D-Index & Metrics Best Publications

D-Index & Metrics

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 32 Citations 4,422 192 World Ranking 7269 National Ranking 19

Overview

What is he best known for?

The fields of study he is best known for:

  • Artificial intelligence
  • Statistics
  • Machine learning

His scientific interests lie mostly in Data mining, Intrusion detection system, Artificial intelligence, Network security and Computer security. His Data mining research includes elements of Data modeling, Change detection, Affinity propagation and Cluster analysis. His studies in Artificial intelligence integrate themes in fields like Machine learning and Pattern recognition.

His study in the field of Probabilistic classification also crosses realms of Social discrimination. His Network security study which covers Anomaly detection that intersects with Support vector machine. The concepts of his Computer security study are interwoven with issues in Protocol and False positive rate.

His most cited work include:

  • CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles (194 citations)
  • Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection (187 citations)
  • An up-to-date comparison of state-of-the-art classification algorithms (151 citations)

What are the main themes of his work throughout his whole career to date?

Xiangliang Zhang spends much of his time researching Artificial intelligence, Data mining, Machine learning, Theoretical computer science and Cluster analysis. The study incorporates disciplines such as Graph and Pattern recognition in addition to Artificial intelligence. His Data mining research includes themes of Data modeling, Change detection and Data set.

He interconnects Crowdsourcing and Process in the investigation of issues within Machine learning. His research investigates the connection between Theoretical computer science and topics such as Graph that intersect with problems in Algorithm. His Intrusion detection system study combines topics from a wide range of disciplines, such as Anomaly detection and Network security.

He most often published in these fields:

  • Artificial intelligence (33.60%)
  • Data mining (23.60%)
  • Machine learning (21.60%)

What were the highlights of his more recent work (between 2019-2021)?

  • Artificial intelligence (33.60%)
  • Machine learning (21.60%)
  • Theoretical computer science (12.40%)

In recent papers he was focusing on the following fields of study:

Xiangliang Zhang mainly focuses on Artificial intelligence, Machine learning, Theoretical computer science, Deep learning and Graph. His study in Hypergraph extends to Artificial intelligence with its themes. As part of his studies on Machine learning, Xiangliang Zhang often connects relevant areas like Crowdsourcing.

The Theoretical computer science study combines topics in areas such as Node, Embedding, Representation and Relation. His Deep learning study incorporates themes from Matching, Algorithm, Probabilistic logic and Convolutional neural network. His work carried out in the field of Graph brings together such families of science as Inference, Graph, Node, Convolution and Key.

Between 2019 and 2021, his most popular works were:

  • Privacy Risk Analysis and Mitigation of Analytics Libraries in the Android Ecosystem (42 citations)
  • The soundscape of the Anthropocene ocean. (10 citations)
  • Multi-View Multiple Clusterings using Deep Matrix Factorization (10 citations)

In his most recent research, the most cited papers focused on:

  • Artificial intelligence
  • Statistics
  • Machine learning

Xiangliang Zhang mainly investigates Artificial intelligence, Machine learning, Benchmark, Data science and Natural language processing. Xiangliang Zhang has included themes like Algorithm, Process and Graph in his Artificial intelligence study. His Algorithm research incorporates elements of Estimator, Probabilistic logic and Residual neural network.

He focuses mostly in the field of Graph, narrowing it down to matters related to Pattern recognition and, in some cases, Embedding. His multidisciplinary approach integrates Machine learning and Multi instance multi label in his work. His Benchmark study integrates concerns from other disciplines, such as Redundancy, Human–computer interaction and Reinforcement learning.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles

Lun Li;Jiqiang Liu;Lichen Cheng;Shuo Qiu.
IEEE Transactions on Intelligent Transportation Systems (2018)

300 Citations

Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection

Wei Wang;Xing Wang;Dawei Feng;Jiqiang Liu.
IEEE Transactions on Information Forensics and Security (2014)

278 Citations

An up-to-date comparison of state-of-the-art classification algorithms

Chongsheng Zhang;Changchang Liu;Xiangliang Zhang;George Almpanidis.
Expert Systems With Applications (2017)

237 Citations

Decision Theory for Discrimination-Aware Classification

Faisal Kamiran;Asim Karim;Xiangliang Zhang.
international conference on data mining (2012)

186 Citations

Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers

Wei Wang;Yuanyuan Li;Xing Wang;Jiqiang Liu.
Future Generation Computer Systems (2018)

178 Citations

Processing of massive audit data streams for real-time anomaly intrusion detection

Wei Wang;Xiaohong Guan;Xiangliang Zhang.
Computer Communications (2008)

122 Citations

Autonomic intrusion detection

Wei Wang;Thomas Guyet;René Quiniou;Marie-Odile Cordier.
Knowledge Based Systems (2014)

112 Citations

Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data

Wei Wang;Xiaohong Guan;Xiangliang Zhang;Liwei Yang.
Computers & Security (2006)

111 Citations

Data Streaming with Affinity Propagation

Xiangliang Zhang;Cyril Furtlehner;Michèle Sebag.
european conference on machine learning (2008)

109 Citations

Attribute Normalization in Network Intrusion Detection

Wei Wang;Xiangliang Zhang;Sylvain Gombault;Svein J. Knapskog.
international symposium on pervasive systems, algorithms, and networks (2009)

105 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Xiangliang Zhang

Wei Wang

Wei Wang

Beijing Jiaotong University

Publications: 38

Hongzhi Yin

Hongzhi Yin

University of Queensland

Publications: 17

Philip S. Yu

Philip S. Yu

University of Illinois at Chicago

Publications: 13

Xiangnan He

Xiangnan He

University of Science and Technology of China

Publications: 10

Chris Ding

Chris Ding

Chinese University of Hong Kong, Shenzhen

Publications: 9

Xiangjian He

Xiangjian He

University of Technology Sydney

Publications: 8

Zheng Yan

Zheng Yan

Shanghai Jiao Tong University

Publications: 8

Zi Huang

Zi Huang

University of Queensland

Publications: 8

Xiaohong Guan

Xiaohong Guan

Xi'an Jiaotong University

Publications: 8

Kai Zheng

Kai Zheng

University of Electronic Science and Technology of China

Publications: 7

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 7

Hui Xiong

Hui Xiong

Rutgers, The State University of New Jersey

Publications: 7

Peter Richtárik

Peter Richtárik

King Abdullah University of Science and Technology

Publications: 7

Gianluca Stringhini

Gianluca Stringhini

Boston University

Publications: 7

Witold Pedrycz

Witold Pedrycz

University of Alberta

Publications: 7

Salil S. Kanhere

Salil S. Kanhere

UNSW Sydney

Publications: 7

Something went wrong. Please try again later.