Sicong Cao

545 total citations · 1 hit paper
15 papers, 330 citations indexed

About

Sicong Cao is a scholar working on Information Systems, Artificial Intelligence and Software. According to data from OpenAlex, Sicong Cao has authored 15 papers receiving a total of 330 indexed citations (citations by other indexed papers that have themselves been cited), including 11 papers in Information Systems, 11 papers in Artificial Intelligence and 7 papers in Software. Recurrent topics in Sicong Cao's work include Software Engineering Research (9 papers), Adversarial Robustness in Machine Learning (6 papers) and Advanced Malware Detection Techniques (6 papers). Sicong Cao is often cited by papers focused on Software Engineering Research (9 papers), Adversarial Robustness in Machine Learning (6 papers) and Advanced Malware Detection Techniques (6 papers). Sicong Cao collaborates with scholars based in China, Australia and Singapore. Sicong Cao's co-authors include Lili Bo, Xiaobing Sun, Bin Li, Weiqin Ying, Rongxin Wu, Bin Li, David Lo, Xin Zhou, Yu Ouyang and Tao Zhang and has published in prestigious journals such as ACM Computing Surveys, IEEE Internet of Things Journal and Information and Software Technology.

In The Last Decade

Sicong Cao

14 papers receiving 320 citations

Hit Papers

BGNN4VD: Constructing Bidirectional Graph Neural-Network ... 2021 2026 2022 2024 2021 40 80 120

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Sicong Cao China 9 256 181 176 103 74 15 330
Xiaorui Gong China 7 161 0.6× 256 1.4× 139 0.8× 113 1.1× 126 1.7× 17 309
Qiyi Tang China 9 182 0.7× 153 0.8× 108 0.6× 100 1.0× 65 0.9× 14 265
Aram Hovsepyan Belgium 6 326 1.3× 198 1.1× 210 1.2× 60 0.6× 71 1.0× 10 376
Xinhui Han China 8 224 0.9× 337 1.9× 120 0.7× 143 1.4× 203 2.7× 31 394
Simon Holm Jensen Denmark 5 258 1.0× 124 0.7× 233 1.3× 100 1.0× 64 0.9× 5 332
Philipp von Styp-Rekowsky Germany 7 114 0.4× 193 1.1× 86 0.5× 96 0.9× 74 1.0× 11 210
Pan Bian China 6 125 0.5× 111 0.6× 114 0.6× 41 0.4× 43 0.6× 8 178
Yannic Noller Singapore 7 169 0.7× 77 0.4× 192 1.1× 47 0.5× 36 0.5× 21 247
Chu-Pan Wong United States 8 284 1.1× 64 0.4× 238 1.4× 95 0.9× 83 1.1× 10 327
Justin Sahs United States 3 154 0.6× 307 1.7× 142 0.8× 96 0.9× 216 2.9× 6 335

Countries citing papers authored by Sicong Cao

Since Specialization
Citations

This map shows the geographic impact of Sicong Cao's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Sicong Cao with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Sicong Cao more than expected).

Fields of papers citing papers by Sicong Cao

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Sicong Cao. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Sicong Cao. The network helps show where Sicong Cao may publish in the future.

Co-authorship network of co-authors of Sicong Cao

This figure shows the co-authorship network connecting the top 25 collaborators of Sicong Cao. A scholar is included among the top collaborators of Sicong Cao based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Sicong Cao. Sicong Cao is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

15 of 15 papers shown
1.
Zhou, Mingxuan, Sicong Cao, Xiaoxue Wu, et al.. (2025). HgtJIT: Just-in-Time Vulnerability Detection Based on Heterogeneous Graph Transformer. IEEE Transactions on Dependable and Secure Computing. 22(6). 6522–6538. 1 indexed citations
2.
Cao, Sicong, Xiaobing Sun, Ratnadira Widyasari, et al.. (2025). A Systematic Literature Review on Explainability for ML/DL-based Software Engineering. ACM Computing Surveys. 58(4). 1–34.
3.
Cao, Sicong, Xiaobing Sun, David Lo, et al.. (2024). Snopy: Bridging Sample Denoising with Causal Graph Learning for Effective Vulnerability Detection. 606–618. 1 indexed citations
4.
Cao, Sicong, et al.. (2024). Coca: Improving and Explaining Graph Neural Network-Based Vulnerability Detection Systems. 1–13. 15 indexed citations
5.
Sun, Xiaobing, et al.. (2024). 1+1>2: Integrating Deep Code Behaviors with Metadata Features for Malicious PyPI Package Detection. 1159–1170. 2 indexed citations
6.
Cao, Sicong, Xiaobing Sun, Di Wu, et al.. (2024). EXVul: Toward Effective and Explainable Vulnerability Detection for IoT Devices. IEEE Internet of Things Journal. 11(12). 22385–22398. 1 indexed citations
7.
Zhou, Xin, Sicong Cao, Xiaobing Sun, & David Lo. (2024). Large Language Model for Vulnerability Detection and Repair: Literature Review and the Road Ahead. ACM Transactions on Software Engineering and Methodology. 34(5). 1–31. 20 indexed citations
8.
Cao, Sicong, Xiaobing Sun, Lili Bo, et al.. (2023). Learning to Detect Memory-related Vulnerabilities. ACM Transactions on Software Engineering and Methodology. 33(2). 1–35. 11 indexed citations
9.
Cao, Sicong, Biao He, Yu Ouyang, et al.. (2023). ODDFuzz: Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing. 2726–2743. 14 indexed citations
10.
Cao, Sicong, Lili Bo, Bin Li, et al.. (2023). Improving Java Deserialization Gadget Chain Mining via Overriding-Guided Object Generation. 15 indexed citations
11.
Zhou, Zhou, Lili Bo, Xiaobing Sun, et al.. (2022). SPVF: security property assisted vulnerability fixing via attention-based models. Empirical Software Engineering. 27(7). 12 indexed citations
12.
Cao, Sicong, et al.. (2022). MVD. arXiv (Cornell University). 1456–1468. 68 indexed citations
13.
Ying, Weiqin, Xiaobing Sun, Lili Bo, et al.. (2021). A comprehensive study on security bug characteristics. Journal of Software Evolution and Process. 33(10). 19 indexed citations
14.
Tang, Ben Zhong, et al.. (2021). GrasP: Graph-to-Sequence Learning for Automated Program Repair. 819–828. 3 indexed citations
15.
Cao, Sicong, Xiaobing Sun, Lili Bo, Weiqin Ying, & Bin Li. (2021). BGNN4VD: Constructing Bidirectional Graph Neural-Network for Vulnerability Detection. Information and Software Technology. 136. 106576–106576. 148 indexed citations breakdown →

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026