H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 39 Citations 6,875 194 World Ranking 4841 National Ranking 457

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Computer network
  • The Internet

Xiapu Luo mainly focuses on Computer security, Computer network, Android, Smart contract and Network packet. His study in the field of Access control is also linked to topics like Task analysis. His work on Network security as part of general Computer network research is often related to Metric, thus linking different fields of science.

In his work, Mechanism is strongly intertwined with Virtual machine, which is a subfield of Smart contract. The study incorporates disciplines such as Denial-of-service attack, Internet traffic and Vulnerability in addition to Network packet. His work in Blockchain tackles topics such as Cryptocurrency which are related to areas like Transaction data, Database and Construct.

His most cited work include:

  • A survey on the security of blockchain systems (444 citations)
  • QDASH: a QoE-aware DASH system (287 citations)
  • Information processing method and device (170 citations)

What are the main themes of his work throughout his whole career to date?

His primary scientific interests are in Computer security, Computer network, Android, The Internet and Network packet. Xiapu Luo focuses mostly in the field of Computer security, narrowing it down to matters related to Denial-of-service attack and, in some cases, Flooding. His Computer network research integrates issues from Communication channel and Anonymity.

His Android research incorporates elements of World Wide Web, Privacy policy, Malware and Internet privacy. His studies deal with areas such as Testbed, Distributed computing and Server as well as The Internet. His Network packet research includes elements of Decoding methods, Real-time computing, PlanetLab and Channel capacity.

He most often published in these fields:

  • Computer security (36.02%)
  • Computer network (20.76%)
  • Android (16.95%)

What were the highlights of his more recent work (between 2019-2021)?

  • Computer security (36.02%)
  • Android (16.95%)
  • Smart contract (9.32%)

In recent papers he was focusing on the following fields of study:

Xiapu Luo spends much of his time researching Computer security, Android, Smart contract, Internet privacy and Blockchain. His work focuses on many connections between Computer security and other disciplines, such as Adversarial system, that overlap with his field of interest in Benchmark. He interconnects Obfuscation, World Wide Web, Malware and Data science in the investigation of issues within Android.

His research in Smart contract intersects with topics in Construct, Software engineering, Bytecode and Symbolic execution. His Internet privacy research is multidisciplinary, incorporating perspectives in Android app, Cryptocurrency and Security token. The study incorporates disciplines such as Domain and End-to-end principle in addition to Cryptocurrency.

Between 2019 and 2021, his most popular works were:

  • Interpretable Deep Learning under Fire (27 citations)
  • Understanding Ethereum via Graph Analysis (15 citations)
  • GasChecker: Scalable Analysis for Discovering Gas-Inefficient Smart Contracts (13 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • The Internet
  • Computer network

Xiapu Luo focuses on Computer security, Android, Malware, Artificial intelligence and Blockchain. His work carried out in the field of Computer security brings together such families of science as Android app and Peer-to-peer. His research in Android tackles topics such as Mobile apps which are related to areas like User experience design and Web page.

His work on Mobile malware as part of his general Malware study is frequently connected to Extortion, thereby bridging the divide between different branches of science. Xiapu Luo works mostly in the field of Artificial intelligence, limiting it down to topics relating to Machine learning and, in certain cases, Stack overflow, Software, Software system and Malware analysis, as a part of the same area of interest. His Blockchain study combines topics from a wide range of disciplines, such as Security analysis and Throughput.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

A survey on the security of blockchain systems

Xiaoqi Li;Peng Jiang;Ting Chen;Xiapu Luo.
Future Generation Computer Systems (2017)

742 Citations

QDASH: a QoE-aware DASH system

Ricky K. P. Mok;Xiapu Luo;Edmond W. W. Chan;Rocky K. C. Chang.
Proceedings of the 3rd Multimedia Systems Conference (2012)

437 Citations

Information processing method and device

Xiapu Luo;Jingang Hou;Zhiwei Liu;Xianneng Zou.
(2015)

258 Citations

On a New Class of Pulsing Denial-of-Service Attacks and the Defense.

Xiapu Luo;Rocky K. C. Chang.
network and distributed system security symposium (2005)

224 Citations

Under-optimized smart contracts devour your money

Ting Chen;Xiaoqi Li;Xiapu Luo;Xiaosong Zhang.
ieee international conference on software analysis evolution and reengineering (2017)

188 Citations

Detecting stealthy P2P botnets using statistical traffic fingerprints

Junjie Zhang;Roberto Perdisci;Wenke Lee;Unum Sarfraz.
dependable systems and networks (2011)

163 Citations

Inferring the QoE of HTTP video streaming from user-viewing activities

Ricky K.P. Mok;Edmond W.W. Chan;Xiapu Luo;Rocky K.C. Chang.
acm special interest group on data communication (2011)

160 Citations

HTTPOS: Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows.

Xiapu Luo;Peng Zhou;Edmond W. W. Chan;Wenke Lee.
network and distributed system security symposium (2011)

159 Citations

Flow level detection and filtering of low-rate DDoS

Changwang Zhang;Zhiping Cai;Weifeng Chen;Xiapu Luo.
Computer Networks (2012)

124 Citations

Towards a scalable resource-driven approach for detecting repackaged Android applications

Yuru Shao;Xiapu Luo;Chenxiong Qian;Pengfei Zhu.
annual computer security applications conference (2014)

121 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Xiapu Luo

Zibin Zheng

Zibin Zheng

Sun Yat-sen University

Publications: 27

David Lo

David Lo

Singapore Management University

Publications: 20

Zheng Yan

Zheng Yan

Shanghai Jiao Tong University

Publications: 18

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 18

Jacques Klein

Jacques Klein

University of Luxembourg

Publications: 17

Tegawendé F. Bissyandé

Tegawendé F. Bissyandé

University of Luxembourg

Publications: 16

Xin Xia

Xin Xia

Monash University

Publications: 14

Surya Nepal

Surya Nepal

Commonwealth Scientific and Industrial Research Organisation

Publications: 12

Yang Xiang

Yang Xiang

Swinburne University of Technology

Publications: 11

Roger Zimmermann

Roger Zimmermann

National University of Singapore

Publications: 10

Mauro Conti

Mauro Conti

University of Padua

Publications: 9

Amir Herzberg

Amir Herzberg

University of Connecticut

Publications: 9

Yang Liu

Yang Liu

Nanyang Technological University

Publications: 9

Jin Li

Jin Li

Guangzhou University

Publications: 9

Qinghua Zheng

Qinghua Zheng

Xi'an Jiaotong University

Publications: 8

Something went wrong. Please try again later.