Sirajuddin Qureshi

636 total citations
26 papers, 336 citations indexed

About

Sirajuddin Qureshi is a scholar working on Computer Networks and Communications, Information Systems and Signal Processing. According to data from OpenAlex, Sirajuddin Qureshi has authored 26 papers receiving a total of 336 indexed citations (citations by other indexed papers that have themselves been cited), including 17 papers in Computer Networks and Communications, 11 papers in Information Systems and 10 papers in Signal Processing. Recurrent topics in Sirajuddin Qureshi's work include Network Security and Intrusion Detection (10 papers), Advanced Malware Detection Techniques (10 papers) and Digital and Cyber Forensics (5 papers). Sirajuddin Qureshi is often cited by papers focused on Network Security and Intrusion Detection (10 papers), Advanced Malware Detection Techniques (10 papers) and Digital and Cyber Forensics (5 papers). Sirajuddin Qureshi collaborates with scholars based in China, Pakistan and Ireland. Sirajuddin Qureshi's co-authors include Nafei Zhu, Jingsha He, Ahsan Wajahat, Ahsan Nazir, Faheem Akhtar, Faheem Ullah, Muhammad Salman Pathan, Tariq Mahmood, Jianqiang Li and Xiangjun Ma and has published in prestigious journals such as IEEE Access, Heliyon and Ain Shams Engineering Journal.

In The Last Decade

Sirajuddin Qureshi

25 papers receiving 318 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Sirajuddin Qureshi China 10 200 109 98 83 47 26 336
Pulei Xiong Canada 10 246 1.2× 184 1.7× 132 1.3× 87 1.0× 90 1.9× 19 399
Raed Alharthi United States 7 231 1.2× 189 1.7× 147 1.5× 72 0.9× 29 0.6× 25 355
Anastasija Collen Switzerland 9 139 0.7× 81 0.7× 68 0.7× 107 1.3× 38 0.8× 22 247
Vipindev Adat Vasudevan Greece 7 288 1.4× 97 0.9× 99 1.0× 117 1.4× 85 1.8× 24 371
Eleftherios Anastasiadis United Kingdom 8 136 0.7× 137 1.3× 76 0.8× 39 0.5× 71 1.5× 11 320
Endong Tong China 8 140 0.7× 95 0.9× 43 0.4× 66 0.8× 42 0.9× 38 269
Benamar Kadri Algeria 13 222 1.1× 161 1.5× 55 0.6× 84 1.0× 117 2.5× 33 337
Ali A. Ghorbani Canada 10 337 1.7× 235 2.2× 195 2.0× 94 1.1× 46 1.0× 23 451
Omar Aldabbas Jordan 9 183 0.9× 92 0.8× 55 0.6× 94 1.1× 61 1.3× 18 293
Khalid Aloufi Saudi Arabia 9 131 0.7× 92 0.8× 32 0.3× 71 0.9× 84 1.8× 28 286

Countries citing papers authored by Sirajuddin Qureshi

Since Specialization
Citations

This map shows the geographic impact of Sirajuddin Qureshi's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Sirajuddin Qureshi with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Sirajuddin Qureshi more than expected).

Fields of papers citing papers by Sirajuddin Qureshi

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Sirajuddin Qureshi. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Sirajuddin Qureshi. The network helps show where Sirajuddin Qureshi may publish in the future.

