Sufyan Al-Janabi

420 total citations
64 papers, 240 citations indexed

About

Sufyan Al-Janabi is a scholar working on Artificial Intelligence, Computer Networks and Communications and Computer Vision and Pattern Recognition. According to data from OpenAlex, Sufyan Al-Janabi has authored 64 papers receiving a total of 240 indexed citations (citations by other indexed papers that have themselves been cited), including 29 papers in Artificial Intelligence, 26 papers in Computer Networks and Communications and 21 papers in Computer Vision and Pattern Recognition. Recurrent topics in Sufyan Al-Janabi's work include Network Security and Intrusion Detection (9 papers), Cryptography and Data Security (9 papers) and Chaos-based Image/Signal Encryption (8 papers). Sufyan Al-Janabi is often cited by papers focused on Network Security and Intrusion Detection (9 papers), Cryptography and Data Security (9 papers) and Chaos-based Image/Signal Encryption (8 papers). Sufyan Al-Janabi collaborates with scholars based in Iraq, United Kingdom and United States. Sufyan Al-Janabi's co-authors include Belal Al‐Khateeb, Ali Makki Sagheer, Khalid Shaker, Javed Ahmed, Joseph E. Urban, Kashif Kifayat, David I. Anderson and Nazar Ali and has published in prestigious journals such as SHILAP Revista de lepidopterología, Multimedia Tools and Applications and Future Internet.

In The Last Decade

Sufyan Al-Janabi

51 papers receiving 213 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Sufyan Al-Janabi Iraq 8 125 106 55 46 46 64 240
Kamal Benzekki Morocco 4 237 1.9× 76 0.7× 63 1.1× 22 0.5× 41 0.9× 6 293
Junsong Fu China 9 163 1.3× 134 1.3× 136 2.5× 28 0.6× 47 1.0× 51 314
Yali Liu China 9 134 1.1× 103 1.0× 97 1.8× 40 0.9× 60 1.3× 45 257
Ashutosh Bhatia India 12 211 1.7× 109 1.0× 89 1.6× 37 0.8× 52 1.1× 56 352
N. R. Sunitha India 9 76 0.6× 140 1.3× 102 1.9× 45 1.0× 45 1.0× 57 251
J. Premalatha India 9 93 0.7× 73 0.7× 93 1.7× 80 1.7× 103 2.2× 30 269
Lawrie Brown Australia 3 143 1.1× 123 1.2× 145 2.6× 44 1.0× 92 2.0× 5 311
Aleksandra Mileva North Macedonia 8 107 0.9× 136 1.3× 43 0.8× 88 1.9× 67 1.5× 32 256
Yuuichi Teranishi Japan 10 254 2.0× 37 0.3× 88 1.6× 49 1.1× 26 0.6× 95 345

Countries citing papers authored by Sufyan Al-Janabi

Since Specialization
Citations

This map shows the geographic impact of Sufyan Al-Janabi's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Sufyan Al-Janabi with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Sufyan Al-Janabi more than expected).

Fields of papers citing papers by Sufyan Al-Janabi

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Sufyan Al-Janabi. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Sufyan Al-Janabi. The network helps show where Sufyan Al-Janabi may publish in the future.

Co-authorship network of co-authors of Sufyan Al-Janabi

This figure shows the co-authorship network connecting the top 25 collaborators of Sufyan Al-Janabi. A scholar is included among the top collaborators of Sufyan Al-Janabi based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Sufyan Al-Janabi. Sufyan Al-Janabi is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Al-Janabi, Sufyan, et al.. (2025). Survey on Secure Scientific Workflow Scheduling in Cloud Environments. Future Internet. 17(2). 51–51. 3 indexed citations
2.
Al-Janabi, Sufyan, et al.. (2024). Face Morphing Attacks Detection Approaches: A Review. 2024. 82–101. 1 indexed citations
3.
Al-Janabi, Sufyan, et al.. (2023). Using Metaheuristics (SA-MCSDN) Optimized for Multi-Controller Placement in Software-Defined Networking. Future Internet. 15(1). 39–39. 4 indexed citations
4.
Al-Janabi, Sufyan, et al.. (2023). Security Attacks on E-Voting System Using Blockchain. Iraqi Journal for Computer Science and Mathematics. 179–188. 5 indexed citations
5.
Al-Janabi, Sufyan, et al.. (2023). Security Attacks on E-Voting System Using Blockchain. SHILAP Revista de lepidopterología. 4(2).
6.
Al-Janabi, Sufyan, et al.. (2022). Multi-Controllers Placement Optimization in SDN by the Hybrid HSA-PSO Algorithm. Computers. 11(7). 111–111. 17 indexed citations
7.
Al-Janabi, Sufyan, et al.. (2019). A Framework for I-Voting based on Helios and Public-Key Certificates. SSRN Electronic Journal. 1 indexed citations
8.
Al-Janabi, Sufyan, et al.. (2019). Edge Computing: Review and Future Directions (Computación de Borde: Revisión y Direcciones Futuras). SSRN Electronic Journal. 2 indexed citations
9.
Al-Janabi, Sufyan, et al.. (2019). Security of Internet Voting Schemes: A Survey. SSRN Electronic Journal. 2 indexed citations
10.
Ahmed, Javed & Sufyan Al-Janabi. (2019). Classification and Identification of Classical Cipher Type Using Artificial Neural Networks. SSRN Electronic Journal. 1 indexed citations
11.
Al-Janabi, Sufyan, et al.. (2019). Image Retrieval using Neural Network based Hash Encoding: A Survey. SSRN Electronic Journal. 1 indexed citations
12.
Al-Janabi, Sufyan. (2016). On the Necessity of Establishing a National Cybersecurity Testbed. 2(4). 428–436.
13.
Al-Janabi, Sufyan, et al.. (2016). Architectural Design of General Cryptanalysis Platform for Pedagogical Purposes. 11(1). 1–1. 1 indexed citations
14.
Al-Janabi, Sufyan, et al.. (2015). An Enhanced Algorithm for Hiding Sensitive Association Rules Based on ISL and DSR Algorithms. SSRN Electronic Journal. 2 indexed citations
15.
Al-Janabi, Sufyan, et al.. (2012). Mediated IBC-Based Management System of Identity and Access in Cloud Computing. SSRN Electronic Journal. 2 indexed citations
16.
Al-Janabi, Sufyan, et al.. (2012). Email Security Using Two Cryptographic Hybrids of Mediated and Identity-Based Cryptography. 6(3). 1–12. 1 indexed citations
17.
Al-Janabi, Sufyan, et al.. (2008). Design and Implementation of SET-Enabled E-Commerce System. SHILAP Revista de lepidopterología.
18.
Al-Janabi, Sufyan, et al.. (2007). Secure E-Mail System Using S/Mime and Ib-Pkc. SHILAP Revista de lepidopterología. 25(4). 646–668. 1 indexed citations
19.
Al-Janabi, Sufyan. (2007). Unconditionally Secure Authentication in Quantum Key Distribution. 1(3). 30–42.
20.
Al-Janabi, Sufyan. (1999). Quantum Cryptographic Key Distribution in Optical Communication Networks. SSRN Electronic Journal.

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026