Shih-Kun Huang

1.3k total citations
45 papers, 806 citations indexed

About

Shih-Kun Huang is a scholar working on Software, Information Systems and Artificial Intelligence. According to data from OpenAlex, Shih-Kun Huang has authored 45 papers receiving a total of 806 indexed citations (citations by other indexed papers that have themselves been cited), including 22 papers in Software, 18 papers in Information Systems and 18 papers in Artificial Intelligence. Recurrent topics in Shih-Kun Huang's work include Software Testing and Debugging Techniques (20 papers), Advanced Malware Detection Techniques (16 papers) and Software Reliability and Analysis Research (11 papers). Shih-Kun Huang is often cited by papers focused on Software Testing and Debugging Techniques (20 papers), Advanced Malware Detection Techniques (16 papers) and Software Reliability and Analysis Research (11 papers). Shih-Kun Huang collaborates with scholars based in Taiwan, United States and China. Shih-Kun Huang's co-authors include Yao‐Wen Huang, Chung-Hung Tsai, Hong-Yuan Mark Liao, Chun-Shien Lu, Victor Law, Xun Ge, Wai Yie Leong, Sy‐Yen Kuo, D. T. Lee and Chung-Hung Tsai and has published in prestigious journals such as SHILAP Revista de lepidopterología, Applied Sciences and Computer Networks.

In The Last Decade

Shih-Kun Huang

40 papers receiving 704 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Shih-Kun Huang Taiwan 14 470 343 247 212 165 45 806
Mattia Monga Italy 15 350 0.7× 282 0.8× 188 0.8× 166 0.8× 31 0.2× 76 727
Oleksandr Polozov United States 10 291 0.6× 321 0.9× 67 0.3× 214 1.0× 59 0.4× 17 590
Pavol Bielik Switzerland 11 278 0.6× 170 0.5× 118 0.5× 204 1.0× 37 0.2× 20 494
Ana C. R. Paiva Portugal 15 372 0.8× 123 0.4× 181 0.7× 454 2.1× 20 0.1× 79 659
T. Ball United States 10 576 1.2× 241 0.7× 72 0.3× 387 1.8× 91 0.6× 14 825
Loris D’Antoni United States 15 222 0.5× 341 1.0× 64 0.3× 197 0.9× 22 0.1× 56 679
Karim Ali Canada 13 335 0.7× 217 0.6× 300 1.2× 229 1.1× 18 0.1× 41 595
Godmar Back United States 15 352 0.7× 414 1.2× 165 0.7× 124 0.6× 52 0.3× 52 1.1k
Sebastian Schrittwieser Austria 13 580 1.2× 296 0.9× 445 1.8× 58 0.3× 82 0.5× 65 832
Börje F. Karlsson China 10 82 0.2× 290 0.8× 89 0.4× 72 0.3× 79 0.5× 33 465

Countries citing papers authored by Shih-Kun Huang

Since Specialization
Citations

This map shows the geographic impact of Shih-Kun Huang's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Shih-Kun Huang with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Shih-Kun Huang more than expected).

Fields of papers citing papers by Shih-Kun Huang

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Shih-Kun Huang. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Shih-Kun Huang. The network helps show where Shih-Kun Huang may publish in the future.

Co-authorship network of co-authors of Shih-Kun Huang

This figure shows the co-authorship network connecting the top 25 collaborators of Shih-Kun Huang. A scholar is included among the top collaborators of Shih-Kun Huang based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Shih-Kun Huang. Shih-Kun Huang is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Huang, Chih–Jen, et al.. (2022). Pain Pickle: Bypassing Python Restricted Unpickler for Automatic Exploit Generation. 1079–1090. 1 indexed citations
2.
Huang, Shih-Kun & Victor Law. (2022). Help Seeking from Peers in an Online Class: Roles of Students’ Help-seeking Profiles and Epistemic Beliefs. SHILAP Revista de lepidopterología. 8 indexed citations
3.
Tsai, Shi‐Chun, et al.. (2021). REST API Fuzzing by Coverage Level Guided Blackbox Testing. 291–300. 7 indexed citations
4.
Zhou, Jiazheng, et al.. (2020). Big Data Platform Configuration Using Machine Learning. Journal of information science and engineering. 36(3). 469–493. 1 indexed citations
5.
Huang, Chi-Yo, et al.. (2019). A Novel Massive Deployment Solution Based on the Peer-to-Peer Protocol. Applied Sciences. 9(2). 296–296. 6 indexed citations
6.
Huang, Shih-Kun, et al.. (2018). INSTRIM: Lightweight Instrumentation for Coverage-guided Fuzzing. 32 indexed citations
7.
Huang, Shih-Kun, et al.. (2017). Path Exploration Based on Monte Carlo Tree Search for Symbolic Execution. 33–37. 2 indexed citations
8.
Lee, Yi‐Hsuan, et al.. (2017). CRAXTriage: A coverage based triage system. 408–415. 2 indexed citations
9.
Huang, Shih-Kun, et al.. (2016). LDDoS Attack Detection by Using Ant Colony Optimization Algorithms. Journal of information science and engineering. 32(4). 995–1020. 9 indexed citations
10.
Gao, Ruizhi, et al.. (2016). Effective Test Generation for Combinatorial Decision Coverage. 47–54. 6 indexed citations
11.
Huang, Shih-Kun, et al.. (2016). A unified ant agent framework for solving DoS and QoS problems. Journal of information science and engineering. 32(6). 1397–1434. 1 indexed citations
13.
Huang, Shih-Kun, et al.. (2015). Diagnosing SDN Network Problems by Using Spectrum-Based Fault Localization Techniques. 8. 121–127. 1 indexed citations
14.
Huang, Shih-Kun, et al.. (2012). Certificate-Based Secure Three-Party Signcryption Scheme With Low Costs *. Journal of information science and engineering. 28(4). 739–753. 1 indexed citations
15.
Huang, Shih-Kun, et al.. (2012). An efficient strong designated verifier proxy signature scheme for electronic commerce. Journal of information science and engineering. 28(4). 771–785. 19 indexed citations
17.
Lin, Han-Yu, et al.. (2010). Efficient proxy signcryption scheme with provable CCA and CMA security. Computers & Mathematics with Applications. 60(7). 1850–1858. 17 indexed citations
18.
Huang, Yao‐Wen, et al.. (2003). Web application security assessment by fault injection and behavior monitoring. 148–148. 226 indexed citations
19.
Huang, Shih-Kun, et al.. (2000). Integration of reusable software components and frameworks into a visual software construction approach. Journal of information science and engineering. 16(6). 863–884. 7 indexed citations
20.
Huang, Shih-Kun, et al.. (1994). Survey of the influence of programming constructs and mechanisms on software quality. Journal of information science and engineering. 10(2). 177–201. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026