Shize Guo

1.4k total citations
95 papers, 820 citations indexed

About

Shize Guo is a scholar working on Artificial Intelligence, Computer Networks and Communications and Signal Processing. According to data from OpenAlex, Shize Guo has authored 95 papers receiving a total of 820 indexed citations (citations by other indexed papers that have themselves been cited), including 49 papers in Artificial Intelligence, 37 papers in Computer Networks and Communications and 27 papers in Signal Processing. Recurrent topics in Shize Guo's work include Advanced Malware Detection Techniques (26 papers), Network Security and Intrusion Detection (23 papers) and Cryptographic Implementations and Security (20 papers). Shize Guo is often cited by papers focused on Advanced Malware Detection Techniques (26 papers), Network Security and Intrusion Detection (23 papers) and Cryptographic Implementations and Security (20 papers). Shize Guo collaborates with scholars based in China, United States and Sweden. Shize Guo's co-authors include Zhe‐Ming Lu, Liang Gao, Di Xue, Jian Wang, Lifa Wu, Xiaofeng Zhong, Fan Zhang, Zhisong Pan, Zhiyong Wu and Hong Zheng and has published in prestigious journals such as IEEE Transactions on Industrial Electronics, IEEE Access and IEEE Transactions on Industrial Informatics.

In The Last Decade

Shize Guo

84 papers receiving 781 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Shize Guo China 15 374 197 197 163 137 95 820
Kuan‐Ta Chen Taiwan 16 147 0.4× 253 1.3× 278 1.4× 55 0.3× 120 0.9× 30 844
Dipankar Das India 16 806 2.2× 48 0.2× 78 0.4× 79 0.5× 150 1.1× 124 1.1k
Mirko Sužnjević Croatia 19 126 0.3× 355 1.8× 61 0.3× 75 0.5× 95 0.7× 60 812
Aimilia Tzanavari Cyprus 8 254 0.7× 165 0.8× 52 0.3× 70 0.4× 144 1.1× 16 815
Mark A. Roth United States 16 358 1.0× 787 4.0× 272 1.4× 358 2.2× 254 1.9× 33 1.2k
Riccardo Spolaor China 14 537 1.4× 487 2.5× 433 2.2× 27 0.2× 234 1.7× 29 806
Alon Zakai Israel 9 298 0.8× 164 0.8× 108 0.5× 160 1.0× 144 1.1× 12 678
Sruti Bhagavatula United States 7 826 2.2× 85 0.4× 325 1.6× 91 0.6× 124 0.9× 8 1.1k
Mahmood Sharif United States 7 834 2.2× 97 0.5× 372 1.9× 95 0.6× 200 1.5× 19 1.1k

Countries citing papers authored by Shize Guo

Since Specialization
Citations

This map shows the geographic impact of Shize Guo's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Shize Guo with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Shize Guo more than expected).

Fields of papers citing papers by Shize Guo

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Shize Guo. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Shize Guo. The network helps show where Shize Guo may publish in the future.

Co-authorship network of co-authors of Shize Guo

This figure shows the co-authorship network connecting the top 25 collaborators of Shize Guo. A scholar is included among the top collaborators of Shize Guo based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Shize Guo. Shize Guo is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
He, Mingshu, et al.. (2025). ACE: A Static Android Malware Detection Method Based on Supervised Contrastive Learning. IEEE Internet of Things Journal. 12(13). 23550–23562. 1 indexed citations
2.
Wang, Yongjun, et al.. (2025). unFlowS: An Unsupervised Construction Scheme of Flow Spectrum for Network Traffic Detection. IEEE Transactions on Information Forensics and Security. 20. 3330–3345. 2 indexed citations
3.
Wang, Jian, et al.. (2025). A Covert and Efficient Attack on FPGA Cloud Based on Adaptive RON. IEEE Transactions on Dependable and Secure Computing. 22(5). 4641–4653.
4.
Zhang, Fan, et al.. (2024). Key Schedule Guided Persistent Fault Attack. IEEE Transactions on Information Forensics and Security. 20. 767–780.
5.
He, Mingshu, et al.. (2024). Intrusion Detection for Encrypted Flows Using Single Feature Based on Graph Integration Theory. IEEE Internet of Things Journal. 11(10). 17589–17601. 4 indexed citations
6.
Zhang, Fan, et al.. (2024). A Unified and Fully Automated Framework for Wavelet-Based Attacks on Random Delay. IEEE Transactions on Computers. 73(9). 2206–2219. 1 indexed citations
7.
Zhang, Yanyan, et al.. (2024). Enhancing reinforcement learning based adversarial malware generation to evade static detection. Alexandria Engineering Journal. 98. 32–43. 5 indexed citations
8.
Wang, Xiaojuan, et al.. (2023). Supervised Representation Learning for Network Traffic With Cluster Compression. IEEE Transactions on Sustainable Computing. 9(1). 1–13. 2 indexed citations
9.
Zhang, Fan, et al.. (2023). Efficient Persistent Fault Analysis with Small Number of Chosen Plaintexts. IACR Transactions on Cryptographic Hardware and Embedded Systems. 519–542. 4 indexed citations
10.
Wang, Jian, et al.. (2023). A Covert Attack Method Against FPGA Clouds. 1–6. 1 indexed citations
11.
Zhang, Lei, Zhisong Pan, Shize Guo, et al.. (2022). A Hidden Attack Sequences Detection Method Based on Dynamic Reward Deep Deterministic Policy Gradient. Security and Communication Networks. 2022. 1–13. 5 indexed citations
12.
Zhong, Xiaofeng, et al.. (2018). A Transfer k-NN Classifier with the Bagging Method. 11. 989–993.
13.
Wang, Jian, Jinzhi Lu, Shize Guo, Zhe Chen, & Yubai Li. (2018). A Thermal Balance Oriented Task Mapping for CMPs. 12–16. 1 indexed citations
14.
Zhong, Xiaofeng, et al.. (2017). An Improved k-NN Classification with Dynamic k. 211–216. 10 indexed citations
15.
Chen, Yu, et al.. (2017). pbSE: Phase-Based Symbolic Execution. 133–144. 2 indexed citations
16.
Zhao, Xinjie, Shize Guo, Fan Zhang, et al.. (2014). Algebraic Fault Analysis on GOST for Key Recovery and Reverse Engineering. 29–39. 7 indexed citations
17.
Guo, Shize, et al.. (2013). Black-Box Side-Channel Cube Attacks on Present-Like Ciphers. 1352–1358.
18.
Guo, Shize, et al.. (2011). DEGREE-DEGREE CORRELATION MEASURES AND CLUSTERING COEFFICIENTS FOR DIRECTED COMPLEX NETWORK ANALYSIS. 2(4). 859–864. 2 indexed citations
19.
Zhang, Yan, et al.. (2011). Multi-sensor Data Fusion for Cyber Security Situation Awareness. Procedia Environmental Sciences. 10. 1029–1034. 8 indexed citations
20.
Zheng, Kangfeng, Xiujuan Wang, Yixian Yang, & Shize Guo. (2010). Applying Multiple Residual Error Gray Forecast to Restrain Endpoints Effect in HHT of Network Traffic. 13. 1057–1060. 2 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026