Steven Gordon

2.5k total citations
57 papers, 609 citations indexed

About

Steven Gordon is a scholar working on Computer Networks and Communications, Electrical and Electronic Engineering and Artificial Intelligence. According to data from OpenAlex, Steven Gordon has authored 57 papers receiving a total of 609 indexed citations (citations by other indexed papers that have themselves been cited), including 36 papers in Computer Networks and Communications, 21 papers in Electrical and Electronic Engineering and 18 papers in Artificial Intelligence. Recurrent topics in Steven Gordon's work include Mobile Ad Hoc Networks (14 papers), Cryptography and Data Security (12 papers) and Wireless Networks and Protocols (10 papers). Steven Gordon is often cited by papers focused on Mobile Ad Hoc Networks (14 papers), Cryptography and Data Security (12 papers) and Wireless Networks and Protocols (10 papers). Steven Gordon collaborates with scholars based in Australia, Thailand and United States. Steven Gordon's co-authors include Md. Mamunur Rashid, Joarder Kamruzzaman, Tasadduq Imam, Santoso Wibowo, Mohammad Mehedi Hassan, Jonathan Katz, Vladimir Kolesnikov, Tal Malkin, Yevgeniy Vahlis and Mariana Raykova and has published in prestigious journals such as SHILAP Revista de lepidopterología, IEEE Access and Sensors.

In The Last Decade

Steven Gordon

56 papers receiving 584 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Steven Gordon Australia 12 340 336 112 110 94 57 609
Lukasz Ziarek United States 14 380 1.1× 165 0.5× 74 0.7× 207 1.9× 178 1.9× 76 676
Longjun Huang China 13 234 0.7× 142 0.4× 76 0.7× 60 0.5× 116 1.2× 40 481
Calvin Ko United States 12 792 2.3× 310 0.9× 140 1.3× 308 2.8× 150 1.6× 17 894
Mohammad R. Haghighat United States 11 309 0.9× 251 0.7× 42 0.4× 67 0.6× 149 1.6× 27 777
Massimo Merro Italy 13 278 0.8× 256 0.8× 37 0.3× 54 0.5× 78 0.8× 45 485
Eliane Martins Brazil 15 334 1.0× 153 0.5× 405 3.6× 68 0.6× 243 2.6× 70 961
J.-C. Fabre France 11 423 1.2× 183 0.5× 385 3.4× 40 0.4× 123 1.3× 25 811
Revathi Venkataraman India 12 218 0.6× 110 0.3× 112 1.0× 20 0.2× 54 0.6× 55 447
Le Wang China 12 111 0.3× 210 0.6× 55 0.5× 60 0.5× 62 0.7× 51 384
Xuan Feng China 12 183 0.5× 226 0.7× 43 0.4× 185 1.7× 126 1.3× 33 455

Countries citing papers authored by Steven Gordon

Since Specialization
Citations

This map shows the geographic impact of Steven Gordon's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Steven Gordon with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Steven Gordon more than expected).

Fields of papers citing papers by Steven Gordon

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Steven Gordon. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Steven Gordon. The network helps show where Steven Gordon may publish in the future.

