Wei She

908 total citations
38 papers, 562 citations indexed

About

Wei She is a scholar working on Information Systems, Artificial Intelligence and Computer Networks and Communications. According to data from OpenAlex, Wei She has authored 38 papers receiving a total of 562 indexed citations (citations by other indexed papers that have themselves been cited), including 20 papers in Information Systems, 16 papers in Artificial Intelligence and 9 papers in Computer Networks and Communications. Recurrent topics in Wei She's work include Service-Oriented Architecture and Web Services (10 papers), Access Control and Trust (9 papers) and Cloud Data Security Solutions (5 papers). Wei She is often cited by papers focused on Service-Oriented Architecture and Web Services (10 papers), Access Control and Trust (9 papers) and Cloud Data Security Solutions (5 papers). Wei She collaborates with scholars based in China, United States and Taiwan. Wei She's co-authors include Bhavani Thuraisingham, Wei Liu, Tian Zhao, I‐Ling Yen, Qi Liu, Bo Wang, Elisa Bertino, Hongbing Liu, Yan Xiao and Xiaoqing Zhang and has published in prestigious journals such as IEEE Access, IEEE Internet of Things Journal and Journal of Network and Computer Applications.

In The Last Decade

Wei She

36 papers receiving 536 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Wei She China 15 298 242 208 88 87 38 562
Sonia Ben Mokhtar France 15 289 1.0× 374 1.5× 322 1.5× 116 1.3× 169 1.9× 37 775
Francesco Moscato Italy 15 393 1.3× 284 1.2× 187 0.9× 44 0.5× 71 0.8× 48 632
Mahmoud Barhamgi France 15 296 1.0× 331 1.4× 271 1.3× 69 0.8× 101 1.2× 61 698
Eda Marchetti Italy 14 369 1.2× 312 1.3× 184 0.9× 126 1.4× 31 0.4× 91 690
Feras M. Awaysheh Estonia 13 285 1.0× 258 1.1× 286 1.4× 71 0.8× 52 0.6× 40 668
Carsten Rudolph Australia 13 340 1.1× 218 0.9× 263 1.3× 98 1.1× 37 0.4× 92 658
Mario Kolberg United Kingdom 14 343 1.2× 445 1.8× 270 1.3× 43 0.5× 110 1.3× 68 757
Fereidoon Shams Aliee Iran 13 298 1.0× 381 1.6× 141 0.7× 27 0.3× 58 0.7× 36 625
Abdelouahed Gherbi Canada 16 276 0.9× 284 1.2× 160 0.8× 44 0.5× 54 0.6× 62 596
Brett Benyo United States 9 102 0.3× 142 0.6× 184 0.9× 44 0.5× 61 0.7× 28 338

Countries citing papers authored by Wei She

Since Specialization
Citations

This map shows the geographic impact of Wei She's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Wei She with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Wei She more than expected).

Fields of papers citing papers by Wei She

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Wei She. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Wei She. The network helps show where Wei She may publish in the future.

Co-authorship network of co-authors of Wei She

This figure shows the co-authorship network connecting the top 25 collaborators of Wei She. A scholar is included among the top collaborators of Wei She based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Wei She. Wei She is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Tian, Zhao, et al.. (2025). Blockchain-Empowered Asynchronous Federated Reinforcement Learning for IoT-Based Traffic Trajectory Prediction. IEEE Internet of Things Journal. 12(11). 17095–17109. 1 indexed citations
2.
Liu, Wei, et al.. (2025). FedDM: A Discrepancy-Aware Federated Learning Method Based on Multibranch Feature Fusion for Non-IID Data Environments. IEEE Internet of Things Journal. 12(21). 45825–45835. 1 indexed citations
3.
Wang, Yuanyuan, et al.. (2023). A combination of XGBoost and FocalLoss-based cable aging state assessment method. 142–142. 1 indexed citations
4.
Tian, Shasha, et al.. (2023). Fast UAV path planning in urban environments based on three-step experience buffer sampling DDPG. Digital Communications and Networks. 10(4). 813–826. 11 indexed citations
5.
She, Wei, et al.. (2021). A double steganography model combining blockchain and interplanetary file system. Peer-to-Peer Networking and Applications. 14(5). 3029–3042. 23 indexed citations
6.
Zhang, Xiaoqing, et al.. (2021). RANet: Network intrusion detection with group-gating convolutional neural network. Journal of Network and Computer Applications. 198. 103266–103266. 21 indexed citations
7.
Wang, Xiujun, et al.. (2021). A donation tracing blockchain model using improved DPoS consensus algorithm. Peer-to-Peer Networking and Applications. 14(5). 2789–2800. 25 indexed citations
8.
She, Wei, et al.. (2020). A channel matching scheme for cross-chain. International Journal of Embedded Systems. 12(4). 500–500. 1 indexed citations
9.
Liu, Guangzhen, et al.. (2020). Intelligent substation fault diagnosis based on optimization support vector machine. IOP Conference Series Earth and Environmental Science. 526(1). 12101–12101. 1 indexed citations
10.
She, Wei, et al.. (2019). Homomorphic Consortium Blockchain for Smart Home System Sensitive Data Privacy Preserving. IEEE Access. 7. 62058–62070. 55 indexed citations
11.
She, Wei, et al.. (2019). Blockchain Trust Model for Malicious Node Detection in Wireless Sensor Networks. IEEE Access. 7. 38947–38956. 128 indexed citations
12.
13.
She, Wei, et al.. (2018). Parameter estimation of P-III distribution based on GA using rejection and interpolation mechanism. Cluster Computing. 22(S1). 2159–2167. 1 indexed citations
14.
Zhou, Jun, et al.. (2018). A Novel Hybrid-Based Ensemble for Class Imbalance Problem. International Journal of Artificial Intelligence Tools. 27(6). 1850025–1850025. 1 indexed citations
16.
She, Wei, et al.. (2015). Role-Based Integrated Access Control and Data Provenance for SOA Based Net-Centric Systems. IEEE Transactions on Services Computing. 9(6). 940–953. 19 indexed citations
17.
Li, Ping, et al.. (2012). Dual-Interface Security Smart Card Based Secure Authentication Method of Remote Payment in E-Banking. Applied Mechanics and Materials. 170-173. 3584–3587.
18.
She, Wei, I‐Ling Yen, & Bhavani Thuraisingham. (2010). WS-Sim: A Web Service Simulation Toolset with Realistic Data Support. 109–114. 3 indexed citations
19.
She, Wei, I‐Ling Yen, & Bhavani Thuraisingham. (2010). Enhancing Security Modeling for Web Services Using Delegation and Pass-On. International Journal of Web Services Research. 7(1). 1–21. 8 indexed citations
20.
She, Wei, I‐Ling Yen, Bhavani Thuraisingham, & Elisa Bertino. (2010). Policy-Driven Service Composition with Information Flow Control. Purdue e-Pubs (Purdue University System). 50–57. 19 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026