Rocky Slavin

454 total citations
21 papers, 296 citations indexed

About

Rocky Slavin is a scholar working on Information Systems, Signal Processing and Computer Networks and Communications. According to data from OpenAlex, Rocky Slavin has authored 21 papers receiving a total of 296 indexed citations (citations by other indexed papers that have themselves been cited), including 15 papers in Information Systems, 12 papers in Signal Processing and 5 papers in Computer Networks and Communications. Recurrent topics in Rocky Slavin's work include Advanced Malware Detection Techniques (12 papers), Software Engineering Research (6 papers) and Digital and Cyber Forensics (6 papers). Rocky Slavin is often cited by papers focused on Advanced Malware Detection Techniques (12 papers), Software Engineering Research (6 papers) and Digital and Cyber Forensics (6 papers). Rocky Slavin collaborates with scholars based in United States and Canada. Rocky Slavin's co-authors include Jianwei Niu, Xiaoyin Wang, Travis D. Breaux, Mitra Bokaei Hosseini, Jaspreet Bhatia, James Hester, Ram Krishnan, Hui Shen, Patrick D. Jenkins and Dakai Zhu and has published in prestigious journals such as Information and Software Technology, ACM Transactions on Software Engineering and Methodology and Public Health Nursing.

In The Last Decade

Rocky Slavin

19 papers receiving 288 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Rocky Slavin United States 9 199 168 125 103 47 21 296
Daniel Votipka United States 11 239 1.2× 205 1.2× 70 0.6× 83 0.8× 82 1.7× 24 353
Georg Merzdovnik Austria 7 123 0.6× 155 0.9× 61 0.5× 160 1.6× 82 1.7× 13 279
Tam The Nguyen United States 9 253 1.3× 73 0.4× 50 0.4× 74 0.7× 57 1.2× 17 317
Oleksii Starov United States 11 230 1.2× 179 1.1× 51 0.4× 152 1.5× 74 1.6× 19 319
Ziqi Wang United States 5 145 0.7× 109 0.6× 163 1.3× 110 1.1× 94 2.0× 9 312
Xavier de Carné de Carnavalet Canada 6 205 1.0× 168 1.0× 32 0.3× 59 0.6× 65 1.4× 10 271
Haitao Xu China 11 157 0.8× 116 0.7× 49 0.4× 104 1.0× 93 2.0× 17 273
Mitra Bokaei Hosseini United States 7 174 0.9× 139 0.8× 126 1.0× 87 0.8× 27 0.6× 14 271
Sergej Dechand Germany 7 279 1.4× 196 1.2× 68 0.5× 120 1.2× 91 1.9× 8 376
Platon Kotzias Spain 10 186 0.9× 156 0.9× 92 0.7× 160 1.6× 166 3.5× 16 347

Countries citing papers authored by Rocky Slavin

Since Specialization
Citations

This map shows the geographic impact of Rocky Slavin's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Rocky Slavin with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Rocky Slavin more than expected).

Fields of papers citing papers by Rocky Slavin

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Rocky Slavin. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Rocky Slavin. The network helps show where Rocky Slavin may publish in the future.

Co-authorship network of co-authors of Rocky Slavin

This figure shows the co-authorship network connecting the top 25 collaborators of Rocky Slavin. A scholar is included among the top collaborators of Rocky Slavin based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Rocky Slavin. Rocky Slavin is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Tan, Adrian Eng-Choon, Jayanta Das, Rocky Slavin, et al.. (2025). Beyond Text-to-SQL for IoT Defense: A Comprehensive Framework for Querying and Classifying IoT Threats. 1–12.
2.
Hosseini, Mitra Bokaei, et al.. (2024). A Large Language Model Approach to Code and Privacy Policy Alignment. 79–90. 3 indexed citations
3.
Wang, Zhiwei, et al.. (2024). An intelligent assistive driving solution based on smartphone for power wheelchair mobility. Journal of Systems Architecture. 149. 103105–103105.
4.
Slavin, Rocky, et al.. (2024). Toward Regulatory Compliance: A few-shot Learning Approach to Extract Processing Activities. 241–250. 1 indexed citations
5.
Slavin, Rocky, et al.. (2024). Methodological approaches in developing and implementing digital health interventions amongst underserved women. Public Health Nursing. 41(6). 1612–1621. 1 indexed citations
6.
Jenkins, Patrick D., et al.. (2023). Protocol-agnostic IoT Device Classification on Encrypted Traffic Using Link-Level Flows. 19–24. 2 indexed citations
7.
Slavin, Rocky, et al.. (2022). DAISY: Dynamic-Analysis-Induced Source Discovery for Sensitive Data. ACM Transactions on Software Engineering and Methodology. 32(4). 1–34. 3 indexed citations
8.
Wang, Zhiwei, Kevin Liu, Jeffrey Wang, et al.. (2022). A Vision-Based Low-Cost Power Wheelchair Assistive Driving System for Smartphones. 1979–1986. 1 indexed citations
9.
Zhu, Dakai, et al.. (2022). Lightweight Collaborative Inferencing for Real-Time Intrusion Detection in IoT Networks. 392–400. 1 indexed citations
10.
Wang, Xiaoyin, et al.. (2021). ConDySTA: Context-Aware Dynamic Supplement to Static Taint Analysis. 796–812. 18 indexed citations
11.
Hosseini, Mitra Bokaei, et al.. (2021). Ambiguity and Generality in Natural Language Privacy Policies. 70–81. 7 indexed citations
12.
Wang, Xiaoyin, et al.. (2020). How does misconfiguration of analytic services compromise mobile privacy?. 1572–1583. 16 indexed citations
13.
Slavin, Rocky, et al.. (2019). Modernizing parsing tools: parsing and analysis with object-oriented programming. 15. 20–25. 1 indexed citations
14.
Slavin, Rocky, et al.. (2019). Privacy Assurance for Android Augmented Reality Apps. 114–1141. 10 indexed citations
15.
Wang, Xiaoyin, et al.. (2018). GUILeak. 37–47. 62 indexed citations
16.
Slavin, Rocky, Xiaoyin Wang, Mitra Bokaei Hosseini, et al.. (2016). Toward a framework for detecting privacy policy violations in android application code. 25–36. 125 indexed citations
17.
Slavin, Rocky, Xiaoyin Wang, Mitra Bokaei Hosseini, et al.. (2016). PVDetector. 299–300. 9 indexed citations
18.
Slavin, Rocky, et al.. (2014). Rethinking Security Requirements in RE Research. 4 indexed citations
19.
Slavin, Rocky, et al.. (2014). Managing security requirements patterns using feature diagram hierarchies. 16. 193–202. 10 indexed citations
20.
Slavin, Rocky, Hui Shen, & Jianwei Niu. (2012). Characterizations and boundaries of security requirements patterns. 48–53. 10 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026