W. Fan

2.9k total citations
32 papers, 187 citations indexed

About

W. Fan is a scholar working on Information Systems, Signal Processing and Artificial Intelligence. According to data from OpenAlex, W. Fan has authored 32 papers receiving a total of 187 indexed citations (citations by other indexed papers that have themselves been cited), including 14 papers in Information Systems, 13 papers in Signal Processing and 10 papers in Artificial Intelligence. Recurrent topics in W. Fan's work include Advanced Malware Detection Techniques (12 papers), Software Testing and Debugging Techniques (7 papers) and Software Engineering Research (5 papers). W. Fan is often cited by papers focused on Advanced Malware Detection Techniques (12 papers), Software Testing and Debugging Techniques (7 papers) and Software Engineering Research (5 papers). W. Fan collaborates with scholars based in China, United States and France. W. Fan's co-authors include Wei Huang, Wei Huang, Ao Luo, Yongbin Wang, Jing An, Wei Gong, Liu Ye, Peng Jin, Zongyi Zhang and Meng Zhang and has published in prestigious journals such as Nuclear Physics A, IEEE Internet of Things Journal and Applied Soft Computing.

In The Last Decade

W. Fan

29 papers receiving 178 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
W. Fan China 6 80 79 64 51 20 32 187
C. Kouzinopoulos Greece 7 31 0.4× 59 0.7× 9 0.1× 70 1.4× 13 0.7× 22 133
Houqiao Wang China 6 19 0.2× 24 0.3× 149 2.3× 77 1.5× 28 1.4× 11 239
Yuliang Li China 6 69 0.9× 345 4.4× 19 0.3× 126 2.5× 19 0.9× 15 409
Tomáš Čejka Czechia 10 44 0.6× 242 3.1× 71 1.1× 192 3.8× 9 0.5× 42 288
Jinshuo Liu China 7 43 0.5× 32 0.4× 8 0.1× 40 0.8× 59 3.0× 38 183
Liang Yuan China 8 44 0.6× 110 1.4× 13 0.2× 63 1.2× 31 1.6× 30 225
J. Álvarez Cid-Fuentes Spain 8 75 0.9× 127 1.6× 19 0.3× 49 1.0× 5 0.3× 14 303
Thomas M. Stricker Switzerland 9 43 0.5× 212 2.7× 7 0.1× 23 0.5× 8 0.4× 33 250
Alexander D. Kent United States 5 42 0.5× 63 0.8× 32 0.5× 38 0.7× 6 0.3× 15 99
Kushal Datta United States 5 44 0.6× 88 1.1× 26 0.4× 39 0.8× 21 1.1× 9 149

Countries citing papers authored by W. Fan

Since Specialization
Citations

This map shows the geographic impact of W. Fan's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by W. Fan with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites W. Fan more than expected).

Fields of papers citing papers by W. Fan

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by W. Fan. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by W. Fan. The network helps show where W. Fan may publish in the future.

Co-authorship network of co-authors of W. Fan

This figure shows the co-authorship network connecting the top 25 collaborators of W. Fan. A scholar is included among the top collaborators of W. Fan based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with W. Fan. W. Fan is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Li, Jiayu, Mingyuan Fan, Shuqi Yang, et al.. (2025). Genome-wide identification of castor bean class III peroxidase genes and analysis of expression patterns under abiotic stresses. BMC Plant Biology. 25(1). 900–900.
2.
Fan, W., et al.. (2025). Learning efficient branch-and-bound for solving Mixed Integer Linear Programs. Applied Soft Computing. 172. 112863–112863. 2 indexed citations
3.
Fan, W., et al.. (2025). Probing cold nuclear matter with energy correlators. Physical review. C. 112(3). 4 indexed citations
4.
Lin, Weiguo, W. Fan, Jia Chen, et al.. (2024). A Graph Neural Network Model for Live Face Anti-Spoofing Detection Camera Systems. IEEE Internet of Things Journal. 11(15). 25720–25730. 5 indexed citations
5.
Lara, C. E. Pérez, S. Aune, B. Azmoun, et al.. (2021). A Comparative Study of Straight-Strip and Zigzag-Interleaved Anode Patterns for MPGD Readouts. IEEE Transactions on Nuclear Science. 69(1). 50–55. 4 indexed citations
6.
Fan, W.. (2020). Thermal photon production in Au+Au collisions. Nuclear Physics A. 1005. 121911–121911. 1 indexed citations
7.
Fan, W., et al.. (2020). Research on Building Exploitable Vulnerability Database for Cloud-Native App. 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC). 6. 758–762. 4 indexed citations
8.
Fan, W., et al.. (2020). An Explainable Method of Phishing Emails Generation and Its Application in Machine Learning. 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC). 1279–1283. 4 indexed citations
9.
Luo, Ao, Wei Huang, & W. Fan. (2019). A CNN-based Approach to the Detection of SQL Injection Attacks. 320–324. 25 indexed citations
10.
Pan, Yue, Jing An, W. Fan, & Wei Huang. (2019). Shellfier. 462–466. 1 indexed citations
11.
An, Jing, et al.. (2018). Constructing an Intrusion Detection Model based on Long Short-term Neural Networks. 5. 355–360. 1 indexed citations
12.
Ye, Liu, Wei Gong, & W. Fan. (2018). Application of AES and RSA Hybrid Algorithm in E-mail. 701–703. 17 indexed citations
13.
An, Jing, et al.. (2018). JSEFuzz: Vulnerability Detection Method for Java Web Application. 92–96. 2 indexed citations
14.
Fan, W.. (2017). Direct Photon Production and Azimuthal Anisotropy at Low Transverse Momentum measured in PHENIX. Nuclear and Particle Physics Proceedings. 289-290. 153–156. 1 indexed citations
15.
Fan, W., et al.. (2017). A Shellcode Detection Method Based on Full Native API Sequence and Support Vector Machine. IOP Conference Series Materials Science and Engineering. 242. 12124–12124. 16 indexed citations
16.
Huang, Wei, et al.. (2016). The optimized attribute attack graph based on APT attack stage model. 2781–2785. 5 indexed citations
17.
Fan, W., Lei Xue, & Jing An. (2014). Obfuscated Malicious Code Detection with Path Condition Analysis. Journal of Networks. 9(5). 1 indexed citations
18.
Fan, W., et al.. (2009). A novel symbolic execution framework for multi-procedure program analysis. 858–863. 1 indexed citations
19.
Fan, W., Binbin Zhou, Hongliang Liang, & Yixian Yang. (2009). A Novel Program Analysis Method Based on Execution Path Correlation. 178–181. 1 indexed citations
20.

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026