Weizhong Qiang

1000 total citations
63 papers, 606 citations indexed

About

Weizhong Qiang is a scholar working on Computer Networks and Communications, Information Systems and Artificial Intelligence. According to data from OpenAlex, Weizhong Qiang has authored 63 papers receiving a total of 606 indexed citations (citations by other indexed papers that have themselves been cited), including 37 papers in Computer Networks and Communications, 30 papers in Information Systems and 30 papers in Artificial Intelligence. Recurrent topics in Weizhong Qiang's work include Security and Verification in Computing (20 papers), Advanced Malware Detection Techniques (18 papers) and Cloud Computing and Resource Management (14 papers). Weizhong Qiang is often cited by papers focused on Security and Verification in Computing (20 papers), Advanced Malware Detection Techniques (18 papers) and Cloud Computing and Resource Management (14 papers). Weizhong Qiang collaborates with scholars based in China, Canada and Australia. Weizhong Qiang's co-authors include Hai Jin, Deqing Zou, Laurence T. Yang, Wei-Che Chien, Chin‐Feng Lai, Xuanhua Shi, Bin Yuan, Shui Yu, Jun Feng and Jinjun Chen and has published in prestigious journals such as SHILAP Revista de lepidopterología, IEEE Access and IEEE Transactions on Industrial Informatics.

In The Last Decade

Weizhong Qiang

58 papers receiving 565 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Weizhong Qiang China 12 361 246 233 133 59 63 606
Jin Kwak South Korea 13 394 1.1× 233 0.9× 248 1.1× 256 1.9× 62 1.1× 86 614
Hisham Alasmary Saudi Arabia 16 413 1.1× 245 1.0× 290 1.2× 251 1.9× 43 0.7× 44 691
Qingfeng Cheng China 13 306 0.8× 300 1.2× 248 1.1× 71 0.5× 67 1.1× 60 533
Jiqiang Liu China 13 398 1.1× 156 0.6× 298 1.3× 177 1.3× 39 0.7× 46 603
Nataliia Neshenko United States 7 450 1.2× 242 1.0× 237 1.0× 254 1.9× 53 0.9× 13 670
Raja Naeem Akram United Kingdom 13 256 0.7× 244 1.0× 201 0.9× 100 0.8× 69 1.2× 58 548
Randy Marchany United States 13 624 1.7× 141 0.6× 169 0.7× 225 1.7× 38 0.6× 55 736
Khair Eddin Sabri Jordan 11 375 1.0× 108 0.4× 320 1.4× 196 1.5× 46 0.8× 34 539

Countries citing papers authored by Weizhong Qiang

Since Specialization
Citations

This map shows the geographic impact of Weizhong Qiang's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Weizhong Qiang with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Weizhong Qiang more than expected).

Fields of papers citing papers by Weizhong Qiang

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Weizhong Qiang. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Weizhong Qiang. The network helps show where Weizhong Qiang may publish in the future.

Co-authorship network of co-authors of Weizhong Qiang

This figure shows the co-authorship network connecting the top 25 collaborators of Weizhong Qiang. A scholar is included among the top collaborators of Weizhong Qiang based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Weizhong Qiang. Weizhong Qiang is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Tang, Shan, et al.. (2025). ρHammer: Reviving RowHammer Attacks on New Architectures via Prefetching. ArXiv.org. 1433–1447.
2.
Zhao, Yu, et al.. (2024). Owl: Differential-Based Side-Channel Leakage Detection for CUDA Applications. 362–376. 1 indexed citations
4.
Xu, Fangzhou, et al.. (2023). Multi-path exploration guided by taint and probability against evasive malware. SHILAP Revista de lepidopterología. 2. 2023023–2023023.
6.
Zou, Deqing, Weizhong Qiang, Wenbo Wu, et al.. (2022). Utility-Prioritized Differential Privacy for Quantitative Biomedical Data. Journal of Circuits Systems and Computers. 31(13). 1 indexed citations
7.
Jin, Hai, et al.. (2022). SpecTerminator: Blocking Speculative Side Channels Based on Instruction Classes on RISC-V. ACM Transactions on Architecture and Code Optimization. 20(1). 1–26. 3 indexed citations
8.
Qiang, Weizhong, et al.. (2019). CloudCFI: Context-Sensitive and Incremental CFI in the Cloud Environment. IEEE Transactions on Cloud Computing. 9(3). 938–957. 1 indexed citations
9.
Dai, Weiqi, Pengfei Wan, Weizhong Qiang, et al.. (2018). TNGuard: Securing IoT Oriented Tenant Networks Based on SDN. IEEE Internet of Things Journal. 5(3). 1411–1423. 6 indexed citations
10.
Qiang, Weizhong, et al.. (2017). DroidAuditor: A framework for auditing covert communication on Android. Concurrency and Computation Practice and Experience. 29(19). 3 indexed citations
11.
Qiang, Weizhong, et al.. (2017). ISLUS: An Immediate and Safe Live Update System for C Program. 267–274. 5 indexed citations
12.
Dai, Weiqi, Hai Jin, Weizhong Qiang, et al.. (2017). RollSec: Automatically Secure Software States Against General Rollback. International Journal of Parallel Programming. 46(4). 788–805. 1 indexed citations
13.
Yuan, Bin, et al.. (2016). Defending Against Flow Table Overloading Attack in Software-Defined Networks. IEEE Transactions on Services Computing. 12(2). 231–246. 84 indexed citations
14.
Zhao, Feng, Hang Zhu, Hai Jin, & Weizhong Qiang. (2015). A Skip-gram-based Framework to Extract Knowledge from Chinese Reviews in Cloud Environment. Mobile Networks and Applications. 20(3). 363–369. 2 indexed citations
15.
Qiang, Weizhong & Александр Константинов. (2010). The Design and Implementation of Standards-Based Grid Single Sign-On Using Federated Identity. 458–464. 5 indexed citations
16.
Qiang, Weizhong & Александр Константинов. (2009). Towards cross-middleware authentication and single sign-on for ARC Grid middleware. Computer Science - Research and Development. 23(3-4). 267–274. 1 indexed citations
17.
Yan, Fei, Huanguo Zhang, Zhidong Shen, Liqiang Zhang, & Weizhong Qiang. (2006). An Improved Wireless Grid Security Infrastructure Based on Trusted Computing Technology. 1–4.
18.
Yan, Fei, Huanguo Zhang, Qi Sun, et al.. (2006). An improved grid security infrastructure by trusted computing. Wuhan University Journal of Natural Sciences. 11(6). 1805–1808. 3 indexed citations
19.
Zou, Deqing, et al.. (2005). A Formal General Framework and Service Access Model for Service Grid. 40. 349–356. 4 indexed citations
20.
Jin, Hai, Weizhong Qiang, Xuanhua Shi, & Deqing Zou. (2005). RB-GACA: an RBAC based grid access control architecture. International Journal of Grid and Utility Computing. 1(1). 61–61. 12 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026