Shengwei Yi

415 total citations
28 papers, 269 citations indexed

About

Shengwei Yi is a scholar working on Information Systems, Computer Networks and Communications and Signal Processing. According to data from OpenAlex, Shengwei Yi has authored 28 papers receiving a total of 269 indexed citations (citations by other indexed papers that have themselves been cited), including 16 papers in Information Systems, 14 papers in Computer Networks and Communications and 12 papers in Signal Processing. Recurrent topics in Shengwei Yi's work include Advanced Malware Detection Techniques (7 papers), Network Security and Intrusion Detection (6 papers) and Smart Grid Security and Resilience (4 papers). Shengwei Yi is often cited by papers focused on Advanced Malware Detection Techniques (7 papers), Network Security and Intrusion Detection (6 papers) and Smart Grid Security and Resilience (4 papers). Shengwei Yi collaborates with scholars based in China, Australia and United Kingdom. Shengwei Yi's co-authors include Xiaofeng Lu, Jing Sha, Píetro Lió, Shilong Ma, Wei Liu, Junfeng Xu, Dong Uk Ahn, Xi Huang, Jiteng Wang and Ting Wang and has published in prestigious journals such as IEEE Internet of Things Journal, Computer Networks and Journal of Computer Information Systems.

In The Last Decade

Shengwei Yi

26 papers receiving 250 citations

Peers

Shengwei Yi
Shinjo Park Germany
Yong Tang China
Dirk Ourston United States
Zhiwu Xu China
Ari Takanen Finland
Valerio Terragni New Zealand
Jared D. DeMott United States
Afsah Anwar United States
Shinjo Park Germany
Shengwei Yi
Citations per year, relative to Shengwei Yi Shengwei Yi (= 1×) peers Shinjo Park

Countries citing papers authored by Shengwei Yi

Since Specialization
Citations

This map shows the geographic impact of Shengwei Yi's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Shengwei Yi with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Shengwei Yi more than expected).

Fields of papers citing papers by Shengwei Yi

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Shengwei Yi. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Shengwei Yi. The network helps show where Shengwei Yi may publish in the future.

Co-authorship network of co-authors of Shengwei Yi

This figure shows the co-authorship network connecting the top 25 collaborators of Shengwei Yi. A scholar is included among the top collaborators of Shengwei Yi based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Shengwei Yi. Shengwei Yi is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Lin, Weiguo, W. Fan, Jia Chen, et al.. (2024). A Graph Neural Network Model for Live Face Anti-Spoofing Detection Camera Systems. IEEE Internet of Things Journal. 11(15). 25720–25730. 5 indexed citations
2.
Ahn, Dong Uk, et al.. (2022). Effects of phosvitin phosphopeptide-Ca complex prepared by efficient enzymatic hydrolysis on calcium absorption and bone deposition of mice. Food Science and Human Wellness. 11(6). 1631–1640. 22 indexed citations
3.
Lu, Xiaofeng, et al.. (2019). ASSCA: API sequence and statistics features combined architecture for malware detection. Computer Networks. 157. 99–111. 41 indexed citations
4.
Lu, Xiaofeng, et al.. (2019). Continuous authentication by free-text keystroke based on CNN plus RNN. Procedia Computer Science. 147. 314–318. 45 indexed citations
5.
Yi, Shengwei, et al.. (2018). API based sequence and statistical features in a combined malware detection architecture. Journal of Tsinghua University(Science and Technology). 58(5). 500–508. 4 indexed citations
6.
Lu, Xiaofeng, Shengfei Zhang, & Shengwei Yi. (2018). Continuous authentication by free-text keystroke based on CNN plus RNN.. 314–318. 1 indexed citations
7.
Lu, Xiaofeng, et al.. (2018). ASSCA: API based Sequence and Statistics features Combined malware detection Architecture. Procedia Computer Science. 129. 248–256. 20 indexed citations
8.
Yi, Shengwei, et al.. (2017). Security analysis of industrial control network protocols based on Peach. Journal of Tsinghua University(Science and Technology). 57(1). 50–54. 2 indexed citations
9.
Liu, Hui, et al.. (2015). A vulnerability detecting method for Modbus-TCP based on smart fuzzing mechanism. 404–409. 14 indexed citations
10.
Lan, Yuqing, et al.. (2015). Mining High Utility Itemsets over Uncertain Databases. 9 indexed citations
11.
Yong, Peng, et al.. (2014). OPC-MFuzzer: A Novel Multi-Layers Vulnerability Detection Tool for OPC Protocol Based on Fuzzing Technology. International Journal of Computer and Communication Engineering. 3(4). 300–305. 4 indexed citations
12.
Xu, Junfeng, Lin Dong, Mao Ye, et al.. (2013). Pairing and Authentication Security Technologies in Low-Power Bluetooth. 8 indexed citations
13.
Yi, Shengwei, et al.. (2013). Mining Frequent Rooted Ordered Tree Generators Efficiently. 1999. 132–139. 1 indexed citations
14.
Yi, Shengwei, Yong Peng, Ting Wang, et al.. (2013). Overview on attack graph generation and visualization technology. 1–6. 28 indexed citations
15.
Yi, Shengwei, et al.. (2012). SeqGen: Mining Sequential Generator Patterns from Sequence Databases. Advanced Science Letters. 11(1). 340–345. 2 indexed citations
16.
17.
Ma, Dianfu, et al.. (2011). A New Query Dependent Feature Fusion Approach for Medical Image Retrieval based on One-Class SVM. Journal of Computer Information Systems. 7(3). 654–665. 2 indexed citations
18.
Yi, Shengwei, et al.. (2011). An effective algorithm for mining sequential generators. Procedia Engineering. 15. 3653–3657. 13 indexed citations
19.
20.
Qiu, Liqing, et al.. (2008). An Extensive Empirical Study of Feature Selection for Text Categorization. 19. 312–315. 9 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026