Tielei Wang

1.1k total citations
17 papers, 698 citations indexed

About

Tielei Wang is a scholar working on Signal Processing, Artificial Intelligence and Information Systems. According to data from OpenAlex, Tielei Wang has authored 17 papers receiving a total of 698 indexed citations (citations by other indexed papers that have themselves been cited), including 15 papers in Signal Processing, 12 papers in Artificial Intelligence and 6 papers in Information Systems. Recurrent topics in Tielei Wang's work include Advanced Malware Detection Techniques (15 papers), Security and Verification in Computing (10 papers) and Software Testing and Debugging Techniques (5 papers). Tielei Wang is often cited by papers focused on Advanced Malware Detection Techniques (15 papers), Security and Verification in Computing (10 papers) and Software Testing and Debugging Techniques (5 papers). Tielei Wang collaborates with scholars based in China, United States and Singapore. Tielei Wang's co-authors include Tao Wei, Guofei Gu, Wei Zou, Wenke Lee, Wei Zou, Long Lu, Zhiqiang Lin, Chengyu Song, Simon P. Chung and Yeongjin Jang and has published in prestigious journals such as ACM Transactions on Information and System Security, Journal of Computer Security and Network and Distributed System Security Symposium.

In The Last Decade

Tielei Wang

17 papers receiving 645 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Tielei Wang China 11 505 393 296 275 153 17 698
Matthias Neugschwandtner Austria 12 632 1.3× 292 0.7× 345 1.2× 313 1.1× 377 2.5× 21 807
Purui Su China 11 286 0.6× 319 0.8× 160 0.5× 217 0.8× 228 1.5× 54 577
Asia Slowinska Netherlands 13 648 1.3× 589 1.5× 197 0.7× 290 1.1× 323 2.1× 23 834
Sebastian Schinzel Germany 10 259 0.5× 390 1.0× 134 0.5× 233 0.8× 158 1.0× 24 596
Kangjie Lu United States 18 749 1.5× 704 1.8× 249 0.8× 440 1.6× 345 2.3× 54 1.0k
Ryan Riley Qatar 13 526 1.0× 481 1.2× 85 0.3× 285 1.0× 313 2.0× 29 757
Insu Yun United States 9 280 0.6× 248 0.6× 238 0.8× 169 0.6× 215 1.4× 17 557
Zheng Leong Chua Singapore 9 441 0.9× 502 1.3× 57 0.2× 269 1.0× 265 1.7× 12 672
Jonathon Giffin United States 14 818 1.6× 683 1.7× 136 0.5× 468 1.7× 510 3.3× 21 999
Robert Gawlik Germany 9 530 1.0× 354 0.9× 342 1.2× 309 1.1× 154 1.0× 14 716

Countries citing papers authored by Tielei Wang

Since Specialization
Citations

This map shows the geographic impact of Tielei Wang's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Tielei Wang with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Tielei Wang more than expected).

Fields of papers citing papers by Tielei Wang

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Tielei Wang. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Tielei Wang. The network helps show where Tielei Wang may publish in the future.

Co-authorship network of co-authors of Tielei Wang

This figure shows the co-authorship network connecting the top 25 collaborators of Tielei Wang. A scholar is included among the top collaborators of Tielei Wang based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Tielei Wang. Tielei Wang is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

17 of 17 papers shown
1.
Tang, Ke, Minhui Xue, Yuan Tian, et al.. (2020). iOS, your OS, everybody's OS: vetting and analyzing network services of iOS applications. 2415–2432. 5 indexed citations
2.
Liu, Gongshen, et al.. (2017). Exploitations of Uninitialized Uses on macOS Sierra. 4 indexed citations
3.
Song, Chengyu, Chao Zhang, Tielei Wang, Wenke Lee, & David Melski. (2015). Exploiting and Protecting Dynamic Code Generation. 26 indexed citations
4.
Lee, Byoungyoung, Chengyu Song, Yeongjin Jang, et al.. (2015). Preventing Use-after-free with Dangling Pointers Nullification. 79 indexed citations
5.
Wang, Tielei, et al.. (2014). On the feasibility of large-scale infections of iOS devices. USENIX Security Symposium. 79–93. 12 indexed citations
6.
Lee, Byoungyoung, Long Lu, Tielei Wang, Taesoo Kim, & Wenke Lee. (2014). From Zygote to Morula: Fortifying Weakened ASLR on Android. 424–439. 33 indexed citations
7.
Jang, Yeongjin, Chengyu Song, Simon P. Chung, Tielei Wang, & Wenke Lee. (2014). A11y Attacks. 103–115. 45 indexed citations
8.
Wang, Tielei, Kangjie Lu, Long Lu, Simon P. Chung, & Wenke Lee. (2013). Jekyll on iOS: when benign apps become evil. USENIX Security Symposium. 559–572. 67 indexed citations
9.
Dai, Shuaifu, Tao Wei, Chao Zhang, et al.. (2012). A Framework to Eliminate Backdoors from Response-Computable Authentication. National University of Singapore. 4219 lncs. 3–17. 7 indexed citations
10.
Wei, Tao, Tielei Wang, Lei Duan, & Jing Luo. (2011). INSeRT: Protect Dynamic Code Generation against spraying. 323–328. 10 indexed citations
11.
Zhang, Chao, Wei Zou, Tielei Wang, Yu Chen, & Tao Wei. (2011). Using type analysis in compiler to mitigate integer-overflow-to-buffer-overflow threat. Journal of Computer Security. 19(6). 1083–1107. 4 indexed citations
12.
Wang, Tielei, Tao Wei, Guofei Gu, & Wei Zou. (2011). Checksum-Aware Fuzzing Combined with Dynamic Taint Analysis and Symbolic Execution. ACM Transactions on Information and System Security. 14(2). 1–28. 27 indexed citations
13.
Wei, Tao, Tielei Wang, Lei Duan, & Jing Luo. (2010). Secure dynamic code generation against spraying. 738–740. 15 indexed citations
14.
Dai, Shuaifu, Yaxin Liu, Tielei Wang, Tao Wei, & Wei Zou. (2010). Behavior-Based Malware Detection on Mobile Phone. 4. 1–4. 13 indexed citations
15.
Wang, Tielei, Tao Wei, Guofei Gu, & Wei Zou. (2010). TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection. 497–512. 237 indexed citations
16.
Wang, Tielei, Tao Wei, Zhiqiang Lin, & Wei Zou. (2009). IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution.. Network and Distributed System Security Symposium. 112 indexed citations
17.
Wang, Tielei. (2008). Based on Minitab Confirmed Most Appropriate Parameter of Design of Experiment. Coal Mine Machinery. 2 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026