Changhai Ou

669 total citations
22 papers, 530 citations indexed

About

Changhai Ou is a scholar working on Artificial Intelligence, Signal Processing and Hardware and Architecture. According to data from OpenAlex, Changhai Ou has authored 22 papers receiving a total of 530 indexed citations (citations by other indexed papers that have themselves been cited), including 15 papers in Artificial Intelligence, 8 papers in Signal Processing and 8 papers in Hardware and Architecture. Recurrent topics in Changhai Ou's work include Cryptographic Implementations and Security (13 papers), Physical Unclonable Functions (PUFs) and Hardware Security (8 papers) and Advanced Malware Detection Techniques (8 papers). Changhai Ou is often cited by papers focused on Cryptographic Implementations and Security (13 papers), Physical Unclonable Functions (PUFs) and Hardware Security (8 papers) and Advanced Malware Detection Techniques (8 papers). Changhai Ou collaborates with scholars based in China, Singapore and United States. Changhai Ou's co-authors include Chia-Hsin Cheng, Kwok‐wing Chau, Aidong Men, Fang Zhao, Qu Wang, Haiyong Luo, Siew-Kei Lam, Hao Xiong, Ming Xia and Guiyuan Jiang and has published in prestigious journals such as Journal of Hydrology, IEEE Access and Information Sciences.

In The Last Decade

Changhai Ou

21 papers receiving 509 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Changhai Ou China 8 179 157 129 128 96 22 530
Feng Yu China 13 83 0.5× 67 0.4× 220 1.7× 74 0.6× 68 0.7× 44 889
Feng Xiong China 17 207 1.2× 302 1.9× 43 0.3× 247 1.9× 104 1.1× 44 810
Ramli Adnan Malaysia 15 129 0.7× 146 0.9× 235 1.8× 180 1.4× 29 0.3× 138 840
Fangling Pu China 18 98 0.5× 81 0.5× 198 1.5× 68 0.5× 100 1.0× 58 1.1k
Maziar Palhang Iran 10 118 0.7× 61 0.4× 147 1.1× 66 0.5× 24 0.3× 40 482
Shafiqul Islam United States 15 96 0.5× 26 0.2× 159 1.2× 144 1.1× 131 1.4× 58 752
Yaochi Zhao China 14 279 1.6× 40 0.3× 129 1.0× 42 0.3× 45 0.5× 35 656
Qiang Huang China 12 197 1.1× 178 1.1× 117 0.9× 100 0.8× 214 2.2× 33 647
Do Guen Yoo South Korea 18 147 0.8× 111 0.7× 215 1.7× 103 0.8× 185 1.9× 88 907

Countries citing papers authored by Changhai Ou

Since Specialization
Citations

This map shows the geographic impact of Changhai Ou's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Changhai Ou with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Changhai Ou more than expected).

Fields of papers citing papers by Changhai Ou

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Changhai Ou. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Changhai Ou. The network helps show where Changhai Ou may publish in the future.

Co-authorship network of co-authors of Changhai Ou

This figure shows the co-authorship network connecting the top 25 collaborators of Changhai Ou. A scholar is included among the top collaborators of Changhai Ou based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Changhai Ou. Changhai Ou is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
2.
Qiao, Kexin, Zhao‐Yang Wang, Heng Chang, et al.. (2024). A closer look at the belief propagation algorithm in side-channel attack on CCA-secure PQC KEM. Science China Information Sciences. 67(11). 1 indexed citations
3.
Zheng, Shihui, et al.. (2022). Breaking Fault Attack Countermeasures With Side-Channel Information. IEEE Transactions on Computers. 72(5). 1396–1408. 1 indexed citations
4.
Jiang, Guiyuan, et al.. (2021). Passenger-centric vehicle routing for first-mile transportation considering request uncertainty. Information Sciences. 570. 241–261. 14 indexed citations
5.
Zheng, Shihui, et al.. (2021). A Persistent Fault-Based Collision Analysis Against the Advanced Encryption Standard. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 40(6). 1117–1129. 7 indexed citations
6.
Jiang, Guiyuan, Siew-Kei Lam, Peilan He, Changhai Ou, & Dihao Ai. (2020). A Multi-Scale Attributes Attention Model for Transport Mode Identification. IEEE Transactions on Intelligent Transportation Systems. 23(1). 152–164. 17 indexed citations
7.
Ou, Changhai, et al.. (2020). A Lightweight Detection Algorithm For Collision-Optimized Divide-and-Conquer Attacks. IEEE Transactions on Computers. 69(11). 1694–1706. 2 indexed citations
8.
Ou, Changhai, et al.. (2020). Multiple-Differential Mechanism for Collision-Optimized Divide-and-Conquer Attacks. IEEE Transactions on Information Forensics and Security. 16. 418–430. 2 indexed citations
9.
Ou, Changhai, Siew-Kei Lam, & Guiyuan Jiang. (2020). The Science of Guessing in Collision-Optimized Divide-and-Conquer Attacks. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 40(6). 1039–1051. 3 indexed citations
10.
Ou, Changhai, et al.. (2020). Information Entropy-Based Leakage Profiling. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 40(6). 1052–1062. 1 indexed citations
11.
Wang, Qu, Haiyong Luo, Aidong Men, et al.. (2020). Personalized Stride-Length Estimation Based on Active Online Learning. IEEE Internet of Things Journal. 7(6). 4885–4897. 35 indexed citations
12.
Wang, Qu, Haiyong Luo, Hao Xiong, et al.. (2020). Pedestrian Dead Reckoning Based on Walking Pattern Recognition and Online Magnetic Fingerprint Trajectory Calibration. IEEE Internet of Things Journal. 8(3). 2011–2026. 68 indexed citations
13.
Jiang, Guiyuan, et al.. (2019). Framework for Fast Memory Authentication Using Dynamically Skewed Integrity Tree. IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 27(10). 2331–2343. 7 indexed citations
14.
Ou, Changhai, et al.. (2019). A First Study of Compressive Sensing for Side-Channel Leakage Sampling. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 39(10). 2166–2177. 1 indexed citations
15.
Wang, Qu, Haiyong Luo, Aidong Men, et al.. (2019). Pedestrian Heading Estimation Based on Spatial Transformer Networks and Hierarchical LSTM. IEEE Access. 7. 162309–162322. 34 indexed citations
16.
Ou, Changhai, et al.. (2018). Group collision attack. IEEE Transactions on Information Forensics and Security. 14(4). 939–953. 5 indexed citations
17.
Zhou, Xinping, et al.. (2016). Double-Key Recovery Based Correlation Power Analysis. 1016–1022. 1 indexed citations
18.
19.
Zhou, Xinping, et al.. (2016). Improved wavelet transform for noise reduction in power analysis attacks. 602–606. 11 indexed citations
20.
Cheng, Chia-Hsin, Changhai Ou, & Kwok‐wing Chau. (2002). Combining a fuzzy optimal model with a genetic algorithm to solve multi-objective rainfall–runoff model calibration. Journal of Hydrology. 268(1-4). 72–86. 279 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026