Yajin Zhou

7.6k total citations · 5 hit papers
110 papers, 4.8k citations indexed

About

Yajin Zhou is a scholar working on Signal Processing, Information Systems and Artificial Intelligence. According to data from OpenAlex, Yajin Zhou has authored 110 papers receiving a total of 4.8k indexed citations (citations by other indexed papers that have themselves been cited), including 64 papers in Signal Processing, 57 papers in Information Systems and 43 papers in Artificial Intelligence. Recurrent topics in Yajin Zhou's work include Advanced Malware Detection Techniques (64 papers), Security and Verification in Computing (30 papers) and Digital and Cyber Forensics (21 papers). Yajin Zhou is often cited by papers focused on Advanced Malware Detection Techniques (64 papers), Security and Verification in Computing (30 papers) and Digital and Cyber Forensics (21 papers). Yajin Zhou collaborates with scholars based in China, United States and Hong Kong. Yajin Zhou's co-authors include Xuxian Jiang, Michael Grace, Wu Zhou, Zhi Wang, Shihong Zou, Wu Zhou, Peng Ning, Qiang Zhang, Zhi Wang and Xiapu Luo and has published in prestigious journals such as Nucleic Acids Research, The EMBO Journal and IEEE Access.

In The Last Decade

Yajin Zhou

95 papers receiving 4.5k citations

Hit Papers

Dissecting Android Malwar... 2012 2026 2016 2021 2012 2012 2012 2012 2012 400 800 1.2k

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Yajin Zhou China 25 4.0k 2.5k 2.4k 1.9k 1.3k 110 4.8k
Paul Ammann United States 31 1.1k 0.3× 1.8k 0.7× 2.5k 1.0× 2.7k 1.4× 709 0.6× 113 4.6k
Zhiqiang Lin United States 31 2.1k 0.5× 1.1k 0.5× 1.5k 0.6× 544 0.3× 2.0k 1.5× 153 3.2k
Mark Stamp United States 29 2.0k 0.5× 1.8k 0.7× 1.2k 0.5× 347 0.2× 1.1k 0.9× 111 2.9k
Dinghao Wu United States 28 1.4k 0.3× 516 0.2× 1.2k 0.5× 909 0.5× 1.0k 0.8× 103 2.4k
Guoai Xu China 25 890 0.2× 1.2k 0.5× 1.4k 0.6× 317 0.2× 725 0.6× 119 2.4k
Earl T. Barr United Kingdom 23 647 0.2× 763 0.3× 2.5k 1.0× 2.0k 1.1× 985 0.8× 71 3.4k
Christian Collberg United States 25 2.2k 0.5× 619 0.3× 1.8k 0.7× 654 0.3× 1.7k 1.3× 60 3.1k
Zhenmin Li China 24 431 0.1× 1.1k 0.5× 1.1k 0.5× 687 0.4× 637 0.5× 72 2.5k
T.H. Tse Hong Kong 31 354 0.1× 1.2k 0.5× 2.1k 0.9× 2.9k 1.5× 628 0.5× 143 3.9k

Countries citing papers authored by Yajin Zhou

Since Specialization
Citations

This map shows the geographic impact of Yajin Zhou's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Yajin Zhou with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Yajin Zhou more than expected).

Fields of papers citing papers by Yajin Zhou

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Yajin Zhou. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Yajin Zhou. The network helps show where Yajin Zhou may publish in the future.

Co-authorship network of co-authors of Yajin Zhou

This figure shows the co-authorship network connecting the top 25 collaborators of Yajin Zhou. A scholar is included among the top collaborators of Yajin Zhou based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Yajin Zhou. Yajin Zhou is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Wu, Lei, et al.. (2025). Dissecting Payload-based Transaction Phishing on Ethereum. 1 indexed citations
3.
Li, Zihao, et al.. (2025). Recasting Type Hints from WebAssembly Contracts. Proceedings of the ACM on software engineering.. 2(FSE). 2665–2688.
4.
Zhou, Yajin, et al.. (2024). Examiner-Pro: Testing Arm Emulators Across Different Privileges. IEEE Transactions on Software Engineering. 50(11). 2786–2806.
5.
Wu, Lei, et al.. (2024). MFGSCOPE: A Lightweight Framework for Efficient Graph-Based Analysis on Blockchain. IEEE Transactions on Dependable and Secure Computing. 22(2). 1224–1238. 3 indexed citations
6.
Wu, Lei, et al.. (2024). Towards Understanding and Analyzing Instant Cryptocurrency Exchanges. Proceedings of the ACM on Measurement and Analysis of Computing Systems. 8(3). 1–24. 1 indexed citations
7.
Tyson, Gareth, Xiapu Luo, Lei Wu, et al.. (2024). Unveiling the Paradox of NFT Prosperity. Rare & Special e-Zone (The Hong Kong University of Science and Technology). 167–177. 4 indexed citations
8.
Luo, Xiapu, et al.. (2024). Understanding Vulnerability Inducing Commits of the Linux Kernel. ACM Transactions on Software Engineering and Methodology. 33(7). 1–28.
9.
Tyson, Gareth, et al.. (2024). Piecing Together the Jigsaw Puzzle of Transactions on Heterogeneous Blockchain Networks. Proceedings of the ACM on Measurement and Analysis of Computing Systems. 8(3). 1–27. 2 indexed citations
11.
Zhou, Yajin, et al.. (2023). DeFiRanger: Detecting DeFi Price Manipulation Attacks. IEEE Transactions on Dependable and Secure Computing. 21(4). 4147–4161. 9 indexed citations
12.
Chen, Yuan, et al.. (2023). DxPU: Large-scale Disaggregated GPU Pools in the Datacenter. ACM Transactions on Architecture and Code Optimization. 20(4). 1–23.
13.
Qian, Peng, et al.. (2023). Demystifying Random Number in Ethereum Smart Contract: Taxonomy, Vulnerability Identification, and Attack Detection. IEEE Transactions on Software Engineering. 49(7). 3793–3810. 17 indexed citations
14.
Wu, Lei, Yajin Zhou, Zhi Wang, et al.. (2020). EthScope: A Transaction-centric Security Analytics Framework to Detect Malicious Smart Contracts on Ethereum.. arXiv (Cornell University). 6 indexed citations
15.
Cui, Helei, Yajin Zhou, Cong Wang, et al.. (2019). PPSB: An Open and Flexible Platform for Privacy-Preserving Safe Browsing. IEEE Transactions on Dependable and Secure Computing. 18(4). 1762–1778. 8 indexed citations
16.
Xue, Lei, Yajin Zhou, Ting Chen, Xiapu Luo, & Guofei Gu. (2017). Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for {ART}. USENIX Security Symposium. 289–306. 37 indexed citations
17.
Wang, Zhi, et al.. (2015). SecPod: a framework for virtualization-based security systems. USENIX Annual Technical Conference. 347–360. 30 indexed citations
18.
Zhou, Yajin & Xuxian Jiang. (2013). Detecting Passive Content Leaks and Pollution in Android Applications.. Network and Distributed System Security Symposium. 131 indexed citations
19.
Grace, Michael, Yajin Zhou, Zhi Wang, & Xuxian Jiang. (2012). Systematic Detection of Capability Leaks in Stock Android Smartphones.. Network and Distributed System Security Symposium. 287 indexed citations breakdown →
20.
Zhou, Yajin, Zhi Wang, Wu Zhou, & Xuxian Jiang. (2012). Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. Network and Distributed System Security Symposium. 522 indexed citations breakdown →

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026