Thanassis Giannetsos

1.9k total citations · 1 hit paper
46 papers, 941 citations indexed

About

Thanassis Giannetsos is a scholar working on Artificial Intelligence, Computer Networks and Communications and Signal Processing. According to data from OpenAlex, Thanassis Giannetsos has authored 46 papers receiving a total of 941 indexed citations (citations by other indexed papers that have themselves been cited), including 28 papers in Artificial Intelligence, 18 papers in Computer Networks and Communications and 11 papers in Signal Processing. Recurrent topics in Thanassis Giannetsos's work include Privacy-Preserving Technologies in Data (13 papers), Network Security and Intrusion Detection (12 papers) and Advanced Malware Detection Techniques (10 papers). Thanassis Giannetsos is often cited by papers focused on Privacy-Preserving Technologies in Data (13 papers), Network Security and Intrusion Detection (12 papers) and Advanced Malware Detection Techniques (10 papers). Thanassis Giannetsos collaborates with scholars based in Denmark, Greece and Sweden. Thanassis Giannetsos's co-authors include Tassos Dimitriou, Panos Papadimitratos, Stylianos Gisdakis, Ioannis Krontiris, Nikolaos Pitropakis, Emmanouil Panaousis, George Loukas, Eleftherios Anastasiadis, Liqun Chen and Sofia Anna Menesidou and has published in prestigious journals such as Sensors, International Journal of Production Research and IEEE Internet of Things Journal.

In The Last Decade

Thanassis Giannetsos

45 papers receiving 886 citations

Hit Papers

Human-centric artificial intelligence architecture for in... 2022 2026 2023 2024 2022 40 80 120

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Thanassis Giannetsos Denmark 15 465 365 184 160 152 46 941
Francesco Pascale Italy 13 256 0.6× 206 0.6× 143 0.8× 59 0.4× 87 0.6× 33 636
Qin Hu United States 18 463 1.0× 322 0.9× 522 2.8× 143 0.9× 66 0.4× 67 1.1k
Péter Bertök Australia 17 564 1.2× 429 1.2× 348 1.9× 50 0.3× 178 1.2× 63 1.1k
M.A.P. Chamikara Australia 12 673 1.4× 222 0.6× 288 1.6× 96 0.6× 83 0.5× 30 1.0k
Wajid Rafique China 21 458 1.0× 716 2.0× 407 2.2× 41 0.3× 106 0.7× 39 1.4k
Chunhua Hu China 11 238 0.5× 299 0.8× 246 1.3× 28 0.2× 55 0.4× 16 811
Zengxiang Li Singapore 12 474 1.0× 317 0.9× 479 2.6× 50 0.3× 54 0.4× 53 997
Shunmei Meng China 17 316 0.7× 558 1.5× 467 2.5× 41 0.3× 75 0.5× 65 952
Daniele Miorandi Italy 15 206 0.4× 360 1.0× 265 1.4× 72 0.5× 99 0.7× 32 722

Countries citing papers authored by Thanassis Giannetsos

Since Specialization
Citations

This map shows the geographic impact of Thanassis Giannetsos's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Thanassis Giannetsos with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Thanassis Giannetsos more than expected).

Fields of papers citing papers by Thanassis Giannetsos

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Thanassis Giannetsos. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Thanassis Giannetsos. The network helps show where Thanassis Giannetsos may publish in the future.

