Tianyang Zhou

747 total citations
29 papers, 508 citations indexed

About

Tianyang Zhou is a scholar working on Computer Networks and Communications, Artificial Intelligence and Information Systems. According to data from OpenAlex, Tianyang Zhou has authored 29 papers receiving a total of 508 indexed citations (citations by other indexed papers that have themselves been cited), including 12 papers in Computer Networks and Communications, 9 papers in Artificial Intelligence and 8 papers in Information Systems. Recurrent topics in Tianyang Zhou's work include Network Security and Intrusion Detection (11 papers), Photoacoustic and Ultrasonic Imaging (5 papers) and Advanced Malware Detection Techniques (5 papers). Tianyang Zhou is often cited by papers focused on Network Security and Intrusion Detection (11 papers), Photoacoustic and Ultrasonic Imaging (5 papers) and Advanced Malware Detection Techniques (5 papers). Tianyang Zhou collaborates with scholars based in China, Canada and Switzerland. Tianyang Zhou's co-authors include Xiao-Wen Chang, Xiaohua Yang, Xin Liu, Jianwen Luo, Qiong He, Mengyang Lu, Yi Yang, Qingxian Wang, Han Qiu and Hang Li and has published in prestigious journals such as IEEE Access, IEEE Transactions on Medical Imaging and Physics in Medicine and Biology.

In The Last Decade

Tianyang Zhou

25 papers receiving 476 citations

Peers

Tianyang Zhou
Yidi Wang China
Azizul H. Quazi United States
Wenjun Zeng Hong Kong
Qi Yang China
Aaron D. Lanterman United States
Tianyang Zhou
Citations per year, relative to Tianyang Zhou Tianyang Zhou (= 1×) peers Zhuang Zhao-wen

Countries citing papers authored by Tianyang Zhou

Since Specialization
Citations

This map shows the geographic impact of Tianyang Zhou's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Tianyang Zhou with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Tianyang Zhou more than expected).

Fields of papers citing papers by Tianyang Zhou

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Tianyang Zhou. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Tianyang Zhou. The network helps show where Tianyang Zhou may publish in the future.

Co-authorship network of co-authors of Tianyang Zhou

This figure shows the co-authorship network connecting the top 25 collaborators of Tianyang Zhou. A scholar is included among the top collaborators of Tianyang Zhou based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Tianyang Zhou. Tianyang Zhou is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Zhou, Tianyang, et al.. (2025). Geopolitical risk and global supply chain resilience. Finance research letters. 86. 108551–108551.
2.
Zhou, Tianyang, et al.. (2024). Efficient Penetration Testing Path Planning Based on Reinforcement Learning with Episodic Memory. Computer Modeling in Engineering & Sciences. 140(3). 2613–2634. 1 indexed citations
4.
Zhou, Tianyang, et al.. (2021). Research on Modeling and Simulation of CPPS and Its Cascading Failure Mechanism. 163. 42–47. 3 indexed citations
5.
Zhou, Tianyang, et al.. (2021). An Automated Penetration Semantic Knowledge Mining Algorithm Based on Bayesian Inference. Computers, materials & continua/Computers, materials & continua (Print). 66(3). 2573–2585. 3 indexed citations
7.
Yan, Fei, et al.. (2021). Research on Multiscene Vehicle Dataset Based on Improved FCOS Detection Algorithms. Complexity. 2021(1). 1 indexed citations
8.
Zhang, Yichao, et al.. (2020). Domain-Independent Intelligent Planning Technology and Its Application to Automated Penetration Testing Oriented Attack Path Discovery. 电子与信息学报. 42(9). 2095–2107. 8 indexed citations
9.
Zhou, Tianyang, et al.. (2020). Recommendation of cyber attack method based on knowledge graph. 2040. 60–65. 2 indexed citations
10.
Liu, Xin, Tianyang Zhou, Mengyang Lu, et al.. (2020). Deep Learning for Ultrasound Localization Microscopy. IEEE Transactions on Medical Imaging. 39(10). 3064–3078. 90 indexed citations
11.
Liu, Xin, et al.. (2019). Single-view cone-beam x-ray luminescence optical tomography based on Group_YALL1 method. Physics in Medicine and Biology. 64(10). 105004–105004. 9 indexed citations
12.
Zhou, Tianyang, et al.. (2019). A Format Protection Method of Greybox Fuzzing. 1571–1579.
13.
Lu, Mengyang, Tianyang Zhou, & Xin Liu. (2019). 3-D super-resolution localization microscopy using deep-learning method. 29–29. 2 indexed citations
14.
Zhou, Tianyang, et al.. (2018). Integrating Temporal Information Into Knowledge Tracing: A Temporal Difference Approach. IEEE Access. 6. 27302–27312. 12 indexed citations
15.
Zhou, Tianyang, Jianwen Luo, & Xin Liu. (2018). Deep learning for super-resolution localization microscopy. 109. 75–75. 1 indexed citations
16.
Zhao, Lili, Changpeng Han, Ying Liu, et al.. (2018). Improved Imaging Performance in Super-Resolution Localization Microscopy by YALL1 Method. IEEE Access. 6. 5438–5446. 5 indexed citations
17.
Wang, Qingxian, et al.. (2016). LAAEM: A Method to Enhance LDoS Attack. IEEE Communications Letters. 20(4). 708–711. 23 indexed citations
18.
Qiu, Han, et al.. (2014). The new threat to internet: DNP attack with the attacking flows strategizing technology. International Journal of Communication Systems. 28(6). 1126–1139. 11 indexed citations
19.
Zhou, Tianyang, et al.. (2013). An API deobfuscation method combining dynamic and static techniques. 30. 2133–2138. 3 indexed citations
20.
Chang, Xiao-Wen, Xiaohua Yang, & Tianyang Zhou. (2005). MLAMBDA: A Modified LAMBDA Method for Integer Ambiguity Determination. 1086–1097. 8 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026