Yao Cheng

637 total citations
34 papers, 305 citations indexed

About

Yao Cheng is a scholar working on Artificial Intelligence, Signal Processing and Information Systems. According to data from OpenAlex, Yao Cheng has authored 34 papers receiving a total of 305 indexed citations (citations by other indexed papers that have themselves been cited), including 16 papers in Artificial Intelligence, 14 papers in Signal Processing and 11 papers in Information Systems. Recurrent topics in Yao Cheng's work include Advanced Malware Detection Techniques (13 papers), User Authentication and Security Systems (7 papers) and Adversarial Robustness in Machine Learning (6 papers). Yao Cheng is often cited by papers focused on Advanced Malware Detection Techniques (13 papers), User Authentication and Security Systems (7 papers) and Adversarial Robustness in Machine Learning (6 papers). Yao Cheng collaborates with scholars based in China, Singapore and United States. Yao Cheng's co-authors include Daojing He, Sammy Chan, Nadra Guizani, Vrizlynn L. L. Thing, Li Zhang, Yuxing Zhang, Haibin Zheng, Binbin Chen, Jinyin Chen and Yingjiu Li and has published in prestigious journals such as Construction and Building Materials, IEEE Transactions on Industry Applications and Cement and Concrete Composites.

In The Last Decade

Yao Cheng

30 papers receiving 299 citations

Peers

Yao Cheng
Anatoliy Gorbenko United Kingdom
Naghmeh Ivaki Portugal
Khalid Aloufi Saudi Arabia
Giuseppe Petracca United States
Guozi Sun China
Yao Cheng
Citations per year, relative to Yao Cheng Yao Cheng (= 1×) peers Wissam Mallouli

Countries citing papers authored by Yao Cheng

Since Specialization
Citations

This map shows the geographic impact of Yao Cheng's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Yao Cheng with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Yao Cheng more than expected).

Fields of papers citing papers by Yao Cheng

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Yao Cheng. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Yao Cheng. The network helps show where Yao Cheng may publish in the future.

Co-authorship network of co-authors of Yao Cheng

This figure shows the co-authorship network connecting the top 25 collaborators of Yao Cheng. A scholar is included among the top collaborators of Yao Cheng based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Yao Cheng. Yao Cheng is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
2.
Bian, Siyuan, et al.. (2024). Study on the mechanism of biomass ash in carbonation of magnesium slag and its main mineral phases. Construction and Building Materials. 450. 138589–138589. 8 indexed citations
3.
Zheng, Haibin, Jinyin Chen, Tao Liu, et al.. (2024). DP-Poison: Poisoning Federated Learning under the Cover of Differential Privacy. ACM Transactions on Privacy and Security. 28(1). 1–28. 2 indexed citations
4.
Chen, Jinyin, Haibin Zheng, Tao Liu, et al.. (2024). EdgePro: Edge Deep Learning Model Protection via Neuron Authorization. IEEE Transactions on Dependable and Secure Computing. 21(5). 4967–4981.
5.
Li, Bin, et al.. (2024). Transient Fault Current Calculation Method for the PV Grid-Connected System Considering Dynamic Response of PLL. IEEE Transactions on Industry Applications. 60(5). 7537–7547. 3 indexed citations
6.
Chen, Jinyin, et al.. (2024). A Miss Is as Good as A Mile: Metamorphic Testing for Deep Learning Operators. Proceedings of the ACM on software engineering.. 1(FSE). 2005–2027. 3 indexed citations
7.
Chen, Jinyin, Ming-Jun Li, Yao Cheng, & Haibin Zheng. (2023). FedRight: An effective model copyright protection for federated learning. Computers & Security. 135. 103504–103504. 14 indexed citations
8.
9.
Chen, Ruoxi, Haibin Zheng, Jinyin Chen, et al.. (2023). Excitement surfeited turns to errors: Deep learning testing framework based on excitable neurons. Information Sciences. 637. 118936–118936. 5 indexed citations
10.
Zhao, Lei & Yao Cheng. (2022). EICO: Improving Few-Shot Text Classification via Explicit and Implicit Consistency Regularization. Findings of the Association for Computational Linguistics: ACL 2022. 3582–3587. 2 indexed citations
11.
Cheng, Yao, Chang Xu, Daisuke Mashima, et al.. (2020). PowerNet: a smart energy forecasting architecture based on neural networks. 2(4). 199–207. 8 indexed citations
12.
He, Daojing, et al.. (2020). Group-based Password Characteristics Analysis. IEEE Network. 35(1). 311–317. 2 indexed citations
13.
He, Daojing, et al.. (2020). Smart Contract Vulnerability Analysis and Security Audit. IEEE Network. 34(5). 276–282. 70 indexed citations
14.
Thing, Vrizlynn L. L., et al.. (2018). A survey of Android exploits in the wild. Computers & Security. 76. 71–91. 24 indexed citations
15.
Mashima, Daisuke, et al.. (2018). Towards quantitative evaluation of privacy protection schemes for electricity usage data sharing. ICT Express. 4(1). 35–41. 16 indexed citations
16.
Zhang, Li, Vrizlynn L. L. Thing, & Yao Cheng. (2018). A scalable and extensible framework for android malware detection and family attribution. Computers & Security. 80. 120–133. 38 indexed citations
17.
Wu, Yongdong, Binbin Chen, Zhao Zhi-gang, & Yao Cheng. (2017). Attack and Countermeasure on Interlock-Based Device Pairing Schemes. IEEE Transactions on Information Forensics and Security. 13(3). 745–757. 6 indexed citations
18.
Cheng, Yao, et al.. (2016). Attacks and Defence on Android Free Floating Windows. 759–770. 10 indexed citations
19.
Cheng, Yao, et al.. (2016). A study on a feasible no-root approach on Android. Journal of Computer Security. 25(3). 231–253. 1 indexed citations
20.
Cheng, Yao. (2009). Forecasts and Verification of the Basic Electric Load of City Based on BP Neural Network. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026