Shouling Ji

7.9k total citations · 1 hit paper
252 papers, 4.4k citations indexed

About

Shouling Ji is a scholar working on Artificial Intelligence, Computer Networks and Communications and Information Systems. According to data from OpenAlex, Shouling Ji has authored 252 papers receiving a total of 4.4k indexed citations (citations by other indexed papers that have themselves been cited), including 129 papers in Artificial Intelligence, 81 papers in Computer Networks and Communications and 54 papers in Information Systems. Recurrent topics in Shouling Ji's work include Adversarial Robustness in Machine Learning (51 papers), Advanced Malware Detection Techniques (46 papers) and Privacy-Preserving Technologies in Data (32 papers). Shouling Ji is often cited by papers focused on Adversarial Robustness in Machine Learning (51 papers), Advanced Malware Detection Techniques (46 papers) and Privacy-Preserving Technologies in Data (32 papers). Shouling Ji collaborates with scholars based in China, United States and Australia. Shouling Ji's co-authors include Raheem Beyah, Ting Wang, Zhipeng Cai, Yingshu Li, Jing He, Prateek Mittal, Xinyang Zhang, Weiqing Li, Zhenguang Liu and Yi Pan and has published in prestigious journals such as IEEE Transactions on Pattern Analysis and Machine Intelligence, Scientific Reports and IEEE Transactions on Image Processing.

In The Last Decade

Shouling Ji

229 papers receiving 4.3k citations

Hit Papers

Temporal Multi-Graph Convolutional Network for Traffic Fl... 2020 2026 2022 2024 2020 50 100 150 200

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Shouling Ji China 38 2.1k 1.4k 1.1k 814 680 252 4.4k
Suman Nath United States 40 1.2k 0.6× 3.5k 2.5× 1.6k 1.5× 1.1k 1.3× 668 1.0× 151 5.4k
Raheem Beyah United States 29 1.3k 0.6× 1.6k 1.1× 794 0.7× 793 1.0× 313 0.5× 181 3.1k
Şahin Albayrak Germany 24 781 0.4× 875 0.6× 832 0.8× 709 0.9× 387 0.6× 272 2.9k
Klaus Wehrle Germany 35 1.5k 0.7× 3.9k 2.8× 1.6k 1.5× 662 0.8× 507 0.7× 307 6.0k
Haojin Zhu China 42 2.7k 1.3× 3.3k 2.4× 1.6k 1.5× 932 1.1× 473 0.7× 208 6.3k
Thomas Engel Luxembourg 29 1.6k 0.8× 2.7k 2.0× 823 0.8× 751 0.9× 393 0.6× 226 5.0k
Christian Becker Germany 27 1.8k 0.9× 1.9k 1.4× 1.2k 1.1× 242 0.3× 815 1.2× 196 4.2k
Maarten van Steen Netherlands 36 1.3k 0.6× 4.7k 3.3× 1.8k 1.6× 549 0.7× 413 0.6× 224 5.8k
Fabio Martinelli Italy 30 1.5k 0.7× 2.1k 1.5× 1.6k 1.5× 1.9k 2.4× 331 0.5× 337 4.1k

Countries citing papers authored by Shouling Ji

Since Specialization
Citations

This map shows the geographic impact of Shouling Ji's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Shouling Ji with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Shouling Ji more than expected).

Fields of papers citing papers by Shouling Ji

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Shouling Ji. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Shouling Ji. The network helps show where Shouling Ji may publish in the future.

