Yousra Aafer

2.9k total citations · 1 hit paper
25 papers, 1.2k citations indexed

About

Yousra Aafer is a scholar working on Signal Processing, Artificial Intelligence and Information Systems. According to data from OpenAlex, Yousra Aafer has authored 25 papers receiving a total of 1.2k indexed citations (citations by other indexed papers that have themselves been cited), including 19 papers in Signal Processing, 14 papers in Artificial Intelligence and 10 papers in Information Systems. Recurrent topics in Yousra Aafer's work include Advanced Malware Detection Techniques (19 papers), Security and Verification in Computing (11 papers) and Software Testing and Debugging Techniques (10 papers). Yousra Aafer is often cited by papers focused on Advanced Malware Detection Techniques (19 papers), Security and Verification in Computing (11 papers) and Software Testing and Debugging Techniques (10 papers). Yousra Aafer collaborates with scholars based in United States, China and Canada. Yousra Aafer's co-authors include Xiangyu Zhang, Wen‐Chuan Lee, Shiqing Ma, Yingqi Liu, Juan Zhai, Weihang Wang, Guanhong Tao, Wenliang Du, Dongyan Xu and Hongjun Choi and has published in prestigious journals such as USENIX Security Symposium, View and Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security.

In The Last Decade

Yousra Aafer

25 papers receiving 1.2k citations

Hit Papers

Trojaning Attack on Neural Networks 2018 2026 2020 2023 2018 200 400 600

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Yousra Aafer United States 14 919 516 263 215 204 25 1.2k
Yingqi Liu United States 16 1.3k 1.5× 463 0.9× 228 0.9× 136 0.6× 348 1.7× 30 1.6k
Sergey Bratus United States 16 444 0.5× 394 0.8× 335 1.3× 294 1.4× 64 0.3× 67 803
Kevin Eykholt United States 6 908 1.0× 316 0.6× 130 0.5× 102 0.5× 215 1.1× 12 1.1k
Derui Wang Australia 8 539 0.6× 323 0.6× 239 0.9× 114 0.5× 145 0.7× 29 770
Brendan Dolan-Gavitt United States 19 1.2k 1.3× 892 1.7× 504 1.9× 769 3.6× 189 0.9× 33 2.1k
Xiaohui Kuang China 18 536 0.6× 206 0.4× 342 1.3× 155 0.7× 137 0.7× 80 897
Zhen Han China 14 383 0.4× 369 0.7× 455 1.7× 366 1.7× 61 0.3× 96 915
Aurélien Francillon France 21 1.1k 1.2× 1.2k 2.4× 637 2.4× 584 2.7× 110 0.5× 55 1.8k
Chengyu Song United States 21 954 1.0× 820 1.6× 429 1.6× 397 1.8× 32 0.2× 56 1.3k
Seung-Hyun Seo South Korea 17 340 0.4× 168 0.3× 436 1.7× 357 1.7× 128 0.6× 53 889

Countries citing papers authored by Yousra Aafer

Since Specialization
Citations

This map shows the geographic impact of Yousra Aafer's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Yousra Aafer with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Yousra Aafer more than expected).

Fields of papers citing papers by Yousra Aafer

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Yousra Aafer. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Yousra Aafer. The network helps show where Yousra Aafer may publish in the future.

Co-authorship network of co-authors of Yousra Aafer

This figure shows the co-authorship network connecting the top 25 collaborators of Yousra Aafer. A scholar is included among the top collaborators of Yousra Aafer based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Yousra Aafer. Yousra Aafer is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
2.
Zhang, Zhuo, et al.. (2022). Poirot. Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. 937–950. 1 indexed citations
4.
Aafer, Yousra, et al.. (2021). Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing. 2759–2776. 10 indexed citations
5.
Aafer, Yousra, et al.. (2021). Dissecting Residual APIs in Custom Android ROMs. 1598–1611. 5 indexed citations
6.
Choi, Hongjun, et al.. (2020). Software-based Realtime Recovery from Sensor Attacks on Robotic Vehicles. 349–364. 13 indexed citations
7.
Zhang, Zhuo, Yonghwi Kwon, Yousra Aafer, et al.. (2020). PMP: Cost-effective Forced Execution with Probabilistic Memory Pre-planning. 1121–1138. 17 indexed citations
8.
Zheng, Yunhui, Hogun Park, Weihang Wang, et al.. (2020). Finding client-side business flow tampering vulnerabilities. 222–233. 10 indexed citations
9.
Liu, Yingqi, Wen‐Chuan Lee, Guanhong Tao, et al.. (2019). ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation. View. 1265–1282. 205 indexed citations
10.
11.
Tang, Zhenhao, Juan Zhai, Minxue Pan, et al.. (2018). Dual-force: understanding WebView malware via cross-language forced execution. View. 714–725. 6 indexed citations
12.
Choi, Hongjun, Wen‐Chuan Lee, Yousra Aafer, et al.. (2018). Detecting Attacks Against Robotic Vehicles. 801–816. 117 indexed citations
13.
Wang, Weihang, et al.. (2018). AdBudgetKiller. 297–307. 4 indexed citations
14.
Liu, Yingqi, Shiqing Ma, Yousra Aafer, et al.. (2018). Trojaning Attack on Neural Networks. View. 611 indexed citations breakdown →
15.
Huang, Jianjun, Yousra Aafer, David Perry, Xiangyu Zhang, & Chen Tian. (2017). UI driven Android application reduction. 286–296. 7 indexed citations
16.
Chen, Haining, Ninghui Li, William Enck, Yousra Aafer, & Xiangyu Zhang. (2017). Analysis of SEAndroid Policies. 553–565. 9 indexed citations
17.
Wang, Weihang, Yonghwi Kwon, Yunhui Zheng, et al.. (2017). PAD: Programming third-party web advertisement censorship. 240–251. 2 indexed citations
18.
Aafer, Yousra, et al.. (2016). Harvesting Inconsistent Security Configurations in Custom Android ROMs via Differential Analysis.. USENIX Security Symposium. 1153–1168. 15 indexed citations
19.
Aafer, Yousra, Nan Zhang, Zhongwen Zhang, et al.. (2015). Hare Hunting in the Wild Android. 1248–1259. 34 indexed citations
20.
Aafer, Yousra, Wenliang Du, & Heng Yin. (2014). DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android. 33 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026