Yuhong Nan

666 total citations
28 papers, 368 citations indexed

About

Yuhong Nan is a scholar working on Information Systems, Signal Processing and Artificial Intelligence. According to data from OpenAlex, Yuhong Nan has authored 28 papers receiving a total of 368 indexed citations (citations by other indexed papers that have themselves been cited), including 20 papers in Information Systems, 17 papers in Signal Processing and 11 papers in Artificial Intelligence. Recurrent topics in Yuhong Nan's work include Advanced Malware Detection Techniques (17 papers), Blockchain Technology Applications and Security (9 papers) and Digital and Cyber Forensics (6 papers). Yuhong Nan is often cited by papers focused on Advanced Malware Detection Techniques (17 papers), Blockchain Technology Applications and Security (9 papers) and Digital and Cyber Forensics (6 papers). Yuhong Nan collaborates with scholars based in China, United States and Hong Kong. Yuhong Nan's co-authors include Min Yang, Zhemin Yang, Yuan Zhang, Zibin Zheng, Guofei Gu, Shunfan Zhou, XiaoFeng Wang, Xiao Chen, Zhiyun Qian and Haixin Duan and has published in prestigious journals such as IEEE Transactions on Software Engineering, IEEE Internet of Things Journal and IEEE Transactions on Information Forensics and Security.

In The Last Decade

Yuhong Nan

23 papers receiving 354 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Yuhong Nan China 9 245 233 133 114 41 28 368
Kan Yuan United States 10 327 1.3× 277 1.2× 188 1.4× 188 1.6× 54 1.3× 14 463
Lei Cen United States 7 165 0.7× 161 0.7× 135 1.0× 74 0.6× 41 1.0× 16 299
Sumayah Alrwais United States 11 286 1.2× 188 0.8× 249 1.9× 195 1.7× 41 1.0× 17 412
Jin-Hee Cho United States 5 216 0.9× 112 0.5× 154 1.2× 81 0.7× 30 0.7× 6 313
Joachim Posegga Germany 8 179 0.7× 91 0.4× 88 0.7× 306 2.7× 20 0.5× 38 419
Kaan Onarlıoğlu United States 11 235 1.0× 280 1.2× 310 2.3× 364 3.2× 19 0.5× 19 533
Komminist Weldemariam Italy 11 197 0.8× 86 0.4× 116 0.9× 151 1.3× 37 0.9× 35 312
Van Nguyen Australia 10 239 1.0× 115 0.5× 75 0.6× 106 0.9× 15 0.4× 27 358
Sergej Dechand Germany 7 279 1.1× 196 0.8× 91 0.7× 120 1.1× 68 1.7× 8 376
Henning Perl Germany 8 296 1.2× 224 1.0× 101 0.8× 171 1.5× 59 1.4× 10 433

Countries citing papers authored by Yuhong Nan

Since Specialization
Citations

This map shows the geographic impact of Yuhong Nan's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Yuhong Nan with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Yuhong Nan more than expected).

Fields of papers citing papers by Yuhong Nan

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Yuhong Nan. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Yuhong Nan. The network helps show where Yuhong Nan may publish in the future.

Co-authorship network of co-authors of Yuhong Nan

This figure shows the co-authorship network connecting the top 25 collaborators of Yuhong Nan. A scholar is included among the top collaborators of Yuhong Nan based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Yuhong Nan. Yuhong Nan is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Nan, Yuhong, et al.. (2025). Augmenting Smart Contract Decompiler Output Through Fine-Grained Dependency Analysis and LLM-Facilitated Semantic Recovery. IEEE Transactions on Software Engineering. 51(12). 3574–3590. 1 indexed citations
2.
Nan, Yuhong, et al.. (2025). Satellite: Detecting and Analyzing Smart Contract Vulnerabilities Caused by Subcontract Misuse. IEEE Transactions on Software Engineering. 51(12). 3360–3375.
3.
Nan, Yuhong, et al.. (2024). Understanding Privacy Risks of Intelligent Connected Vehicles Through Their Companion Mobile Apps. IEEE Internet of Things Journal. 11(20). 33683–33695.
6.
Yang, Changlin, et al.. (2024). An Empirical Study of High-Risk Vulnerabilities in IoT Systems. IEEE Internet of Things Journal. 12(2). 1590–1601. 1 indexed citations
7.
Nan, Yuhong, et al.. (2024). SmartAxe: Detecting Cross-Chain Vulnerabilities in Bridge Smart Contracts via Fine-Grained Static Analysis. Proceedings of the ACM on software engineering.. 1(FSE). 249–270. 8 indexed citations
8.
Nan, Yuhong, et al.. (2024). FunFuzz: A Function-Oriented Fuzzer for Smart Contract Vulnerability Detection with High Effectiveness and Efficiency. ACM Transactions on Software Engineering and Methodology. 33(7). 1–20. 5 indexed citations
9.
Nan, Yuhong, et al.. (2023). Detecting State Inconsistency Bugs in DApps via On-Chain Transaction Replay and Fuzzing. 298–309. 13 indexed citations
10.
Nan, Yuhong, et al.. (2023). DARPA: Combating Asymmetric Dark UI Patterns on Android with Run-time View Decorator. 480–493. 1 indexed citations
12.
Chen, Zeyuan, et al.. (2022). SIMulation: Demystifying (Insecure) Cellular Network based One-Tap Authentication Services. 534–546. 3 indexed citations
13.
Nan, Yuhong, et al.. (2022). Security Evaluation of Smart Contracts based on Code and Transaction - A Survey. 41–48. 1 indexed citations
14.
Nan, Yuhong, Shiqing Ma, Le Yu, et al.. (2021). {ATLAS}: A Sequence-based Learning Approach for Attack Investigation. USENIX Security Symposium. 3005–3022. 39 indexed citations
15.
Xiao, Yue, Xueqiang Wang, Yuhong Nan, et al.. (2021). Understanding Malicious Cross-library Data Harvesting on Android. 4133–4150. 6 indexed citations
17.
Nan, Yuhong, et al.. (2020). BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy.. 14 indexed citations
18.
Nan, Yuhong, et al.. (2020). BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy Networks. 397–411. 6 indexed citations
19.
Nan, Yuhong, Zhemin Yang, Min Yang, et al.. (2016). Identifying User-Input Privacy in Mobile Applications at a Large Scale. IEEE Transactions on Information Forensics and Security. 12(3). 647–661. 15 indexed citations
20.
Nan, Yuhong, Min Yang, Zhemin Yang, et al.. (2015). UIPicker: user-input privacy identification in mobile applications. USENIX Security Symposium. 993–1008. 66 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026