Chia-Mu Yu

1.8k total citations
83 papers, 1.1k citations indexed

About

Chia-Mu Yu is a scholar working on Artificial Intelligence, Computer Networks and Communications and Information Systems. According to data from OpenAlex, Chia-Mu Yu has authored 83 papers receiving a total of 1.1k indexed citations (citations by other indexed papers that have themselves been cited), including 46 papers in Artificial Intelligence, 32 papers in Computer Networks and Communications and 16 papers in Information Systems. Recurrent topics in Chia-Mu Yu's work include Cryptography and Data Security (23 papers), Privacy-Preserving Technologies in Data (21 papers) and Security in Wireless Sensor Networks (19 papers). Chia-Mu Yu is often cited by papers focused on Cryptography and Data Security (23 papers), Privacy-Preserving Technologies in Data (21 papers) and Security in Wireless Sensor Networks (19 papers). Chia-Mu Yu collaborates with scholars based in Taiwan, China and United Kingdom. Chia-Mu Yu's co-authors include Sy‐Yen Kuo, Chun-Shien Lu, Julie A. McCann, Shusen Yang, Xuebin Ren, Weiren Yu, Xinyu Yang, Philip S. Yu, Mauro Conti and Han‐Chieh Chao and has published in prestigious journals such as IEEE Access, IEEE Communications Magazine and Sensors.

In The Last Decade

Chia-Mu Yu

80 papers receiving 1.1k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Chia-Mu Yu Taiwan 17 576 473 229 189 112 83 1.1k
Youwen Zhu China 17 615 1.1× 211 0.4× 382 1.7× 59 0.3× 190 1.7× 82 963
Le Trieu Phong Japan 10 1.3k 2.3× 119 0.3× 217 0.9× 134 0.7× 151 1.3× 25 1.5k
Vladimir Ivanov Germany 6 1.7k 3.0× 342 0.7× 228 1.0× 281 1.5× 102 0.9× 12 2.0k
Bei Gong China 15 393 0.7× 481 1.0× 246 1.1× 108 0.6× 41 0.4× 63 783
Salman Avestimehr United States 19 744 1.3× 280 0.6× 94 0.4× 154 0.8× 126 1.1× 78 1.0k
João P. Vilela Portugal 13 342 0.6× 415 0.9× 131 0.6× 441 2.3× 94 0.8× 65 827
Karn Seth United States 4 1.8k 3.1× 208 0.4× 239 1.0× 174 0.9× 103 0.9× 7 1.9k
Ben Kreuter United States 3 1.8k 3.2× 210 0.4× 249 1.1× 179 0.9× 105 0.9× 4 2.0k
Antonio Marcedone United States 3 1.8k 3.0× 200 0.4× 227 1.0× 173 0.9× 99 0.9× 4 1.9k

Countries citing papers authored by Chia-Mu Yu

Since Specialization
Citations

This map shows the geographic impact of Chia-Mu Yu's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Chia-Mu Yu with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Chia-Mu Yu more than expected).

Fields of papers citing papers by Chia-Mu Yu

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Chia-Mu Yu. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Chia-Mu Yu. The network helps show where Chia-Mu Yu may publish in the future.

Co-authorship network of co-authors of Chia-Mu Yu

This figure shows the co-authorship network connecting the top 25 collaborators of Chia-Mu Yu. A scholar is included among the top collaborators of Chia-Mu Yu based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Chia-Mu Yu. Chia-Mu Yu is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Lin, Ying‐Dar, et al.. (2025). Enhancing can security with ML-based IDS: Strategies and efficacies against adversarial attacks. Computers & Security. 151. 104322–104322. 1 indexed citations
2.
Yu, Chia-Mu, Hsin‐Hung Cho, Reza Malekian, Alireza Jolfaei, & Ye Liu. (2025). Adversarial Examples in Consumer Electronics: Deceptive Threats to AI Systems. IEEE Consumer Electronics Magazine. 14(3). 25–26.
3.
Yu, Chia-Mu, et al.. (2025). Securing Healthcare Data Integrity: Deepfake Detection Using Autonomous AI Approaches. IEEE Journal of Biomedical and Health Informatics. PP. 1–13.
4.
Lu, Chun-Shien, et al.. (2024). Defending against Clean-Image Backdoor Attack in Multi-Label Classification. 5500–5504. 1 indexed citations
6.
Lin, Ying‐Dar, et al.. (2024). Neural Network-based Functional Degradation for Cyber-Physical Systems. 425–434. 1 indexed citations
7.
Dargahi, Tooska, et al.. (2022). DeepClean: A Robust Deep Learning Technique for Autonomous Vehicle Camera Data Privacy. IEEE Access. 10. 124534–124544. 9 indexed citations
8.
Tsai, Yu‐Lin, et al.. (2021). Formalizing Generalization and Adversarial Robustness of Neural Networks to Weight Perturbations. Neural Information Processing Systems. 34. 9 indexed citations
9.
Ambrosin, Moreno, Mauro Conti, Riccardo Lazzeretti, & Chia-Mu Yu. (2020). Introduction to the Special Issue on Security and Privacy for Connected Cyber-physical Systems. ACM Transactions on Cyber-Physical Systems. 5(1). 1–2. 1 indexed citations
10.
Yu, Chia-Mu, et al.. (2019). Empirical Evaluation on Synthetic Data Generation with Generative Adversarial Network. 1–6. 22 indexed citations
11.
Pooranian, Zahra, et al.. (2018). RARE: Defeating side channels based on data-deduplication in cloud storage. Research Padua Archive (University of Padua). 444–449. 51 indexed citations
12.
Yu, Chia-Mu, et al.. (2017). Data-Driven and Deep Learning Methodology for Deceptive Advertising and Phone Scams Detection. 166–171. 7 indexed citations
13.
Ren, Xuebin, Chia-Mu Yu, Weiren Yu, et al.. (2016). High-Dimensional Crowdsourced Data Distribution Estimation with Local Privacy. Spiral (Imperial College London). 226–233. 13 indexed citations
14.
Yu, Chia-Mu, Chi‐Yuan Chen, Sy‐Yen Kuo, & Han‐Chieh Chao. (2013). Privacy-Preserving Power Request in Smart Grid Networks. IEEE Systems Journal. 8(2). 441–449. 28 indexed citations
15.
Yu, Chia-Mu, et al.. (2011). Practical and Secure Multidimensional Queries in Tiered Sensor Networks. IEEE Transactions on Information Forensics and Security. 241–255. 5 indexed citations
16.
Yu, Chia-Mu, Chun-Shien Lu, & Sy‐Yen Kuo. (2010). Noninteractive Pairwise Key Establishment for Sensor Networks. IEEE Transactions on Information Forensics and Security. 5(3). 556–569. 30 indexed citations
17.
Chen, Chi‐Yuan, et al.. (2009). Increasing Reliability for IEEE 802.16j Mobile Multi-hop Relay Networks Planning.. 282–286. 3 indexed citations
18.
Yu, Chia-Mu, Chun-Shien Lu, & Sy‐Yen Kuo. (2009). Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks. 1–5. 43 indexed citations
19.
Yu, Chia-Mu, et al.. (2007). P‐107: The Fastest Response TN‐Type TFT LCD of the World Likes OCB Level. SID Symposium Digest of Technical Papers. 38(1). 603–606. 9 indexed citations
20.
Yu, Chia-Mu, et al.. (2007). P‐123: Image Sticking Analysis of Different Q‐time LC Cell by Machine Vision. SID Symposium Digest of Technical Papers. 38(1). 665–668. 17 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026