Co-authorship network of co-authors of Sirajuddin Qureshi

This figure shows the co-authorship network connecting the top 25 collaborators of Sirajuddin Qureshi. A scholar is included among the top collaborators of Sirajuddin Qureshi based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Sirajuddin Qureshi. Sirajuddin Qureshi is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
He, Jingsha, Nafei Zhu, Ahsan Nazir, et al.. (2025). Enhancing IoT security and healthcare data protection in the metaverse: A Dynamic Adaptive Security Mechanism. Egyptian Informatics Journal. 30. 100670–100670. 2 indexed citations
2.
Nazir, Ahsan, Jingsha He, Nafei Zhu, et al.. (2025). Empirical evaluation of ensemble learning and hybrid CNN-LSTM for IoT threat detection on heterogeneous datasets. The Journal of Supercomputing. 81(6). 10 indexed citations
3.
Qureshi, Sirajuddin, Jingsha He, Nafei Zhu, et al.. (2024). Systematic review of deep learning solutions for malware detection and forensic analysis in IoT. Journal of King Saud University - Computer and Information Sciences. 36(8). 102164–102164. 20 indexed citations
4.
Wajahat, Ahsan, Jingsha He, Nafei Zhu, et al.. (2024). An effective deep learning scheme for android malware detection leveraging performance metrics and computational resources. Intelligent Decision Technologies. 18(1). 33–55. 1 indexed citations
5.
He, Jingsha, Nafei Zhu, Ahsan Wajahat, et al.. (2024). Blockchain-enabled EHR access auditing: Enhancing healthcare data security. Heliyon. 10(16). e34407–e34407. 9 indexed citations
6.
Nazir, Ahsan, Jingsha He, Nafei Zhu, et al.. (2024). Collaborative threat intelligence: Enhancing IoT security through blockchain and machine learning integration. Journal of King Saud University - Computer and Information Sciences. 36(2). 101939–101939. 38 indexed citations
7.
Wajahat, Ahsan, Jingsha He, Nafei Zhu, et al.. (2024). Securing Android IoT devices with GuardDroid transparent and lightweight malware detection. Ain Shams Engineering Journal. 15(5). 102642–102642. 13 indexed citations
8.
Asad, Muhammad, et al.. (2023). A Survey on Security Issues and Attacks of Fog Computing. VFAST Transactions on Software Engineering. 11(1). 1–11. 6 indexed citations
9.
Nazir, Ahsan, Jingsha He, Nafei Zhu, et al.. (2023). Advancing IoT security: A systematic review of machine learning approaches for the detection of IoT botnets. Journal of King Saud University - Computer and Information Sciences. 35(10). 101820–101820. 42 indexed citations
10.
Wajahat, Ahsan, Jingsha He, Nafei Zhu, et al.. (2023). An adaptive semi-supervised deep learning-based framework for the detection of Android malware. Journal of Intelligent & Fuzzy Systems. 45(3). 5141–5157. 4 indexed citations
11.
Qureshi, Sirajuddin, et al.. (2021). Bootstrapping Dependency Treebank of Urdu Noisy Text. International Journal of Emerging Trends in Engineering Research. 9(8). 1102–1106.
12.
Qureshi, Sirajuddin, et al.. (2021). Investigating Student’s Obstacles While Learning Object Orientation. International journal of scientific and technology research. 10(6). 7–11. 1 indexed citations
13.
Qureshi, Sirajuddin, et al.. (2021). Analysis of Challenges in Modern Network Forensic Framework. Security and Communication Networks. 2021. 1–13. 3 indexed citations
14.
Qureshi, Sirajuddin, et al.. (2021). Network Forensics: A Comprehensive Review of Tools and Techniques. International Journal of Advanced Computer Science and Applications. 12(5). 13 indexed citations
16.
Mahmood, Tariq, Jianqiang Li, Yan Pei, et al.. (2021). An intelligent fault detection approach based on reinforcement learning system in wireless sensor network. The Journal of Supercomputing. 78(3). 3646–3675. 63 indexed citations
17.
Akhtar, Faheem, et al.. (2020). Discretization of the Crime Rate from Numerical Into Categorical. 27. 1–7. 1 indexed citations
18.
Wajahat, Ahsan, et al.. (2020). Interactively Visualize and Analyze Social Network Gephi. 1–9. 14 indexed citations
19.
Qureshi, Sirajuddin, et al.. (2019). Performance Analysis of Open Source Solution "ntop" for Active and Passive Packet Analysis Relating to Application and Transport Layer. International Journal of Advanced Computer Science and Applications. 10(3). 3 indexed citations
20.
Qureshi, Sirajuddin, et al.. (2018). Social Network chatting apps network traffic optimization. Indian Journal of Science and Technology. 11(4). 1–6. 2 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026