Chenhao Lin

1.4k total citations
48 papers, 650 citations indexed

About

Chenhao Lin is a scholar working on Artificial Intelligence, Computer Vision and Pattern Recognition and Signal Processing. According to data from OpenAlex, Chenhao Lin has authored 48 papers receiving a total of 650 indexed citations (citations by other indexed papers that have themselves been cited), including 29 papers in Artificial Intelligence, 14 papers in Computer Vision and Pattern Recognition and 13 papers in Signal Processing. Recurrent topics in Chenhao Lin's work include Adversarial Robustness in Machine Learning (22 papers), Biometric Identification and Security (7 papers) and Face recognition and analysis (6 papers). Chenhao Lin is often cited by papers focused on Adversarial Robustness in Machine Learning (22 papers), Biometric Identification and Security (7 papers) and Face recognition and analysis (6 papers). Chenhao Lin collaborates with scholars based in China, Hong Kong and United States. Chenhao Lin's co-authors include Ajay Kumar, Chao Shen, Pengwei Hu, Jing Mei, Hui Su, Shaochun Li, Siwen Wang, Yu Lu, Henry W. C. Leung and Jie Zhou and has published in prestigious journals such as IEEE Transactions on Pattern Analysis and Machine Intelligence, Applied Energy and IEEE Transactions on Image Processing.

In The Last Decade

Chenhao Lin

36 papers receiving 626 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Chenhao Lin China 11 290 280 216 123 91 48 650
Fabio Narducci Italy 15 432 1.5× 212 0.8× 79 0.4× 158 1.3× 18 0.2× 48 690
Saiyed Umer India 15 480 1.7× 282 1.0× 95 0.4× 134 1.1× 11 0.1× 56 816
Daniel Kang United States 13 347 1.2× 46 0.2× 211 1.0× 56 0.5× 12 0.1× 34 666
Padma Polash Paul Canada 13 339 1.2× 244 0.9× 116 0.5× 207 1.7× 21 0.2× 42 563
Antitza Dantcheva France 17 947 3.3× 460 1.6× 139 0.6× 141 1.1× 14 0.2× 51 1.2k
Saurabh Singh India 9 500 1.7× 165 0.6× 246 1.1× 88 0.7× 9 0.1× 33 740
Gil Levi Israel 5 873 3.0× 226 0.8× 171 0.8× 22 0.2× 29 0.3× 9 1.1k
José Luis Alba‐Castro Spain 16 455 1.6× 257 0.9× 128 0.6× 104 0.8× 38 0.4× 65 754
Ben Zhang China 10 242 0.8× 114 0.4× 81 0.4× 95 0.8× 15 0.2× 27 543
Abdul Serwadda United States 14 179 0.6× 443 1.6× 84 0.4× 516 4.2× 19 0.2× 43 745

Countries citing papers authored by Chenhao Lin

Since Specialization
Citations

This map shows the geographic impact of Chenhao Lin's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Chenhao Lin with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Chenhao Lin more than expected).

Fields of papers citing papers by Chenhao Lin

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Chenhao Lin. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Chenhao Lin. The network helps show where Chenhao Lin may publish in the future.

Co-authorship network of co-authors of Chenhao Lin

This figure shows the co-authorship network connecting the top 25 collaborators of Chenhao Lin. A scholar is included among the top collaborators of Chenhao Lin based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Chenhao Lin. Chenhao Lin is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Lin, Chenhao, et al.. (2025). A Survey of Defenses Against AI-Generated Visual Media: Detection, Disruption, and Authentication. ACM Computing Surveys. 58(5). 1–35.
2.
Tang, Xiao, Kexin Zhao, Chao Shen, et al.. (2025). Graph Attention Network-Driven Hierarchical Learning for Anti-Jamming UAV Communications. IEEE Transactions on Wireless Communications. 25. 5432–5445. 1 indexed citations
3.
Li, Qian, et al.. (2025). Robust Adversarial Defenses in Federated Learning: Exploring the Impact of Data Heterogeneity. IEEE Transactions on Information Forensics and Security. 20. 6005–6018.
4.
Tang, Yuzhe, et al.. (2025). TELEX: Two-Level Learned Index for Rich Queries on Enclave-based Blockchain Systems. IEEE Transactions on Knowledge and Data Engineering. 1–16. 3 indexed citations
5.
Peng, Zhe, et al.. (2025). HeX: Encrypted Rich Queries With Forward and Backward Privacy Using Trusted Hardware. IEEE Transactions on Dependable and Secure Computing. 22(4). 3751–3765. 2 indexed citations
6.
Ji, Xiang, et al.. (2025). Data-Centric Robust Training for Defending Against Transfer-Based Adversarial Attacks. IEEE Transactions on Information Forensics and Security. 20. 10275–10287.
7.
Wang, Bohui, Chao Shen, Chenhao Lin, Chao Deng, & Yang Shi. (2025). Distributed Cooperative Control and Robust Optimization for Nonlinear Connected Automated Vehicles With Unknown Reaction Time Delays and Jerk Dynamics. IEEE Transactions on Intelligent Transportation Systems. 26(5). 6715–6733. 2 indexed citations
10.
Li, Qian, Qingyuan Hu, Haoran Fan, et al.. (2024). Attention-SA: Exploiting Model-Approximated Data Semantics for Adversarial Attack. IEEE Transactions on Information Forensics and Security. 19. 8673–8684. 2 indexed citations
11.
Shen, Chao, et al.. (2024). An Automated Monitoring and Repairing System for DNN Training. IEEE Transactions on Dependable and Secure Computing. 22(2). 1655–1673.
12.
Lin, Chenhao, Xingliang Zhang, & Chao Shen. (2024). DeepLogic: Priority Testing of Deep Learning Through Interpretable Logic Units. Chinese Journal of Electronics. 33(4). 948–964.
13.
Zheng, Junhao, et al.. (2024). Physical 3D Adversarial Attacks against Monocular Depth Estimation in Autonomous Driving. 24452–24461. 10 indexed citations
14.
Wang, Run, et al.. (2024). TraceEvader: Making DeepFakes More Untraceable via Evading the Forgery Model Attribution. Proceedings of the AAAI Conference on Artificial Intelligence. 38(18). 19965–19973. 3 indexed citations
15.
Lin, Chenhao, et al.. (2023). Sensitive region-aware black-box adversarial attacks. Information Sciences. 637. 118929–118929. 5 indexed citations
16.
Lin, Chenhao, et al.. (2023). A fast data-driven optimization method of multi-area combined economic emission dispatch. Applied Energy. 337. 120884–120884. 17 indexed citations
17.
Li, Qian, et al.. (2023). Revisiting Gradient Regularization: Inject Robust Saliency-Aware Weight Bias for Adversarial Defense. IEEE Transactions on Information Forensics and Security. 18. 5936–5949. 6 indexed citations
18.
Lin, Chenhao, et al.. (2023). ChildShield: An Implicit and Continuous Child Identification System on Smartphones. IEEE Transactions on Dependable and Secure Computing. 21(4). 2257–2272.
19.
Zhang, Tianwei, Chao Shen, Yufei Chen, et al.. (2022). Can We Mitigate Backdoor Attack Using Adversarial Detection Methods?. IEEE Transactions on Dependable and Secure Computing. 20(4). 2867–2881. 8 indexed citations
20.
Lin, Chenhao & Ajay Kumar. (2017). Multi-Siamese networks to accurately match contactless to contact-based fingerprint images. PolyU Institutional Research Archive (Hong Kong Polytechnic University). 277–285. 16 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026