Wanlun Ma

526 total citations · 2 hit papers
18 papers, 187 citations indexed

About

Wanlun Ma is a scholar working on Artificial Intelligence, Computer Networks and Communications and Information Systems. According to data from OpenAlex, Wanlun Ma has authored 18 papers receiving a total of 187 indexed citations (citations by other indexed papers that have themselves been cited), including 11 papers in Artificial Intelligence, 4 papers in Computer Networks and Communications and 4 papers in Information Systems. Recurrent topics in Wanlun Ma's work include Network Security and Intrusion Detection (4 papers), Spam and Phishing Detection (3 papers) and Adversarial Robustness in Machine Learning (3 papers). Wanlun Ma is often cited by papers focused on Network Security and Intrusion Detection (4 papers), Spam and Phishing Detection (3 papers) and Adversarial Robustness in Machine Learning (3 papers). Wanlun Ma collaborates with scholars based in Australia, China and Denmark. Wanlun Ma's co-authors include Sheng Wen, Yang Xiang, Chao Chen, Qing‐Long Han, Wei Zhou, Minhui Xue, Xiaogang Zhu, Ruoxi Sun, Jun Zhang and Derui Wang and has published in prestigious journals such as IEEE Access, ACM Computing Surveys and IEEE Transactions on Industrial Informatics.

In The Last Decade

Wanlun Ma

16 papers receiving 178 citations

Hit Papers

AI Agents Under Threat: A Survey of Key Security Challeng... 2025 2026 2025 2025 10 20 30

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Wanlun Ma Australia 8 103 51 39 37 22 18 187
Karim Tabia France 6 83 0.8× 36 0.7× 21 0.5× 25 0.7× 16 0.7× 26 131
Guolei Yang United States 7 127 1.2× 26 0.5× 60 1.5× 50 1.4× 28 1.3× 12 189
Vishal Saraswat India 8 94 0.9× 23 0.5× 34 0.9× 15 0.4× 36 1.6× 17 127
Jiarong Xu China 10 174 1.7× 39 0.8× 38 1.0× 22 0.6× 36 1.6× 26 223
Karima Boudaoud France 6 61 0.6× 95 1.9× 64 1.6× 24 0.6× 20 0.9× 23 139
Frédérique Laforest France 6 64 0.6× 68 1.3× 50 1.3× 14 0.4× 42 1.9× 33 131
Rajvardhan Oak United States 6 102 1.0× 81 1.6× 44 1.1× 51 1.4× 19 0.9× 17 172
Kieran Greer United Kingdom 6 134 1.3× 41 0.8× 53 1.4× 36 1.0× 17 0.8× 39 182
Naipeng Dong Australia 7 50 0.5× 65 1.3× 87 2.2× 42 1.1× 8 0.4× 28 154

Countries citing papers authored by Wanlun Ma

Since Specialization
Citations

This map shows the geographic impact of Wanlun Ma's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Wanlun Ma with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Wanlun Ma more than expected).

Fields of papers citing papers by Wanlun Ma

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Wanlun Ma. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Wanlun Ma. The network helps show where Wanlun Ma may publish in the future.

Co-authorship network of co-authors of Wanlun Ma

This figure shows the co-authorship network connecting the top 25 collaborators of Wanlun Ma. A scholar is included among the top collaborators of Wanlun Ma based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Wanlun Ma. Wanlun Ma is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

18 of 18 papers shown
1.
Zhou, Wei, Qing‐Long Han, Wanlun Ma, et al.. (2025). Network Traffic Fingerprinting for IIoT Device Identification: A Survey. IEEE Transactions on Industrial Informatics. 21(5). 3541–3554. 14 indexed citations
2.
Ma, Wanlun, Derui Wang, Yiliao Song, et al.. (2025). TrapNet: Model Inversion Defense via Trapdoor. IEEE Transactions on Information Forensics and Security. 20. 4469–4483.
3.
Ma, Wanlun, Qing‐Long Han, Wei Zhou, et al.. (2025). Exploring DeepSeek: A Survey on Advances, Applications, Challenges and Future Directions. IEEE/CAA Journal of Automatica Sinica. 12(5). 872–893. 9 indexed citations
4.
Ma, Wanlun, et al.. (2025). AI Agents Under Threat: A Survey of Key Security Challenges and Future Pathways. ACM Computing Surveys. 57(7). 1–36. 30 indexed citations breakdown →
5.
Sun, Ruoxi, Minhui Xue, Wanlun Ma, et al.. (2025). Hardening LLM Fine-Tuning: From Differentially Private Data Selection to Trustworthy Model Quantization. IEEE Transactions on Information Forensics and Security. 20. 7211–7226. 1 indexed citations
6.
Zhu, Xiaogang, Wei Zhou, Qing‐Long Han, et al.. (2025). When Software Security Meets Large Language Models: A Survey. IEEE/CAA Journal of Automatica Sinica. 12(2). 317–334. 17 indexed citations breakdown →
7.
Ma, Wanlun, Xiaogang Zhu, Minhui Xue, et al.. (2025). Codebreaker: Dynamic Extraction Attacks on Code Language Models. 559–575.
8.
Ma, Wanlun, Qing‐Long Han, Wei Zhou, et al.. (2024). Pager Explosion: Cybersecurity Insights and Afterthoughts. IEEE/CAA Journal of Automatica Sinica. 11(12). 2359–2362. 5 indexed citations
9.
Ma, Wanlun, Yiliao Song, Minhui Xue, Sheng Wen, & Yang Xiang. (2024). The “Code” of Ethics: A Holistic Audit of AI Code Generators. IEEE Transactions on Dependable and Secure Computing. 21(5). 4997–5013. 6 indexed citations
10.
Ma, Wanlun, et al.. (2024). LocGuard: A Location Privacy Defender for Image Sharing. IEEE Transactions on Dependable and Secure Computing. 21(6). 5526–5537. 3 indexed citations
11.
Ma, Wanlun, et al.. (2023). Multi-modal Representation Learning for Social Post Location Inference. 20. 6331–6336. 1 indexed citations
12.
Ma, Wanlun, Derui Wang, Ruoxi Sun, et al.. (2023). The "Beatrix" Resurrections: Robust Backdoor Detection via Gram Matrices. 33 indexed citations
13.
Ma, Wanlun, et al.. (2022). Real-Time Detection of COVID-19 Events From Twitter: A Spatial-Temporally Bursty-Aware Method. IEEE Transactions on Computational Social Systems. 10(2). 656–672. 6 indexed citations
14.
Ma, Wanlun, et al.. (2022). Social Media Event Prediction using DNN with Feedback Mechanism. ACM Transactions on Management Information Systems. 13(3). 1–24. 7 indexed citations
15.
Ma, Wanlun, et al.. (2022). Event detection in online social network: Methodologies, state-of-art, and evolution. Computer Science Review. 46. 100500–100500. 42 indexed citations
16.
Wu, Tingmin, Wanlun Ma, Sheng Wen, et al.. (2021). Analysis of Trending Topics and Text-based Channels of Information Delivery in Cybersecurity. ACM Transactions on Internet Technology. 22(2). 1–27. 1 indexed citations
17.
Wu, Tingmin, Wanlun Ma, Sheng Wen, et al.. (2020). What risk? I don't understand. An Empirical Study on Users' Understanding of the Terms Used in Security Texts. Swinburne Research Bank (Swinburne University of Technology). 248–262. 5 indexed citations
18.
Ma, Wanlun, et al.. (2019). Faces are Protected as Privacy: An Automatic Tagging Framework Against Unpermitted Photo Sharing in Social Media. IEEE Access. 7. 75556–75567. 7 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026