China Information Technology Security Evaluation Center

380 papers and 3.1k indexed citations i.

About

In recent decades, authors affiliated with China Information Technology Security Evaluation Center have published 380 papers, which have received a total of 3.1k indexed citations. Scholars at this organization have produced 164 papers in Artificial Intelligence, 109 papers in Information Systems and 107 papers in Computer Networks and Communications on the topics of Advanced Malware Detection Techniques (62 papers), Network Security and Intrusion Detection (57 papers) and Wireless Signal Modulation Classification (27 papers). Their work is cited by papers focused on Artificial Intelligence (1.2k citations), Computer Networks and Communications (981 citations) and Information Systems (803 citations). Authors at China Information Technology Security Evaluation Center collaborate with scholars in China, United States and United Kingdom and have published in prestigious journals including PLoS ONE, Advanced Functional Materials and IEEE Transactions on Geoscience and Remote Sensing. Some of China Information Technology Security Evaluation Center's most productive authors include Xiaoniu Yang, Shilian Zheng, Xiong Luo and Weiping Wang.

In The Last Decade

Fields of papers published by authors at China Information Technology Security Evaluation Center

Since Specialization
EngineeringComputer SciencePhysics and AstronomyMathematicsEarth and Planetary SciencesEnergyEnvironmental ScienceMaterials ScienceChemical EngineeringChemistryAgricultural and Biological SciencesVeterinaryDecision SciencesArts and HumanitiesBusiness, Management and AccountingSocial SciencesPsychologyEconomics, Econometrics and FinanceHealth ProfessionsDentistryMedicineBiochemistry, Genetics and Molecular BiologyNeuroscienceNursingImmunology and MicrobiologyPharmacology, Toxicology and Pharmaceutics

This network shows the specialization of papers affiliated with China Information Technology Security Evaluation Center at the time of their publication. Nodes represent fields, and links connect fields that are likely to share authors.

Countries citing scholars working at China Information Technology Security Evaluation Center

Since Specialization
Citations

This map shows the geographic impact of research produced by authors working at China Information Technology Security Evaluation Center. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by papers produced at China Information Technology Security Evaluation Center with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites China Information Technology Security Evaluation Center more than expected).

Rankless by CCL
2025