D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 51 Citations 10,756 198 World Ranking 3502 National Ranking 1801

Research.com Recognitions

Awards & Achievements

2020 - IEEE Fellow For contributions to network and cloud security

Overview

What is he best known for?

The fields of study he is best known for:

  • The Internet
  • Operating system
  • Computer network

His main research concerns Computer network, World Wide Web, Computer security, The Internet and Flooding. The concepts of his Computer network study are interwoven with issues in Internet Protocol and Denial-of-service attack. His Web page, Internet users and Internet chat study, which is part of a larger body of work in World Wide Web, is frequently linked to Popularity and Measurement study, bridging the gap between disciplines.

His Computer security research is multidisciplinary, relying on both Context and Hop. His work on Voice over IP and Internet traffic as part of his general The Internet study is frequently connected to Entropy, thereby bridging the divide between different branches of science. His research in Flooding intersects with topics in SYN flood and Internet protocol suite.

His most cited work include:

  • Detecting SYN flooding attacks (525 citations)
  • Hop-count filtering: an effective defense against spoofed DDoS traffic (448 citations)
  • Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg? (377 citations)

What are the main themes of his work throughout his whole career to date?

His primary areas of investigation include Computer security, Computer network, The Internet, World Wide Web and Internet privacy. In his research on the topic of Computer security, Host is strongly related with Cloud computing. Haining Wang interconnects Denial-of-service attack and Distributed computing in the investigation of issues within Computer network.

Haining Wang has researched Distributed computing in several fields, including Scalability and Tracing. His study in The Internet is interdisciplinary in nature, drawing from both Multimedia and Server. His work on Web page, Web application and Session as part of general World Wide Web study is frequently linked to Popularity, bridging the gap between disciplines.

He most often published in these fields:

  • Computer security (34.72%)
  • Computer network (23.83%)
  • The Internet (21.24%)

What were the highlights of his more recent work (between 2016-2021)?

  • Computer security (34.72%)
  • World Wide Web (17.62%)
  • Internet privacy (11.92%)

In recent papers he was focusing on the following fields of study:

His scientific interests lie mostly in Computer security, World Wide Web, Internet privacy, The Internet and Information leakage. The various areas that Haining Wang examines in his Computer security study include Android, Data center and Server. World Wide Web is closely attributed to Rule-based system in his study.

His research in the fields of Denial-of-service attack and Internet users overlaps with other disciplines such as IPv4. Haining Wang combines subjects such as Fault tolerance, Computer network, Load balancing and Downtime with his study of Cloud computing. His studies deal with areas such as DNS spoofing, Live migration and Internet protocol suite as well as Computer network.

Between 2016 and 2021, his most popular works were:

  • Acquisitional Rule-based Engine for Discovering Internet-of-Things Devices (45 citations)
  • ContainerLeaks: Emerging Security Threats of Information Leakages in Container Clouds (45 citations)
  • Don't Let One Rotten Apple Spoil the Whole Barrel: Towards Automated Detection of Shadowed Domains (29 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • The Internet
  • Computer network

The scientist’s investigation covers issues in Computer security, Internet privacy, The Internet, Information leakage and Server. Particularly relevant to Authentication is his body of work in Computer security. His work on Cyberspace as part of general The Internet research is frequently linked to IPv4, Measurement study and Residual, thereby connecting diverse disciplines of science.

His Cyberspace research is multidisciplinary, incorporating perspectives in High availability, Real-time computing and Embedded system. His Information leakage research is multidisciplinary, incorporating elements of Traffic analysis, Crowdsourcing, Confidentiality, Encryption and False positive rate. His biological study spans a wide range of topics, including Online advertising, Metadata, Resolution and Vulnerability.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Detecting SYN flooding attacks

Haining Wang;Danlu Zhang;Kang G. Shin.
international conference on computer communications (2002)

999 Citations

Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg?

Zi Chu;S. Gianvecchio;Haining Wang;S. Jajodia.
IEEE Transactions on Dependable and Secure Computing (2012)

755 Citations

Hop-count filtering: an effective defense against spoofed DDoS traffic

Cheng Jin;Haining Wang;Kang G. Shin.
computer and communications security (2003)

738 Citations

Who is tweeting on Twitter: human, bot, or cyborg?