Co-authorship network of co-authors of Shouling Ji

This figure shows the co-authorship network connecting the top 25 collaborators of Shouling Ji. A scholar is included among the top collaborators of Shouling Ji based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Shouling Ji. Shouling Ji is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Zhu, Tianqing, et al.. (2025). Stand-in Model Protection: Synthetic defense for membership inference and model inversion attacks. Knowledge-Based Systems. 316. 113339–113339.
2.
Zeng, Rui, et al.. (2025). CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models. 3 indexed citations
3.
Ling, Guowei, et al.. (2025). Ultra-Fast Private Set Intersection From Efficient Oblivious Key-Value Stores. IEEE Transactions on Dependable and Secure Computing. 22(5). 4998–5014. 1 indexed citations
4.
Peng, Hao, et al.. (2024). TextJuggler: Fooling text classification tasks by generating high-quality adversarial examples. Knowledge-Based Systems. 300. 112188–112188. 3 indexed citations
5.
Yu, Yue, et al.. (2024). GGT: Graph-guided testing for adversarial sample detection of deep neural network. Computers & Security. 140. 103710–103710. 2 indexed citations
6.
Ma, Tengfei, et al.. (2024). AdaCCD: Adaptive Semantic Contrasts Discovery Based Cross Lingual Adaptation for Code Clone Detection. Proceedings of the AAAI Conference on Artificial Intelligence. 38(16). 17942–17950. 1 indexed citations
7.
Bao, Han, et al.. (2024). MILG: Realistic lip-sync video generation with audio-modulated image inpainting. Visual Informatics. 8(3). 71–81.
8.
Ma, Zhe, Jianfeng Dong, Shouling Ji, et al.. (2024). Let All Be Whitened: Multi-Teacher Distillation for Efficient Visual Retrieval. Proceedings of the AAAI Conference on Artificial Intelligence. 38(5). 4126–4135. 1 indexed citations
9.
Ye, Tong, Lingfei Wu, Tengfei Ma, et al.. (2024). Tram: A Token-level Retrieval-augmented Mechanism for Source Code Summarization. 2959–2971. 4 indexed citations
10.
Zhu, Zheng, Min Chen, Shouling Ji, et al.. (2024). WIP: Auditing Artist Style Pirate in Text-to-image Generation Models. 3 indexed citations
11.
Zhao, Dandan, Xiaogang Xu, Yuwen Pu, et al.. (2024). MalGNE: Enhancing the Performance and Efficiency of CFG-Based Malware Detector by Graph Node Embedding in Low Dimension Space. IEEE Transactions on Information Forensics and Security. 19. 4881–4896. 7 indexed citations
12.
Hong, Zhen, et al.. (2024). MASiNet: Network Intrusion Detection for IoT Security Based on Meta-Learning Framework. IEEE Internet of Things Journal. 11(14). 25136–25146. 8 indexed citations
13.
Ling, Xiang, et al.. (2024). AdvSQLi: Generating Adversarial SQL Injections Against Real-World WAF-as-a-Service. IEEE Transactions on Information Forensics and Security. 19. 2623–2638. 12 indexed citations
14.
Ling, Xiang, Lingfei Wu, Jiangyu Zhang, et al.. (2023). Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art. Computers & Security. 128. 103134–103134. 53 indexed citations
15.
Wu, Lingfei, et al.. (2023). CP-BCS: Binary Code Summarization Guided by Control Flow Graph and Pseudo Code. 14740–14752. 3 indexed citations
16.
Zhang, Xuhong, Shouling Ji, Tianyu Du, et al.. (2022). Your Labels are Selling You Out: Relation Leaks in Vertical Federated Learning. IEEE Transactions on Dependable and Secure Computing. 20(5). 3653–3668. 15 indexed citations
17.
Formby, David, et al.. (2021). This Hacker Knows Physics: Device Physics Aware Mimicry Attacks in Cyber-Physical Systems. IEEE Transactions on Dependable and Secure Computing. 19(5). 3218–3230. 4 indexed citations
18.
Ji, Shouling, Chenyang Lyu, Yuan Chen, et al.. (2020). V-Fuzz: Vulnerability Prediction-Assisted Evolutionary Fuzzing for Binary Programs. IEEE Transactions on Cybernetics. 52(5). 3745–3756. 37 indexed citations
19.
Chen, Jing, et al.. (2018). CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections. 2060–2068. 99 indexed citations
20.
Ji, Shouling, et al.. (2017). DPPG: A Dynamic Password Policy Generation System. IEEE Transactions on Information Forensics and Security. 13(3). 545–558. 13 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026