Weiqing Huang

1.0k total citations
99 papers, 530 citations indexed

About

Weiqing Huang is a scholar working on Artificial Intelligence, Computer Networks and Communications and Electrical and Electronic Engineering. According to data from OpenAlex, Weiqing Huang has authored 99 papers receiving a total of 530 indexed citations (citations by other indexed papers that have themselves been cited), including 41 papers in Artificial Intelligence, 33 papers in Computer Networks and Communications and 30 papers in Electrical and Electronic Engineering. Recurrent topics in Weiqing Huang's work include Network Security and Intrusion Detection (25 papers), Advanced Malware Detection Techniques (21 papers) and Digital Media Forensic Detection (15 papers). Weiqing Huang is often cited by papers focused on Network Security and Intrusion Detection (25 papers), Advanced Malware Detection Techniques (21 papers) and Digital Media Forensic Detection (15 papers). Weiqing Huang collaborates with scholars based in China, Australia and United States. Weiqing Huang's co-authors include Min Yu, Jun Zhou, Jing Wang, Zhixin Shi, Jianguo Jiang, Tianbo Gu, Kim‐Kwang Raymond Choo, Prasant Mohapatra, Chao Liu and Gang Li and has published in prestigious journals such as Journal of Hazardous Materials, Sensors and Information Sciences.

In The Last Decade

Weiqing Huang

86 papers receiving 512 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Weiqing Huang China 11 244 223 169 101 97 99 530
Xiaoxin Chen China 11 309 1.3× 130 0.6× 165 1.0× 197 2.0× 58 0.6× 40 567
Guowen Wu China 12 154 0.6× 408 1.8× 97 0.6× 153 1.5× 104 1.1× 25 576
Shan Liao China 11 193 0.8× 115 0.5× 63 0.4× 72 0.7× 30 0.3× 34 377
Xuefei Cao China 11 396 1.6× 433 1.9× 74 0.4× 232 2.3× 96 1.0× 28 682
Yuanwu Lei China 13 122 0.5× 93 0.4× 82 0.5× 22 0.2× 131 1.4× 40 427
Fei Pan China 18 295 1.2× 414 1.9× 120 0.7× 154 1.5× 679 7.0× 39 992
Ruxin Zhao China 13 225 0.9× 125 0.6× 64 0.4× 76 0.8× 52 0.5× 30 406
Brian Jalaian United States 14 217 0.9× 238 1.1× 31 0.2× 52 0.5× 182 1.9× 49 558

Countries citing papers authored by Weiqing Huang

Since Specialization
Citations

This map shows the geographic impact of Weiqing Huang's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Weiqing Huang with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Weiqing Huang more than expected).

Fields of papers citing papers by Weiqing Huang

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Weiqing Huang. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Weiqing Huang. The network helps show where Weiqing Huang may publish in the future.

Co-authorship network of co-authors of Weiqing Huang

This figure shows the co-authorship network connecting the top 25 collaborators of Weiqing Huang. A scholar is included among the top collaborators of Weiqing Huang based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Weiqing Huang. Weiqing Huang is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Jiang, Nan, et al.. (2025). Passive Multi-User Traffic Analysis Based on 5G NR/LTE Physical Layer. IEEE Transactions on Information Forensics and Security. 20. 6794–6809.
2.
Sun, Degang, et al.. (2025). Manod: A multi-modal anomaly detection framework for distributed system. Neural Networks. 193. 107999–107999. 1 indexed citations
3.
Yang, Haitian, Degang Sun, & Weiqing Huang. (2024). DualAttlog: Context aware dual attention networks for log-based anomaly detection. Neural Networks. 180. 106680–106680. 2 indexed citations
4.
Yang, Haitian, et al.. (2024). DSGN: Log-based anomaly diagnosis with dynamic semantic gate networks. Information Sciences. 680. 121174–121174. 1 indexed citations
5.
Huang, Weiqing, et al.. (2024). Spectrum Painting for On-Device Signal Classification. 229–238. 1 indexed citations
6.
Liu, Ran, Ming Liu, He Zhang, et al.. (2024). SumSurvey: An Abstractive Dataset of Scientific Survey Papers for Long Document Summarization. 9632–9651. 2 indexed citations
7.
Zhang, Shunliang, Weiqing Huang, & Yinlong Liu. (2024). A systematic survey on physical layer security oriented to reconfigurable intelligent surface empowered 6G. Computers & Security. 148. 104100–104100. 7 indexed citations
9.
Huang, Weiqing, et al.. (2023). TransTM: A device-free method based on time-streaming multiscale transformer for human activity recognition. Defence Technology. 32. 619–628. 14 indexed citations
11.
Guo, Caili, et al.. (2023). Physical Layer Authentication Based on Channel Polarization Response in Dual-Polarized Antenna Communication Systems. IEEE Transactions on Information Forensics and Security. 18. 2144–2159. 14 indexed citations
12.
Huang, Weiqing. (2023). The Impact of Electronic Device Usage on Relationship Satisfaction. Lecture Notes in Education Psychology and Public Media. 30(1). 183–188. 1 indexed citations
13.
Ma, Xiu, et al.. (2023). TGPrint: Attack fingerprint classification on encrypted network traffic based graph convolution attention networks. Computers & Security. 135. 103466–103466. 5 indexed citations
14.
Liu, Chao, Shuai Yu, Min Yu, et al.. (2021). Adaptive Smooth L1 Loss: A Better Way to Regress Scene Texts with Extreme Aspect Ratios. 1–7. 19 indexed citations
15.
Huang, Weiqing, et al.. (2021). An SEI-Based Identification Scheme for Illegal FM Broadcast. 517–524. 2 indexed citations
16.
Cao, Ziwen, et al.. (2020). A Temporal and Spatial Data Redundancy Processing Algorithm for RFID Surveillance Data. Wireless Communications and Mobile Computing. 2020. 1–12. 3 indexed citations
17.
Yu, Min, et al.. (2019). Malicious documents detection for business process management based on multi-layer abstract model. Future Generation Computer Systems. 99. 517–526. 5 indexed citations
18.
Zhang, Huixia, et al.. (2017). Research on Meshfree method for analyzing seal behavior of a T-DGS. International Journal of Precision Engineering and Manufacturing. 18(4). 529–536. 6 indexed citations
19.
Shi, Jun, Weiqing Huang, Dong Wei, & Degang Sun. (2014). A novel method for computer video leaking signal detection. 918–923. 2 indexed citations
20.
Huang, Weiqing. (2005). Research on Information Compromising Emanation of Cross Modulation Derived from Mobile Stations. Computer Engineering and Science.

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026