Yunhe Cui

739 total citations
40 papers, 523 citations indexed

About

Yunhe Cui is a scholar working on Computer Networks and Communications, Artificial Intelligence and Computer Vision and Pattern Recognition. According to data from OpenAlex, Yunhe Cui has authored 40 papers receiving a total of 523 indexed citations (citations by other indexed papers that have themselves been cited), including 25 papers in Computer Networks and Communications, 15 papers in Artificial Intelligence and 9 papers in Computer Vision and Pattern Recognition. Recurrent topics in Yunhe Cui's work include Network Security and Intrusion Detection (20 papers), Software-Defined Networks and 5G (16 papers) and Internet Traffic Analysis and Secure E-voting (9 papers). Yunhe Cui is often cited by papers focused on Network Security and Intrusion Detection (20 papers), Software-Defined Networks and 5G (16 papers) and Internet Traffic Analysis and Secure E-voting (9 papers). Yunhe Cui collaborates with scholars based in China and United Kingdom. Yunhe Cui's co-authors include Guowei Shen, Huanlai Xing, Lianshan Yan, Chun Guo, Wei Pan, Xiaoyang Zheng, Jian Zhu, Hongbin Zhang, Xiaoqin Zhao and Dai‐Wei Liao and has published in prestigious journals such as PLoS ONE, Chemical Communications and IEEE Internet of Things Journal.

In The Last Decade

Yunhe Cui

34 papers receiving 492 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Yunhe Cui China 11 347 221 184 98 56 40 523
Chengwei Wang China 8 249 0.7× 137 0.6× 39 0.2× 167 1.7× 29 0.5× 15 344
Fuxiang Gao China 9 261 0.8× 83 0.4× 54 0.3× 39 0.4× 20 0.4× 68 379
Yanbin Lu United States 7 235 0.7× 246 1.1× 60 0.3× 69 0.7× 26 0.5× 10 368
Chuang Wang China 8 86 0.2× 70 0.3× 255 1.4× 142 1.4× 4 0.1× 20 381
Jiongyi Chen China 8 164 0.5× 146 0.7× 274 1.5× 163 1.7× 14 0.3× 21 407
Venkata Krishnan United States 13 591 1.7× 56 0.3× 13 0.1× 66 0.7× 17 0.3× 31 820
Xiaoyan Hu China 11 301 0.9× 156 0.7× 68 0.4× 60 0.6× 1 0.0× 81 404
Seong-je Cho South Korea 15 305 0.9× 129 0.6× 353 1.9× 272 2.8× 96 704

Countries citing papers authored by Yunhe Cui

Since Specialization
Citations

This map shows the geographic impact of Yunhe Cui's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Yunhe Cui with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Yunhe Cui more than expected).

Fields of papers citing papers by Yunhe Cui

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Yunhe Cui. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Yunhe Cui. The network helps show where Yunhe Cui may publish in the future.

Co-authorship network of co-authors of Yunhe Cui

This figure shows the co-authorship network connecting the top 25 collaborators of Yunhe Cui. A scholar is included among the top collaborators of Yunhe Cui based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Yunhe Cui. Yunhe Cui is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Xing, Huanlai, Xiangyi Chen, Yunhe Cui, et al.. (2025). Security Enhanced Computation Offloading for Collaborative Inference at Semantic-Communication-Empowered Edge. IEEE Transactions on Mobile Computing. 24(9). 8071–8088. 2 indexed citations
2.
Ji, Zhigang, et al.. (2025). Towards saturation attack detection in SDN: a multi-edge representation learning-based method. Journal of King Saud University - Computer and Information Sciences. 37(6).
3.
Chen, Yi, Hongxia Wang, Yunhe Cui, et al.. (2025). A multi-level additive distortion method for security improvement in palette image steganography. Journal of Visual Communication and Image Representation. 110. 104463–104463.
4.
Guo, Chun, et al.. (2024). SNDMI: Spyware network traffic detection method based on inducement operations. Computers & Security. 140. 103806–103806. 3 indexed citations
5.
Cui, Yunhe, et al.. (2024). TITAN: Combining a bidirectional forwarding graph and GCN to detect saturation attack targeted at SDN. PLoS ONE. 19(4). e0299846–e0299846. 2 indexed citations
6.
Chen, Yi, et al.. (2024). Robust Image Watermarking Based on Hybrid Transform and Position-Adaptive Selection. Circuits Systems and Signal Processing. 44(4). 2802–2829. 3 indexed citations
8.
Shen, Guowei, et al.. (2023). BFLS: Blockchain and Federated Learning for sharing threat detection models as Cyber Threat Intelligence. Computer Networks. 224. 109604–109604. 33 indexed citations
9.
Guo, Chun, et al.. (2023). Remote access trojan traffic early detection method based on Markov matrices and deep learning. Computers & Security. 137. 103628–103628. 1 indexed citations
11.
Guo, Chun, et al.. (2023). MCTVD: A malware classification method based on three-channel visualization and deep learning. Computers & Security. 126. 103084–103084. 21 indexed citations
12.
Cui, Yunhe, et al.. (2022). KIND: A Novel Image-Mutual-Information-Based Decision Fusion Method for Saturation Attack Detection in SD-IoT. IEEE Internet of Things Journal. 9(23). 23750–23771. 4 indexed citations
13.
Shen, Guowei, et al.. (2022). SAD: Website Fingerprinting Defense Based on Adversarial Examples. Security and Communication Networks. 2022. 1–12. 3 indexed citations
14.
Yin, Wencheng, et al.. (2021). DIAMOND: A Structured Coevolution Feature Optimization Method for LDDoS Detection in SDN‐IoT. Wireless Communications and Mobile Computing. 2021(1). 4 indexed citations
15.
Guo, Chun, et al.. (2021). 2-SPIFF: a 2-stage packer identification method based on function call graph and file attributes. Applied Intelligence. 51(12). 9038–9053. 4 indexed citations
16.
Guo, Chun, et al.. (2021). Image-based malware classification using section distribution information. Computers & Security. 110. 102420–102420. 33 indexed citations
17.
Shen, Guowei, et al.. (2021). EX-Action: Automatically Extracting Threat Actions from Cyber Threat Intelligence Report Based on Multimodal Learning. Security and Communication Networks. 2021. 1–12. 19 indexed citations
18.
Cui, Yunhe, Chun Guo, Guowei Shen, et al.. (2021). Towards DDoS detection mechanisms in Software-Defined Networking. Journal of Network and Computer Applications. 190. 103156–103156. 60 indexed citations
19.
Cui, Yunhe, et al.. (2020). REPAIR: fragile watermarking for encrypted speech authentication with recovery ability. Telecommunication Systems. 75(3). 273–289. 7 indexed citations
20.

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026