Atsuo Inomata

470 total citations
37 papers, 251 citations indexed

About

Atsuo Inomata is a scholar working on Computer Networks and Communications, Information Systems and Artificial Intelligence. According to data from OpenAlex, Atsuo Inomata has authored 37 papers receiving a total of 251 indexed citations (citations by other indexed papers that have themselves been cited), including 20 papers in Computer Networks and Communications, 16 papers in Information Systems and 15 papers in Artificial Intelligence. Recurrent topics in Atsuo Inomata's work include Cryptography and Data Security (8 papers), Vehicular Ad Hoc Networks (VANETs) (7 papers) and Mobile Ad Hoc Networks (5 papers). Atsuo Inomata is often cited by papers focused on Cryptography and Data Security (8 papers), Vehicular Ad Hoc Networks (VANETs) (7 papers) and Mobile Ad Hoc Networks (5 papers). Atsuo Inomata collaborates with scholars based in Japan, Canada and France. Atsuo Inomata's co-authors include Tetsutaro Uehara, Songpon Teerakanok, Eiji Okamoto, Sk. Md. Mizanur Rahman, Masahiro Mambo, Kazutoshi Fujikawa, Takuma Okamoto, Hideki Sunahara, Takeshi Okamoto and S. Noguchi and has published in prestigious journals such as IEEE Access, IEEE Transactions on Computers and Computers & Electrical Engineering.

In The Last Decade

Atsuo Inomata

35 papers receiving 230 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Atsuo Inomata Japan 8 146 129 94 48 39 37 251
Po-Wen Chi Taiwan 7 178 1.2× 91 0.7× 93 1.0× 59 1.2× 32 0.8× 28 267
Ben Smyth Luxembourg 8 141 1.0× 162 1.3× 179 1.9× 28 0.6× 23 0.6× 23 282
Thyla van der Merwe United Kingdom 5 122 0.8× 98 0.8× 119 1.3× 20 0.4× 21 0.5× 9 188
Mohamed Dâfir Ech-Cherif El Kettani Morocco 8 120 0.8× 106 0.8× 105 1.1× 15 0.3× 27 0.7× 26 225
HariGovind V. Ramasamy United States 9 197 1.3× 136 1.1× 98 1.0× 11 0.2× 25 0.6× 33 264
Changhee Hahn South Korea 11 90 0.6× 177 1.4× 249 2.6× 25 0.5× 30 0.8× 37 323
Carlos Maziero Brazil 9 189 1.3× 86 0.7× 125 1.3× 17 0.4× 69 1.8× 43 264
Mohsen Amini Salehi United States 10 132 0.9× 149 1.2× 71 0.8× 36 0.8× 27 0.7× 25 233
Tom Coffey Ireland 9 248 1.7× 171 1.3× 172 1.8× 25 0.5× 16 0.4× 33 314
Andrea Calvagna Italy 10 124 0.8× 81 0.6× 37 0.4× 74 1.5× 20 0.5× 35 283

Countries citing papers authored by Atsuo Inomata

Since Specialization
Citations

This map shows the geographic impact of Atsuo Inomata's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Atsuo Inomata with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Atsuo Inomata more than expected).

Fields of papers citing papers by Atsuo Inomata

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Atsuo Inomata. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Atsuo Inomata. The network helps show where Atsuo Inomata may publish in the future.

Co-authorship network of co-authors of Atsuo Inomata

This figure shows the co-authorship network connecting the top 25 collaborators of Atsuo Inomata. A scholar is included among the top collaborators of Atsuo Inomata based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Atsuo Inomata. Atsuo Inomata is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Zheng, Junjun, et al.. (2022). Code Aggregate Graph: Effective Representation for Graph Neural Networks to Detect Vulnerable Code. IEEE Access. 10. 123786–123800. 4 indexed citations
2.
Teerakanok, Songpon, Tetsutaro Uehara, & Atsuo Inomata. (2021). Migrating to Zero Trust Architecture: Reviews and Challenges. Security and Communication Networks. 2021. 1–10. 64 indexed citations
3.
Teerakanok, Songpon, et al.. (2021). Enhancing Digital Certificate Usability in Long Lifespan IoT Devices by Utilizing Private CA. Security and Communication Networks. 2021. 1–14. 1 indexed citations
4.
Teerakanok, Songpon, Tetsutaro Uehara, & Atsuo Inomata. (2021). A Secure Cloud-centric IoT Framework for Smart Device Registration. Journal of Information Processing. 29(0). 381–391. 1 indexed citations
5.
Teerakanok, Songpon, et al.. (2021). The Comparison of Word Embedding Techniques in RNNs for Vulnerability Detection. 109–120. 7 indexed citations
6.
Teerakanok, Songpon, et al.. (2021). The Proposal of Double Agent Architecture using Actor-critic Algorithm for Penetration Testing. 440–449. 9 indexed citations
7.
Inomata, Atsuo, et al.. (2020). Evaluation to Classify Ransomware Variants based on Correlations between APIs. 465–472. 5 indexed citations
8.
Ishii, Masahiro, Jérémie Detrey, Pierrick Gaudry, Atsuo Inomata, & Kazutoshi Fujikawa. (2017). Fast Modular Arithmetic on the Kalray MPPA-256 Processor for an Energy-Efficient Implementation of ECM. IEEE Transactions on Computers. 66(12). 2019–2030. 7 indexed citations
9.
Inomata, Atsuo, et al.. (2017). Proposal of hardware device model for IoT endpoint security and its implementation. 91–93. 1 indexed citations
10.
Inomata, Atsuo, et al.. (2014). A Vehicle Clustering Algorithm for Information Propagation by Inter-Vehicle Communications. NAIST Digital Library (Nara Institute of Science and Technology). 114(374). 19–24. 1 indexed citations
11.
Noguchi, S., et al.. (2013). Vehicle clustering algorithm for sharing information on traffic congestion. 9. 38–43. 7 indexed citations
12.
Inomata, Atsuo, et al.. (2013). Location tracking prevention with dummy messages for vehicular communications. 5. 56–61. 2 indexed citations
13.
Inomata, Atsuo, et al.. (2013). A Two-tier Overlay Publish/Subscribe System for Sensor Data Stream Using Geographic Based Load Balancing. e90 b. 749–756. 1 indexed citations
14.
15.
Inomata, Atsuo, et al.. (2011). Communication trials for Self-Mutual Help on the emergency situations in ∊-ARK. 848–849. 1 indexed citations
16.
Inomata, Atsuo, et al.. (2009). Proposal and evaluation of an effective method for underlay-aware overlay networks using LDAP. 70–76. 1 indexed citations
17.
Okamoto, Takeshi, et al.. (2006). Broadcast Encryption with Sender Authentication and its Application. 47(11). 2992–3004. 1 indexed citations
18.
Rahman, Sk. Md. Mizanur, Masahiro Mambo, Atsuo Inomata, & Eiji Okamoto. (2006). An anonymous on-demand position-based routing in mobile ad hoc networks. 2009. 7 pp.–306. 31 indexed citations
19.
Inomata, Atsuo, et al.. (2005). Performance evaluation of efficient algorithms for tate pairing. 3006. 657–660. 1 indexed citations
20.

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026