Changlu Lin

796 total citations
42 papers, 478 citations indexed

About

Changlu Lin is a scholar working on Artificial Intelligence, Information Systems and Computer Networks and Communications. According to data from OpenAlex, Changlu Lin has authored 42 papers receiving a total of 478 indexed citations (citations by other indexed papers that have themselves been cited), including 40 papers in Artificial Intelligence, 17 papers in Information Systems and 9 papers in Computer Networks and Communications. Recurrent topics in Changlu Lin's work include Cryptography and Data Security (31 papers), Cloud Data Security Solutions (12 papers) and Privacy-Preserving Technologies in Data (8 papers). Changlu Lin is often cited by papers focused on Cryptography and Data Security (31 papers), Cloud Data Security Solutions (12 papers) and Privacy-Preserving Technologies in Data (8 papers). Changlu Lin collaborates with scholars based in China, United States and Singapore. Changlu Lin's co-authors include Lein Harn, Yong Xiang, Shuai Ma, Jian Ren, Chin‐Chen Chang, Ying Gao, Lu Lu, Wing W. Y. Ng, Huaxiong Wang and Shaohua Tang and has published in prestigious journals such as IEEE Transactions on Information Theory, IEEE Access and Information Sciences.

In The Last Decade

Changlu Lin

37 papers receiving 449 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Changlu Lin China 10 327 227 215 92 33 42 478
Xiangyu Wang China 11 291 0.9× 83 0.4× 99 0.5× 85 0.9× 20 0.6× 31 387
Dharminder Dharminder India 11 155 0.5× 200 0.9× 197 0.9× 59 0.6× 63 1.9× 29 331
Eugène van Heyst Netherlands 3 601 1.8× 309 1.4× 255 1.2× 52 0.6× 155 4.7× 3 721
Mark Manulis Germany 13 255 0.8× 269 1.2× 151 0.7× 37 0.4× 48 1.5× 53 472
Oded Padon United States 9 217 0.7× 136 0.6× 63 0.3× 80 0.9× 43 1.3× 28 388
Han Qi China 11 195 0.6× 256 1.1× 212 1.0× 52 0.6× 73 2.2× 44 494
Matthew W. Pagano United States 7 509 1.6× 143 0.6× 367 1.7× 39 0.4× 43 1.3× 9 633
Fursan Thabit Yemen 9 160 0.5× 118 0.5× 186 0.9× 121 1.3× 20 0.6× 24 356
Russell Paulet Australia 8 475 1.5× 75 0.3× 139 0.6× 38 0.4× 67 2.0× 15 521
Yitao Chen China 8 252 0.8× 287 1.3× 237 1.1× 83 0.9× 36 1.1× 30 423

Countries citing papers authored by Changlu Lin

Since Specialization
Citations

This map shows the geographic impact of Changlu Lin's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Changlu Lin with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Changlu Lin more than expected).

Fields of papers citing papers by Changlu Lin

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Changlu Lin. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Changlu Lin. The network helps show where Changlu Lin may publish in the future.

Co-authorship network of co-authors of Changlu Lin

This figure shows the co-authorship network connecting the top 25 collaborators of Changlu Lin. A scholar is included among the top collaborators of Changlu Lin based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Changlu Lin. Changlu Lin is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Li, Fulin, et al.. (2024). Standard (k, n)-threshold hierarchical quantum secret sharing. Quantum Information Processing. 23(5). 2 indexed citations
2.
Wang, Feng, et al.. (2024). Revisiting “online/offline provable data possession” schemes. Computer Standards & Interfaces. 91. 103898–103898.
3.
Lin, Changlu, et al.. (2024). A threshold changeable dynamic quantum secret sharing scheme with cheating identification. Quantum Information Processing. 23(10). 2 indexed citations
4.
Shi, Fan, et al.. (2023). The application of demographic characteristics of Ectropis grisescens (Lepidoptera: Geometridae) in pest risk assessment of IPM. Journal of Economic Entomology. 117(1). 230–239. 3 indexed citations
5.
Lin, Changlu, et al.. (2021). Communication Efficient Secret Sharing With Small Share Size. IEEE Transactions on Information Theory. 68(1). 659–669. 9 indexed citations
6.
Li, Yanping, et al.. (2020). A Revocable Certificateless Aggregate Signature Scheme with Enhanced Security. International journal of network security. 22(4). 645–654. 2 indexed citations
7.
Zhang, Liang Feng, et al.. (2020). Efficient Threshold Function Secret Sharing With Information-Theoretic Security. IEEE Access. 8. 6523–6532. 3 indexed citations
8.
Ma, Shuai, et al.. (2019). An Efficient Authentication Scheme for Blockchain-Based Electronic Health Records. IEEE Access. 7. 41678–41689. 103 indexed citations
9.
Lin, Changlu, et al.. (2019). Enhanced secure data backup scheme using multi‐factor authentication. IET Information Security. 13(6). 649–658. 2 indexed citations
10.
Lin, Changlu, et al.. (2018). Design of Secret Reconstruction With Optimal Communication Efficiency. IEEE Communications Letters. 22(8). 1556–1559. 1 indexed citations
11.
Wang, Huaqun, et al.. (2017). Large Branching Tree Based Dynamic Provable Data Possession Scheme.. Journal of information science and engineering. 33. 653–673. 1 indexed citations
12.
Liu, Yining, et al.. (2016). A Robust Electronic Voting Scheme Against Side Channel Attack.. Journal of information science and engineering. 32. 1471–1486. 3 indexed citations
13.
Chang, Chin‐Chen, et al.. (2016). Secure and Efficient Identity-based Proxy Multi-signature Using Cubic Residues. International journal of network security. 18(1). 90–98. 3 indexed citations
14.
Chang, Chin‐Chen, et al.. (2016). Security Analysis on Secure Untraceable Off-line Electronic Cash System.. International journal of network security. 18. 454–458. 2 indexed citations
15.
Lin, Changlu, et al.. (2015). Ciphertext-Auditable Identity-Based Encryption. International journal of network security. 17(1). 23–28. 1 indexed citations
16.
Lin, Changlu, et al.. (2014). Linear complexity of quaternary sequences with odd period and low autocorrelation. The Journal of China Universities of Posts and Telecommunications. 21(5). 89–93. 2 indexed citations
17.
Lin, Changlu, et al.. (2013). Secure universal designated verifier identity‐based signcryption. Security and Communication Networks. 7(2). 434–444. 2 indexed citations
18.
Lin, Changlu & Lein Harn. (2012). Unconditionally secure multi-secret sharing scheme. 29. 169–172. 2 indexed citations
19.
Lin, Changlu, et al.. (2009). Ideal Perfect Multilevel Threshold Secret Sharing Scheme. 118–121. 10 indexed citations
20.
Harn, Lein, Jian Ren, & Changlu Lin. (2009). Efficient identity-based GQ multisignatures. International Journal of Information Security. 8(3). 205–210. 3 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026