Saihua Cai

773 total citations
70 papers, 432 citations indexed

About

Saihua Cai is a scholar working on Artificial Intelligence, Computer Networks and Communications and Software. According to data from OpenAlex, Saihua Cai has authored 70 papers receiving a total of 432 indexed citations (citations by other indexed papers that have themselves been cited), including 43 papers in Artificial Intelligence, 35 papers in Computer Networks and Communications and 23 papers in Software. Recurrent topics in Saihua Cai's work include Network Security and Intrusion Detection (29 papers), Anomaly Detection Techniques and Applications (23 papers) and Software Engineering Research (17 papers). Saihua Cai is often cited by papers focused on Network Security and Intrusion Detection (29 papers), Anomaly Detection Techniques and Applications (23 papers) and Software Engineering Research (17 papers). Saihua Cai collaborates with scholars based in China, Ghana and United Kingdom. Saihua Cai's co-authors include Ruizhi Sun, Jinfu Chen, Li Li, Gang Yuan, Sicong Li, Haibo Chen, Chi Zhang, Qian Li, Sicong Li and Mingjie Liu and has published in prestigious journals such as Expert Systems with Applications, Information Sciences and Neural Networks.

In The Last Decade

Saihua Cai

60 papers receiving 416 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Saihua Cai China 13 270 181 93 88 50 70 432
G. Narsimha India 12 213 0.8× 232 1.3× 121 1.3× 85 1.0× 40 0.8× 69 531
K. V. S. V. N. Raju India 10 207 0.8× 262 1.4× 125 1.3× 261 3.0× 55 1.1× 38 493
Rami Sihwail Malaysia 8 199 0.7× 198 1.1× 140 1.5× 215 2.4× 54 1.1× 15 441
Dejun Mu China 10 229 0.8× 65 0.4× 176 1.9× 48 0.5× 51 1.0× 42 404
Waheed Ali H. M. Ghanem Malaysia 11 233 0.9× 151 0.8× 83 0.9× 81 0.9× 20 0.4× 22 358
David Escudero García Spain 10 244 0.9× 71 0.4× 56 0.6× 52 0.6× 53 1.1× 29 402
Kaiyuan Jiang China 8 316 1.2× 329 1.8× 68 0.7× 142 1.6× 30 0.6× 18 464
Jin Kwak South Korea 13 248 0.9× 394 2.2× 233 2.5× 256 2.9× 62 1.2× 86 614

Countries citing papers authored by Saihua Cai

Since Specialization
Citations

This map shows the geographic impact of Saihua Cai's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Saihua Cai with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Saihua Cai more than expected).

Fields of papers citing papers by Saihua Cai

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Saihua Cai. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Saihua Cai. The network helps show where Saihua Cai may publish in the future.

Co-authorship network of co-authors of Saihua Cai

This figure shows the co-authorship network connecting the top 25 collaborators of Saihua Cai. A scholar is included among the top collaborators of Saihua Cai based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Saihua Cai. Saihua Cai is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Chen, Jianzhong, et al.. (2026). SAME: A Similarity Analysis Method for Evaluating Metamorphic Relations in Testing AI systems. Information and Software Technology. 194. 108069–108069.
2.
Cai, Saihua, et al.. (2025). GSA-DT: A Malicious Traffic Detection Model Based on Graph Self-Attention Network and Decision Tree. IEEE Transactions on Network and Service Management. 22(2). 2059–2073. 2 indexed citations
3.
Cai, Saihua, et al.. (2025). MTD-FRD: Malicious traffic detection method based on feature representation and conditional diffusion model. Journal of Network and Computer Applications. 242. 104256–104256. 1 indexed citations
5.
Chen, Jinfu, et al.. (2024). GCN-MHSA: A novel malicious traffic detection method based on graph convolutional neural network and multi-head self-attention mechanism. Computers & Security. 147. 104083–104083. 8 indexed citations
6.
Cai, Saihua, et al.. (2024). MIT-FRNet: Modality-invariant temporal representation learning-based feature reconstruction network for missing modalities. Expert Systems with Applications. 249. 123655–123655. 5 indexed citations
7.
Chen, Jinfu, et al.. (2024). iGnnVD: A novel software vulnerability detection model based on integrated graph neural networks. Science of Computer Programming. 238. 103156–103156. 2 indexed citations
9.
Chen, Jinfu, et al.. (2024). A novel defect prediction method based on semantic feature enhancement. Journal of Software Evolution and Process. 36(9). 1 indexed citations
10.
Chen, Jinfu, et al.. (2024). DCM-GIFT: An Android malware dynamic classification method based on gray-scale image and feature-selection tree. Information and Software Technology. 176. 107560–107560. 7 indexed citations
11.
Cai, Saihua, et al.. (2024). A generalized weighted evidence fusion algorithm based on quantum modeling. Information Sciences. 683. 121285–121285.
12.
Chen, Jinfu, et al.. (2024). TR-Fuzz: A syntax valid tool for fuzzing C compilers. Science of Computer Programming. 238. 103155–103155.
13.
Chen, Jinfu, et al.. (2024). A novel memory usage guided fuzzing based on particle swarm optimization. Swarm and Evolutionary Computation. 91. 101747–101747. 2 indexed citations
14.
Cai, Saihua, et al.. (2024). CDDA-MD: An efficient malicious traffic detection method based on concept drift detection and adaptation technique. Computers & Security. 148. 104121–104121. 5 indexed citations
15.
Chen, Jinfu, et al.. (2024). Hybrid semantics-based vulnerability detection incorporating a Temporal Convolutional Network and Self-attention Mechanism. Information and Software Technology. 171. 107453–107453. 6 indexed citations
16.
Cai, Saihua, et al.. (2024). CD-BTMSE: A Concept Drift detection model based on Bidirectional Temporal Convolutional Network and Multi-Stacking Ensemble learning. Knowledge-Based Systems. 294. 111681–111681. 9 indexed citations
17.
Cai, Saihua, et al.. (2023). A malicious network traffic detection model based on bidirectional temporal convolutional network with multi-head self-attention mechanism. Computers & Security. 136. 103580–103580. 20 indexed citations
19.
Cai, Saihua, Li Li, Sicong Li, Ruizhi Sun, & Gang Yuan. (2020). An efficient approach for outlier detection from uncertain data streams based on maximal frequent patterns. Expert Systems with Applications. 160. 113646–113646. 20 indexed citations
20.
Cai, Saihua, et al.. (2019). MiFI-Outlier: Minimal infrequent itemset-based outlier detection approach on uncertain data stream. Knowledge-Based Systems. 191. 105268–105268. 14 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026