Zhidong Shen

979 total citations
46 papers, 595 citations indexed

About

Zhidong Shen is a scholar working on Computer Networks and Communications, Artificial Intelligence and Information Systems. According to data from OpenAlex, Zhidong Shen has authored 46 papers receiving a total of 595 indexed citations (citations by other indexed papers that have themselves been cited), including 24 papers in Computer Networks and Communications, 23 papers in Artificial Intelligence and 15 papers in Information Systems. Recurrent topics in Zhidong Shen's work include Distributed systems and fault tolerance (12 papers), Network Security and Intrusion Detection (9 papers) and Mobile Agent-Based Network Management (9 papers). Zhidong Shen is often cited by papers focused on Distributed systems and fault tolerance (12 papers), Network Security and Intrusion Detection (9 papers) and Mobile Agent-Based Network Management (9 papers). Zhidong Shen collaborates with scholars based in China, Singapore and United States. Zhidong Shen's co-authors include Xiaoping Wu, Xiaohui Cui, Hongwei Ding, Fei Yan, Li Li, Si Chen, Huanguo Zhang, Si Chen, Jin Liu and Hui Sun and has published in prestigious journals such as IEEE Transactions on Geoscience and Remote Sensing, IEEE Access and Information Sciences.

In The Last Decade

Zhidong Shen

42 papers receiving 544 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Zhidong Shen China 12 303 240 203 74 70 46 595
Longjun Huang China 13 142 0.5× 116 0.5× 234 1.2× 60 0.8× 46 0.7× 40 481
Alexander Shelupanov Russia 12 173 0.6× 140 0.6× 157 0.8× 77 1.0× 47 0.7× 72 438
Chunhe Xia China 14 245 0.8× 198 0.8× 380 1.9× 164 2.2× 45 0.6× 103 662
Lansheng Han China 11 184 0.6× 92 0.4× 246 1.2× 108 1.5× 86 1.2× 68 479
Diana F. Gordon United States 11 467 1.5× 134 0.6× 109 0.5× 29 0.4× 69 1.0× 29 680
Hsu‐Chun Hsiao Taiwan 14 341 1.1× 244 1.0× 475 2.3× 127 1.7× 45 0.6× 48 714
Sang-Ho Lee South Korea 9 153 0.5× 222 0.9× 145 0.7× 183 2.5× 64 0.9× 40 522
Kenneth J. Turner United Kingdom 14 288 1.0× 263 1.1× 217 1.1× 20 0.3× 101 1.4× 92 709

Countries citing papers authored by Zhidong Shen

Since Specialization
Citations

This map shows the geographic impact of Zhidong Shen's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Zhidong Shen with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Zhidong Shen more than expected).

Fields of papers citing papers by Zhidong Shen

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Zhidong Shen. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Zhidong Shen. The network helps show where Zhidong Shen may publish in the future.

Co-authorship network of co-authors of Zhidong Shen

This figure shows the co-authorship network connecting the top 25 collaborators of Zhidong Shen. A scholar is included among the top collaborators of Zhidong Shen based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Zhidong Shen. Zhidong Shen is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Wang, Yidi, et al.. (2025). Double layer blockchain-assisted trusted data flow model for industrial control systems. Reliability Engineering & System Safety. 260. 111013–111013.
2.
Tao, Qi, et al.. (2025). ELSP-MA: An Efficient Lightweight and Security-Enhanced Privacy-Preserving Message Authentication Scheme for VANETs. IEEE Transactions on Vehicular Technology. 74(10). 16055–16064.
3.
Wang, Ziyue, Tianyu Ma, Liang Dong, et al.. (2025). A Review on Blockchain Applications in Operational Technology for Food and Agriculture Critical Infrastructure. Foods. 14(2). 251–251. 8 indexed citations
4.
Shen, Zhidong, et al.. (2024). Multiloss Adversarial Attacks for Multimodal Remote Sensing Image Classification. IEEE Transactions on Geoscience and Remote Sensing. 62. 1–13. 3 indexed citations
5.
Cui, Xiaohui, et al.. (2024). Meta-IDS: Meta-Learning-Based Smart Intrusion Detection System for Internet of Medical Things (IoMT) Network. IEEE Internet of Things Journal. 11(13). 23080–23095. 27 indexed citations
6.
Dong, Liang, et al.. (2024). FDNet: Imperceptible backdoor attacks via frequency domain steganography and negative sampling. Neurocomputing. 583. 127546–127546. 2 indexed citations
7.
Dong, Liang, et al.. (2024). OCIE: Augmenting model interpretability via Deconfounded Explanation-Guided Learning. Knowledge-Based Systems. 302. 112390–112390. 2 indexed citations
8.
Wang, Zhenyu, et al.. (2024). Food Public Opinion Prevention and Control Model Based on Sentiment Analysis. Foods. 13(22). 3697–3697. 1 indexed citations
9.
Zhang, Haojie & Zhidong Shen. (2023). News Recommendation Based on User Topic and Entity Preferences in Historical Behavior. Information. 14(2). 60–60. 5 indexed citations
10.
Shen, Zhidong, et al.. (2023). RRN: A differential private approach to preserve privacy in image classification. IET Image Processing. 17(7). 2192–2203. 3 indexed citations
11.
Ding, Hongwei, et al.. (2023). TMG-GAN: Generative Adversarial Networks-Based Imbalanced Learning for Network Intrusion Detection. IEEE Transactions on Information Forensics and Security. 19. 1156–1167. 52 indexed citations
12.
Dong, Liang, et al.. (2023). Stealthy dynamic backdoor attack against neural networks for image classification. Applied Soft Computing. 149. 110993–110993. 2 indexed citations
13.
Shen, Zhidong, et al.. (2022). FD2Foremer: Thinking Face Forgery Detection in Midfrequency Geometry Details. Security and Communication Networks. 2022. 1–15. 1 indexed citations
14.
Shen, Zhidong, et al.. (2021). Analysis of Application Examples of Differential Privacy in Deep Learning. Computational Intelligence and Neuroscience. 2021(1). 4244040–4244040. 12 indexed citations
15.
Shen, Zhidong & Si Chen. (2020). A Survey of Automatic Software Vulnerability Detection, Program Repair, and Defect Prediction Techniques. Security and Communication Networks. 2020. 1–16. 35 indexed citations
16.
Shen, Zhidong, et al.. (2020). An Approach Based on Customized Robust Cloaked Region for Geographic Location Information Privacy Protection. Mobile Information Systems. 2020. 1–12. 2 indexed citations
17.
Shen, Zhidong, Yuhao Zhang, & Wei‐Ying Chen. (2019). A Bayesian Classification Intrusion Detection Method Based on the Fusion of PCA and LDA. Security and Communication Networks. 2019. 1–11. 12 indexed citations
18.
Shen, Zhidong & Wei‐Ying Chen. (2019). A Survey of Research on Runtime Rerandomization Under Memory Disclosure. IEEE Access. 7. 105432–105440. 1 indexed citations
19.
Shen, Zhidong, et al.. (2015). A Method for Lightweight Verification on Data Integrity in Mobile Cloud Computing Environment. Journal of Northeastern University. 36(11). 1562. 2 indexed citations
20.
Shen, Zhidong & Xiaoping Wu. (2008). A Trusted Computing Technology Enabled Mobile Agent System. 16. 567–570. 7 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026