Hit papers significantly outperform the citation benchmark for their cohort. A paper qualifies
if it has ≥500 total citations, achieves ≥1.5× the top-1% citation threshold for papers in the
same subfield and year (this is the minimum needed to enter the top 1%, not the average
within it), or reaches the top citation threshold in at least one of its specific research
topics.
Halide perovskite memristors as flexible and reconfigurable physical unclonable functions
Countries citing papers authored by Chip-Hong Chang
Since
Specialization
Citations
This map shows the geographic impact of Chip-Hong Chang's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Chip-Hong Chang with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Chip-Hong Chang more than expected).
This network shows the impact of papers produced by Chip-Hong Chang. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Chip-Hong Chang. The network helps show where Chip-Hong Chang may publish in the future.
Co-authorship network of co-authors of Chip-Hong Chang
This figure shows the co-authorship network connecting the top 25 collaborators of Chip-Hong Chang.
A scholar is included among the top collaborators of Chip-Hong Chang based on the total number of
citations received by their joint publications. Widths of edges
represent the number of papers authors have co-authored together.
Node borders
signify the number of papers an author published with Chip-Hong Chang. Chip-Hong Chang is excluded from
the visualization to improve readability, since they are connected to all nodes in the network.
Xiong, Luo -, Yang, et al.. (2016). A Novel Hidden Danger Prediction Method in CloudBased Intelligent Industrial Production Management Using Timeliness Managing Extreme Learning Machine. 中国通信:英文版. 74–82.3 indexed citations
4.
Suh, et al.. (2015). Reliability and Validity of a Korean Version of the Cultural Awareness Scale (K-CAS). 27(4). 472–479.2 indexed citations
5.
Zhao, Zhao, Lei Lei, Zou, et al.. (2015). Inter-WBAN Coexistence and Interference Mitigation. 13(2). 28–35.
6.
Chang, Chip-Hong, et al.. (2014). Computational architecture: Connecting the physical and virtual worlds. 335–336.1 indexed citations
7.
Wu, et al.. (2013). Processing Chinese hand-radicals activates the medial frontal gyrus A functional MRI investigation. 中国神经再生研究:英文版. 8(20). 1837–1843.3 indexed citations
8.
Park, et al.. (2012). Control and synchronization of Lorenz systems via robust backstepping technique. International Conference on Control, Automation and Systems. 328–332.2 indexed citations
9.
Chang, Chip-Hong, et al.. (2011). An Improved User Authentication and Key Agreement Scheme Providing User Anonymity. 9(4). 352–358.
10.
., Yu, et al.. (2011). The Study of the Management Competence Gap Analysis: Top and Middle Managers of Taipei 101. 现代会计与审计. 7(10). 1122–1127.1 indexed citations
11.
Liao, et al.. (2011). New Program Projects Selection for TV Companies. 115–122.2 indexed citations
12.
Chang, Chip-Hong, et al.. (2011). Memory controllers for high-performance and real-time MPSoCs requirements, architectures, and future trends. 3–12.1 indexed citations
13.
Chao, et al.. (2011). A TDOA-Based Ultrasonic Absolute Localizing System of a Rail Robot in Greenhouse. 2(3). 288–292.
14.
Wang, Guangming, Lei Lei, et al.. (2010). An Efficient Method of Generating Parameters for Pairing-Based Cryptosystems. 中国通信. 7(4). 167–171.1 indexed citations
15.
Chang, Chip-Hong, et al.. (2008). Language chunks and college English writing. 中美英语教学. 5(2). 1–4.1 indexed citations
16.
Ren, et al.. (2008). SNR estimation algorithm based on the preamble for wireless OFDM systems. 中国科学:F辑英文版. 51(7). 965–974.1 indexed citations
17.
Liu, , et al.. (2007). A Message-Level Security Model Consisting of Multiple Security-Tokens Mechanism. 武汉大学学报:自然科学英文版. 12(1). 1–4.1 indexed citations
18.
Zhang, et al.. (2006). An upper bound on the size of m-ary t-sEC/AUED codes. 中国邮电高校学报:英文版. 13(4). 95–97.1 indexed citations
19.
Qi, Qi, et al.. (2005). Design of M&C Network based on the Internet. 21(3). 12–13.1 indexed citations
Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive
bibliographic database. While OpenAlex provides broad and valuable coverage of the global
research landscape, it—like all bibliographic datasets—has inherent limitations. These include
incomplete records, variations in author disambiguation, differences in journal indexing, and
delays in data updates. As a result, some metrics and network relationships displayed in
Rankless may not fully capture the entirety of a scholar's output or impact.