Co-authorship network of co-authors of Steven Gordon

This figure shows the co-authorship network connecting the top 25 collaborators of Steven Gordon. A scholar is included among the top collaborators of Steven Gordon based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Steven Gordon. Steven Gordon is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Tariq, Umair Ullah, Fariza Sabrina, Md. Mamunur Rashid, et al.. (2025). Blockchain-Based Secured Data Sharing in Healthcare: A Systematic Literature Review. IEEE Access. 13. 45415–45435. 4 indexed citations
2.
Sabrina, Fariza, Tony Sahama, Md. Mamunur Rashid, & Steven Gordon. (2023). Empowering Patients to Delegate and Revoke Access to Blockchain-based Electronic Health Records. 66–71. 2 indexed citations
3.
Rashid, Md. Mamunur, Joarder Kamruzzaman, Tasadduq Imam, Santoso Wibowo, & Steven Gordon. (2022). A tree-based stacking ensemble technique with feature selection for network intrusion detection. Applied Intelligence. 52(9). 9768–9781. 99 indexed citations
4.
Ranellucci, Samuel, et al.. (2020). Secure parallel computation on national scale volumes of data. USENIX Security Symposium. 2487–2504. 3 indexed citations
5.
Rashid, Md. Mamunur, Joarder Kamruzzaman, Mohiuddin Ahmed, et al.. (2020). Performance Enhancement of Intrusion detection System Using Bagging Ensemble Technique with Feature Selection. Australasian Journal of Paramedicine. 1–5. 7 indexed citations
6.
Rashid, Md. Mamunur, Joarder Kamruzzaman, Mohammad Mehedi Hassan, Tasadduq Imam, & Steven Gordon. (2020). Cyberattacks Detection in IoT-Based Smart City Applications Using Machine Learning Techniques. International Journal of Environmental Research and Public Health. 17(24). 9347–9347. 110 indexed citations
7.
Kittipiyakul, Somsak, et al.. (2019). Safety Message Verification Using History-Based Relative-Time Zone Priority Scheme. Journal of Computer Networks and Communications. 2019. 1–14. 3 indexed citations
8.
Parkinson, Lynne, Annie Banbury, Anne Livingstone, et al.. (2018). Caring for Carers of People with Dementia: A Protocol for Harnessing Innovation Through Deploying Leading Edge Technologies to Enable Virtual Support Groups and Services.. PubMed. 246. 29–41. 2 indexed citations
9.
Gordon, Steven, et al.. (2018). Verifying Safety Messages Using Relative-Time and Zone Priority in Vehicular Ad Hoc Networks. Sensors. 18(4). 1195–1195. 19 indexed citations
10.
Gordon, Steven, et al.. (2017). Social-aware relay selection for device to device communications in cooperative cellular networks. Acquire (CQUniversity). 1–4. 5 indexed citations
11.
Miyaji, Atsuko, et al.. (2016). M-ORAM: A matrix ORAM with Log N bandwidth cost. Lecture notes in computer science. 9503. 3–15. 1 indexed citations
12.
Gordon, Steven, et al.. (2016). Analysis of Adaptive Multi-hop Time Synchronization in large wireless sensor networks. Acquire (CQUniversity). 7. 79–84. 1 indexed citations
13.
Gordon, Steven, et al.. (2014). iACK: Implicit acknowledgements to improve multicast reliability in wireless sensor networks. Acquire (CQUniversity). 1–6. 6 indexed citations
14.
Gordon, Steven, Jonathan Katz, Ranjit Kumaresan, & Arkady Yerukhimovich. (2013). Authenticated broadcast with a partially compromised public-key infrastructure. Information and Computation. 234. 17–25. 1 indexed citations
15.
Gordon, Steven & Jonathan Katz. (2010). Partial Fairness in Secure Two-Party Computation. Journal of Cryptology. 25(1). 14–40. 13 indexed citations
16.
Gordon, Steven, et al.. (2009). Delay And Packet Loss Analysis For Handovers Between Manets And Nemo Networks. Acquire (CQUniversity). 3(8). 2118–2123.
17.
Gordon, Steven, et al.. (2007). Using Relay Balance and AQM Schemes to Improve Performance in Multi-hop Wireless Networks. Acquire (CQUniversity). 879–884. 1 indexed citations
18.
Gordon, Steven, et al.. (2006). A General Framework for Context Transfer in Mobile IP Networks. 2. 1017–1021. 2 indexed citations
19.
Gordon, Steven, et al.. (2005). Using Rate Balancing to Improve Throughput in a Wireless Multi-hop Chain Topology. Acquire (CQUniversity). 1–6. 1 indexed citations
20.
Gordon, Steven, et al.. (2005). Ranger, a Novel Intrusion Detection System Architecture for Mobile Ad Hoc Networks. Acquire (CQUniversity). 1–6. 3 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026