Xuren Wang

636 total citations
43 papers, 328 citations indexed

About

Xuren Wang is a scholar working on Information Systems, Artificial Intelligence and Computer Networks and Communications. According to data from OpenAlex, Xuren Wang has authored 43 papers receiving a total of 328 indexed citations (citations by other indexed papers that have themselves been cited), including 22 papers in Information Systems, 21 papers in Artificial Intelligence and 19 papers in Computer Networks and Communications. Recurrent topics in Xuren Wang's work include Network Security and Intrusion Detection (14 papers), Topic Modeling (6 papers) and Information and Cyber Security (6 papers). Xuren Wang is often cited by papers focused on Network Security and Intrusion Detection (14 papers), Topic Modeling (6 papers) and Information and Cyber Security (6 papers). Xuren Wang collaborates with scholars based in China and United States. Xuren Wang's co-authors include Zhengwei Jiang, Baoxu Liu, Jian Liu, Jun Jiang, Ning Li, Qiu-Hui Zheng, Demeng Xia, Xiaoqing Zhang, Huamin Feng and Xinpei Liu and has published in prestigious journals such as Medicine, Materials Science and Engineering C and Frontiers in Public Health.

In The Last Decade

Xuren Wang

39 papers receiving 318 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Xuren Wang China 10 158 154 143 84 21 43 328
Zahra Ahmadi Germany 10 169 1.1× 84 0.5× 64 0.4× 65 0.8× 21 1.0× 27 283
Anmin Zhou China 9 140 0.9× 98 0.6× 142 1.0× 69 0.8× 6 0.3× 19 331
Aditya Kuppa Ireland 6 197 1.2× 89 0.6× 108 0.8× 84 1.0× 14 0.7× 11 307
Victor Elijah Adeyemo United Kingdom 11 157 1.0× 266 1.7× 148 1.0× 120 1.4× 6 0.3× 17 407
Qingfeng Tan China 11 161 1.0× 141 0.9× 122 0.9× 64 0.8× 14 0.7× 28 289
Adel Hamdan Mohammad Jordan 10 188 1.2× 124 0.8× 98 0.7× 59 0.7× 7 0.3× 20 315
Paul Anderson United Kingdom 9 151 1.0× 256 1.7× 165 1.2× 30 0.4× 11 0.5× 38 402
Majid Alshammari Saudi Arabia 10 122 0.8× 106 0.7× 80 0.6× 34 0.4× 9 0.4× 26 258
Shirley M. Radack United States 9 65 0.4× 118 0.8× 85 0.6× 40 0.5× 9 0.4× 43 210
Cihan Varol United States 9 118 0.7× 157 1.0× 72 0.5× 134 1.6× 32 1.5× 66 298

Countries citing papers authored by Xuren Wang

Since Specialization
Citations

This map shows the geographic impact of Xuren Wang's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Xuren Wang with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Xuren Wang more than expected).

Fields of papers citing papers by Xuren Wang

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Xuren Wang. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Xuren Wang. The network helps show where Xuren Wang may publish in the future.

Co-authorship network of co-authors of Xuren Wang

This figure shows the co-authorship network connecting the top 25 collaborators of Xuren Wang. A scholar is included among the top collaborators of Xuren Wang based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Xuren Wang. Xuren Wang is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
2.
Wang, Xuren, et al.. (2023). A comprehensive and visualized analysis of relationship between ferroptosis and tumor using bibliometrics and bioinformatics.. PubMed. 13(12). 6190–6209. 1 indexed citations
3.
Wang, Yushi, et al.. (2023). Simplified-Xception: A New Way to Speed Up Malicious Code Classification. 111–116. 1 indexed citations
5.
Liu, Jian, Junjie Yan, Jun Jiang, et al.. (2022). TriCTI: an actionable cyber threat intelligence discovery system via trigger-enhanced neural network. Cybersecurity. 5(1). 21 indexed citations
6.
Jiang, Zhengwei, et al.. (2022). TI-Prompt: Towards a Prompt Tuning Method for Few-shot Threat Intelligence Twitter Classification. 2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC). 19. 272–279. 1 indexed citations
7.
Wang, Xuren, et al.. (2021). Knowledge, Attitudes, and Practices of Military Personnel Regarding Heat-Related Illness Risk Factors: Results of a Chinese Cross-Sectional Study. Frontiers in Public Health. 9. 707264–707264. 8 indexed citations
8.
Jiang, Jun, et al.. (2021). A Framework for Document-level Cybersecurity Event Extraction from Open Source Data. 422–427. 5 indexed citations
9.
Wang, Xuren, et al.. (2021). HSRF: Community Detection Based on Heterogeneous Attributes and Semi-Supervised Random Forest. 1141–1147. 1 indexed citations
10.
Wang, Xuren, et al.. (2020). Threat Intelligence Relationship Extraction Based on Distant Supervision and Reinforcement Learning.. Software Engineering and Knowledge Engineering. 572–576. 7 indexed citations
11.
Xia, Demeng, Xuren Wang, Yixin Wang, et al.. (2020). Silver-decorated mesostructured cellular silica foams as excellent antibacterial hemostatic agents for rapid and effective treatment of hemorrhage. Materials Science and Engineering C. 115. 111105–111105. 17 indexed citations
12.
Wang, Chen, et al.. (2020). Publication trends of research on acute lung injury and acute respiration distress syndrome during 2009-2019: a 10-year bibliometric analysis.. PubMed. 12(10). 6366–6380. 9 indexed citations
13.
Fang, Zhou, et al.. (2020). Bi-LSTM: Finding Network Anomaly Based on Feature Grouping Clustering. 88–94. 4 indexed citations
14.
Wang, Xuren, et al.. (2020). DNRTI: A Large-Scale Dataset for Named Entity Recognition in Threat Intelligence. 1842–1848. 31 indexed citations
15.
Wang, Xuren, et al.. (2015). A secure and lightweight authentication protocol for RFID. 6. 317–320. 3 indexed citations
16.
Luo, Liming, et al.. (2013). Communication framework for MMOG based on custom protocol. The Journal of China Universities of Posts and Telecommunications. 20. 55–80.
17.
Huang, Xiangyang, et al.. (2012). Goal-oriented action planning in partially observable stochastic domains. 14. 1381–1385. 3 indexed citations
18.
Wang, Xuren, et al.. (2011). Research of Internet public opinion based on data mining. 24. 2414–2418.
19.
Wang, Xuren, et al.. (2007). Application of Rough Set Theory to Intrusion Detection System. 562–562. 4 indexed citations
20.
Wang, Xuren, et al.. (2005). Rough Set Theory: Application in Electronic Commerce Data Mining. 541–544. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026