Co-authorship network of co-authors of Thanassis Giannetsos

This figure shows the co-authorship network connecting the top 25 collaborators of Thanassis Giannetsos. A scholar is included among the top collaborators of Thanassis Giannetsos based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Thanassis Giannetsos. Thanassis Giannetsos is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Papamartzivanos, Dimitrios, et al.. (2023). Explainable Artificial Intelligence to Enhance Data Trustworthiness in Crowd-Sensing Systems. VBN Forskningsportal (Aalborg Universitet). 568–576. 1 indexed citations
2.
Krontiris, Ioannis, et al.. (2023). Comparative Evaluation of PKI and DAA-based Architectures for V2X Communication Security. 199–206. 5 indexed citations
3.
Giannetsos, Thanassis, et al.. (2023). Achieving Higher Level of Assurance in Privacy Preserving Identity Wallets. 1049–1059.
4.
Rožanec, Jože M., Inna Novalija, Patrik Zajec, et al.. (2022). Human-centric artificial intelligence architecture for industry 5.0 applications. International Journal of Production Research. 61(20). 6847–6872. 137 indexed citations breakdown →
5.
Giannetsos, Thanassis, et al.. (2022). ZEKRO: Zero-Knowledge Proof of Integrity Conformance. 1–10. 1 indexed citations
6.
Καραγιώργου, Σοφία, et al.. (2022). Towards Robustifying Image Classifiers against the Perils of Adversarial Attacks on Artificial Intelligence Systems. Sensors. 22(18). 6905–6905. 8 indexed citations
7.
Papamartzivanos, Dimitrios, Sofia Anna Menesidou, Panagiotis Gouvas, & Thanassis Giannetsos. (2021). A Perfect Match: Converging and Automating Privacy and Security Impact Assessment On-the-Fly. Future Internet. 13(2). 30–30. 11 indexed citations
8.
Laurent, Maryline, et al.. (2020). Information Security Theory and Practice. Lecture notes in computer science. 6 indexed citations
9.
Giannetsos, Thanassis & Daniele Sgandurra. (2020). 2nd Workshop on Cyber-Security Arms Race (CYSARM 2020). 2147–2148. 1 indexed citations
10.
Giannetsos, Thanassis & Ioannis Krontiris. (2019). Securing V2X Communications for the Future. Technical University of Denmark, DTU Orbit (Technical University of Denmark, DTU). 1–8. 11 indexed citations
11.
Chen, Liqun, et al.. (2019). Toward Practical Privacy-Preserving Processing Over Encrypted Data in IoT: An Assistive Healthcare Use Case. IEEE Internet of Things Journal. 6(6). 10177–10190. 40 indexed citations
12.
Ntantogian, Christoforos, Sofia Anna Menesidou, Kaitai Liang, et al.. (2019). Secure Edge Computing with Lightweight Control-Flow Property-based Attestation. Surrey Research Insight Open Access (The University of Surrey). 12 indexed citations
13.
Chen, Liqun, et al.. (2017). Privacy-enhanced capabilities for VANETs using direct anonymous attestation. View. 123–130. 21 indexed citations
14.
Gisdakis, Stylianos, Thanassis Giannetsos, & Panos Papadimitratos. (2015). SHIELD. View. 1–12. 24 indexed citations
15.
Ye, Lin, Viktória Fodor, Thanassis Giannetsos, & Panos Papadimitratos. (2015). Path Metric Authentication for Low-Power and Lossy Networks. 1–6. 7 indexed citations
16.
Gisdakis, Stylianos, Thanassis Giannetsos, & Panos Papadimitratos. (2014). SPPEAR : Security a Privacy-Preserving Architecture for Mobile Crowd-Sensing Applications. 2 indexed citations
17.
Giannetsos, Thanassis & Tassos Dimitriou. (2013). LDAC: A localized and decentralized algorithm for efficiently countering wormholes in mobile wireless networks. Journal of Computer and System Sciences. 80(3). 618–643. 12 indexed citations
18.
Giannetsos, Thanassis, Tassos Dimitriou, Ioannis Krontiris, & Neeli R. Prasad. (2010). Arbitrary Code Injection through Self-propagating Worms in Von Neumann Architecture Devices. The Computer Journal. 53(10). 1576–1593. 20 indexed citations
19.
Giannetsos, Thanassis, Tassos Dimitriou, & Neeli R. Prasad. (2009). Self-propagating worms in wireless sensor networks. VBN Forskningsportal (Aalborg Universitet). 31–32. 9 indexed citations
20.
Giannetsos, Thanassis, Tassos Dimitriou, & Neeli R. Prasad. (2009). State of the art on defenses against wormhole attacks in wireless sensor networks. VBN Forskningsportal (Aalborg Universitet). 313–318. 9 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026