Ye, et al.. (2023). Trustworthy IAP: An Intelligent Applications Profiler to Investigate Vulnerabilities of Consumer Electronic Devices. IEEE Transactions on Consumer Electronics. 70(1). 4605–4616. 3 indexed citations
8.
Hong, Zhen, et al.. (2023). Detect Insider Attacks in Industrial Cyber-physical Systems Using Multi-physical Features-based Fingerprinting. ACM Transactions on Sensor Networks. 20(2). 1–27. 2 indexed citations
9.
Ji, Shouling, Zhenguang Liu, Xuhong Zhang, et al.. (2022). Fraud-Agents Detection in Online Microfinance: A Large-Scale Empirical Study. IEEE Transactions on Dependable and Secure Computing. 20(2). 1169–1185. 11 indexed citations
10.
Li, Changjiang, Shouling Ji, Bo Li, et al.. (2021). Towards Certifying the Asymmetric Robustness for Neural Networks: Quantification and Applications. IEEE Transactions on Dependable and Secure Computing. 19(6). 3987–4001. 8 indexed citations
11.
Zhao, Binbin, Shouling Ji, Wei‐Han Lee, et al.. (2020). A Large-Scale Empirical Study on the Vulnerability of Deployed IoT Devices. IEEE Transactions on Dependable and Secure Computing. 19(3). 1826–1840. 37 indexed citations
12.
Ji, Shouling, Chenyang Lyu, Yuan Chen, et al.. (2020). V-Fuzz: Vulnerability Prediction-Assisted Evolutionary Fuzzing for Binary Programs. IEEE Transactions on Cybernetics. 52(5). 3745–3756. 37 indexed citations
13.
Acar, Abbas, Wenyi Liu, Raheem Beyah, Kemal Akkaya, & A. Selcuk Uluagac. (2019). A privacy‐preserving multifactor authentication system. Security and Privacy. 2(5). 10 indexed citations
14.
Ji, Shouling, Ting Wang, Jianhai Chen, et al.. (2017). De-SAG: On the De-Anonymization of Structure-Attribute Graph Data. IEEE Transactions on Dependable and Secure Computing. 16(4). 594–607. 14 indexed citations
15.
Ji, Shouling, et al.. (2017). DPPG: A Dynamic Password Policy Generation System. IEEE Transactions on Information Forensics and Security. 13(3). 545–558. 13 indexed citations
16.
Le, Tuan, et al.. (2017). See No Evil, Hear No Evil, Feel No Evil, Print No Evil? Malicious Fill Patterns Detection in Additive Manufacturing. USENIX Security Symposium. 1181–1198. 24 indexed citations
17.
Ji, Shouling, Prateek Mittal, & Raheem Beyah. (2016). Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A Survey. IEEE Communications Surveys & Tutorials. 19(2). 1305–1326. 80 indexed citations
18.
Ji, Shouling, et al.. (2015). Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords. IEEE Transactions on Dependable and Secure Computing. 14(5). 550–564. 41 indexed citations
19.
Ji, Shouling, Weiqing Li, Prateek Mittal, Xin Hu, & Raheem Beyah. (2015). SecGraph: a uniform and open-source evaluation system for graph data anonymization and de-anonymization. USENIX Security Symposium. 303–318. 64 indexed citations
20.
Bourgeois, Anu G., et al.. (2012). Attacking Beacon-Enabled 802.15.4 Networks. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026