Zi Chu;Steven Gianvecchio;Haining Wang;Sushil Jajodia.
annual computer security applications conference (2010)

674 Citations

Defense against spoofed IP traffic using hop-count filtering

Haining Wang;Cheng Jin;Kang G. Shin.
IEEE ACM Transactions on Networking (2007)

459 Citations

Whispers in the hyper-space: high-bandwidth and reliable covert channel attacks inside the cloud

Zhenyu Wu;Zhang Xu;Haining Wang.
IEEE ACM Transactions on Networking (2015)

384 Citations

Change-point monitoring for the detection of DoS attacks

Haining Wang;Danlu Zhang;K.G. Shin.
IEEE Transactions on Dependable and Secure Computing (2004)

345 Citations

You Are How You Touch: User Verification on Smartphones via Tapping Behaviors

Nan Zheng;Kun Bai;Hai Huang;Haining Wang.
international conference on network protocols (2014)

344 Citations

An efficient user verification system via mouse movements

Nan Zheng;Aaron Paloski;Haining Wang.
computer and communications security (2011)

300 Citations

Detecting covert timing channels: an entropy-based approach

Steven Gianvecchio;Haining Wang.
computer and communications security (2007)

256 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Haining Wang

Alessandra Buonanno

Alessandra Buonanno

Max Planck Institute for Gravitational Physics

Publications: 76

N. A. Robertson

N. A. Robertson

California Institute of Technology

Publications: 71

Nelson Christensen

Nelson Christensen

Observatoire de la Côte d’Azur

Publications: 64

J. A. Giaime

J. A. Giaime

Louisiana State University

Publications: 63

Daniel E. Holz

Daniel E. Holz

University of Chicago

Publications: 62

Harald P. Pfeiffer

Harald P. Pfeiffer

Max Planck Society

Publications: 60

Richard O'Shaughnessy

Richard O'Shaughnessy

Rochester Institute of Technology

Publications: 60

Bangalore Suryanarayana Sathyaprakash

Bangalore Suryanarayana Sathyaprakash

Cardiff University

Publications: 59

Bernard F. Schutz

Bernard F. Schutz

Cardiff University

Publications: 57

Michael E Zucker

Michael E Zucker

California Institute of Technology

Publications: 56

Gijs Nelemans

Gijs Nelemans

Radboud University Nijmegen

Publications: 53

Paul D. Lasky

Paul D. Lasky

Monash University

Publications: 52

D. Sigg

D. Sigg

California Institute of Technology

Publications: 50

Karsten Danzmann

Karsten Danzmann

University of Hannover

Publications: 50

Alberto Vecchio

Alberto Vecchio

University of Birmingham

Publications: 50

E. J. Sanchez

E. J. Sanchez

California Institute of Technology

Publications: 49

Trending Scientists

Catherine L. Kling

Catherine L. Kling

Cornell University

Mario Berta

Mario Berta

Imperial College London

Ru-Qin Yu

Ru-Qin Yu

Hunan University

Mallavarapu Megharaj

Mallavarapu Megharaj

University of Newcastle Australia

Eric J. W. Visser

Eric J. W. Visser

Radboud University Nijmegen

Alexander Pihl

Alexander Pihl

University of Oslo

Adriaan H. Stouthamer

Adriaan H. Stouthamer

Vrije Universiteit Amsterdam

Won-Kyo Jung

Won-Kyo Jung

Pukyong National University

Shaofei Kong

Shaofei Kong

China University of Geosciences

Kuolin Hsu

Kuolin Hsu

University of California, Irvine

James W. Hodge

James W. Hodge

National Institutes of Health

Richard D. Brunning

Richard D. Brunning

University of Minnesota

Kent W. Nilsson

Kent W. Nilsson

Uppsala University

Frank D. Kolodgie

Frank D. Kolodgie

CVPath Institute

Arnulf Stenzl

Arnulf Stenzl

University of Tübingen

Jeffrey M. Pyne

Jeffrey M. Pyne

University of Arkansas for Medical Sciences

Something went wrong. Please try again later.