Chenyu Wang

1.2k total citations · 1 hit paper
50 papers, 841 citations indexed

About

Chenyu Wang is a scholar working on Computer Networks and Communications, Information Systems and Artificial Intelligence. According to data from OpenAlex, Chenyu Wang has authored 50 papers receiving a total of 841 indexed citations (citations by other indexed papers that have themselves been cited), including 34 papers in Computer Networks and Communications, 31 papers in Information Systems and 13 papers in Artificial Intelligence. Recurrent topics in Chenyu Wang's work include Advanced Authentication Protocols Security (21 papers), User Authentication and Security Systems (21 papers) and Cryptography and Data Security (8 papers). Chenyu Wang is often cited by papers focused on Advanced Authentication Protocols Security (21 papers), User Authentication and Security Systems (21 papers) and Cryptography and Data Security (8 papers). Chenyu Wang collaborates with scholars based in China, United States and Singapore. Chenyu Wang's co-authors include Guoai Xu, Ding Wang, Huaxiong Wang, Yi Tu, Xiaofeng Tao, Jing Sun, Ping Wang, Ivan Png, Debiao He and Qiu-Hong Wang and has published in prestigious journals such as Nature Communications, SHILAP Revista de lepidopterología and Sensors.

In The Last Decade

Chenyu Wang

45 papers receiving 824 citations

Hit Papers

Secure and Lightweight User Authentication Scheme for Clo... 2023 2026 2024 2025 2023 20 40 60

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Chenyu Wang China 16 576 551 231 138 89 50 841
Pedro R. M. Inácio Portugal 16 643 1.1× 666 1.2× 404 1.7× 212 1.5× 99 1.1× 51 1.1k
Yinhao Xiao China 12 407 0.7× 399 0.7× 321 1.4× 137 1.0× 84 0.9× 22 747
Jong Sou Park South Korea 15 371 0.6× 562 1.0× 207 0.9× 97 0.7× 76 0.9× 70 773
Qian Lin China 14 706 1.2× 603 1.1× 228 1.0× 82 0.6× 58 0.7× 49 973
Corinna Schmitt Germany 13 461 0.8× 887 1.6× 328 1.4× 225 1.6× 259 2.9× 60 1.2k
Wenchao Zhou United States 19 382 0.7× 783 1.4× 462 2.0× 228 1.7× 82 0.9× 87 1.2k
Eugene Y. Vasserman United States 13 260 0.5× 441 0.8× 306 1.3× 107 0.8× 59 0.7× 45 754
Abdul Nasir Khan Pakistan 17 539 0.9× 628 1.1× 311 1.3× 74 0.5× 163 1.8× 37 970
Seo Yeon Moon South Korea 8 285 0.5× 363 0.7× 217 0.9× 253 1.8× 75 0.8× 10 633
Weizhong Qiang China 12 246 0.4× 361 0.7× 233 1.0× 133 1.0× 56 0.6× 63 606

Countries citing papers authored by Chenyu Wang

Since Specialization
Citations

This map shows the geographic impact of Chenyu Wang's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Chenyu Wang with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Chenyu Wang more than expected).

Fields of papers citing papers by Chenyu Wang

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Chenyu Wang. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Chenyu Wang. The network helps show where Chenyu Wang may publish in the future.

Co-authorship network of co-authors of Chenyu Wang

This figure shows the co-authorship network connecting the top 25 collaborators of Chenyu Wang. A scholar is included among the top collaborators of Chenyu Wang based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Chenyu Wang. Chenyu Wang is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Wang, Yanwen, et al.. (2026). Author Correction: Microenvironment-feedback regulated hydrogels as living wound healing materials. Nature Communications. 17(1). 1593–1593.
2.
Zhang, Xiaoyi, Huici Wu, Xiaofeng Tao, et al.. (2025). PUF-Based Lightweight Group Authentication for Massive IoT Access With Insecure Channel. IEEE Internet of Things Journal. 12(14). 26968–26983. 1 indexed citations
3.
Xu, Guosheng, et al.. (2025). A Provably Secure Authentication Protocol Based on PUF and ECC for IoT Cloud‐Edge Environments. IET Information Security. 2025(1).
5.
Tao, Xiaofeng, et al.. (2025). Blockchain Heterogeneous Network Authentication Scheme Based on Batch Verification Group Signature. IEEE Internet of Things Journal. 12(12). 19244–19263.
6.
Wang, Chenyu, et al.. (2024). Navigating the Digital Twin Network landscape: A survey on architecture, applications, privacy and security. SHILAP Revista de lepidopterología. 4(4). 100269–100269. 13 indexed citations
7.
Wu, Huici, et al.. (2024). Anti-Quantum Certificateless Group Authentication for Massive Accessing IoT Devices. IEEE Internet of Things Journal. 11(9). 16561–16577. 8 indexed citations
8.
Wang, Chenyu, et al.. (2024). Priority based inter-twin communication in vehicular digital twin networks. International Journal of Parallel Emergent and Distributed Systems. 41(1). 18–33. 3 indexed citations
9.
Wang, Chenyu, et al.. (2024). Advancing skeleton-based human behavior recognition: multi-stream fusion spatiotemporal graph convolutional networks. Complex & Intelligent Systems. 11(1). 2 indexed citations
10.
Wang, Chenyu, et al.. (2023). Anonymous Authentication Protocol Based on Physical Unclonable Function and Elliptic Curve Cryptography for Smart Grid. IEEE Systems Journal. 1–12. 15 indexed citations
11.
Cheng, Yu, et al.. (2023). FF-BCSD: A Binary code similarity detection method based on feature fusion. 757–761. 1 indexed citations
12.
Liu, Kaijun, et al.. (2023). A Robust and Effective Two-Factor Authentication (2FA) Protocol Based on ECC for Mobile Computing. Applied Sciences. 13(7). 4425–4425. 6 indexed citations
14.
Zou, Shihong, et al.. (2023). A Robust Continuous Authentication System Using Smartphone Sensors and Wasserstein Generative Adversarial Networks. Security and Communication Networks. 2023. 1–11. 1 indexed citations
15.
Liu, Boya, et al.. (2023). Deep Reinforcement Learning-Based Intelligent Security Forwarding Strategy for VANET. Sensors. 23(3). 1204–1204. 12 indexed citations
16.
Xu, Guosheng, et al.. (2023). A Method for Translating Automotive Body-Related CAN Messages Based on Labeled Bits. Applied Sciences. 13(3). 1942–1942. 3 indexed citations
17.
Wang, Chenyu, et al.. (2022). A novel model for voice command fingerprinting using deep learning. Journal of Information Security and Applications. 65. 103085–103085. 4 indexed citations
18.
Xu, Guoai, et al.. (2022). Bit-Level Automotive Controller Area Network Message Reverse Framework Based on Linear Regression. Sensors. 22(3). 981–981. 10 indexed citations
19.
Wang, Chenyu, et al.. (2020). Security Analysis on “Anonymous Authentication Scheme for Smart Home Environment with Provable Security”. Wireless Communications and Mobile Computing. 2020. 1–4. 7 indexed citations
20.
Wang, Chenyu, Ke Ding, Bin Li, et al.. (2018). An Enhanced User Authentication Protocol Based on Elliptic Curve Cryptosystem in Cloud Computing Environment. Wireless Communications and Mobile Computing. 2018(1). 12 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026