Chunjie Cao

494 total citations
47 papers, 257 citations indexed

About

Chunjie Cao is a scholar working on Artificial Intelligence, Computer Networks and Communications and Signal Processing. According to data from OpenAlex, Chunjie Cao has authored 47 papers receiving a total of 257 indexed citations (citations by other indexed papers that have themselves been cited), including 25 papers in Artificial Intelligence, 15 papers in Computer Networks and Communications and 13 papers in Signal Processing. Recurrent topics in Chunjie Cao's work include Cryptography and Data Security (10 papers), Advanced Malware Detection Techniques (8 papers) and Digital Media Forensic Detection (7 papers). Chunjie Cao is often cited by papers focused on Cryptography and Data Security (10 papers), Advanced Malware Detection Techniques (8 papers) and Digital Media Forensic Detection (7 papers). Chunjie Cao collaborates with scholars based in China, United States and Singapore. Chunjie Cao's co-authors include Mengxing Huang, Yucong Duan, Jixin Ma, Xiaoyi Zhou, Xiaoxian Yang, Zhao Li, Xiaobing Sun, Jianfeng Ma, SangJae Moon and Lei Chen and has published in prestigious journals such as SHILAP Revista de lepidopterología, IEEE Access and Sensors.

In The Last Decade

Chunjie Cao

39 papers receiving 252 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Chunjie Cao China 10 104 84 56 54 54 47 257
N. Krishnaraj India 7 73 0.7× 57 0.7× 55 1.0× 90 1.7× 20 0.4× 12 236
Neetu Faujdar India 9 99 1.0× 82 1.0× 46 0.8× 39 0.7× 24 0.4× 42 253
Khaled Alhazmi Saudi Arabia 8 57 0.5× 96 1.1× 59 1.1× 34 0.6× 32 0.6× 16 249
P. Deepa Shenoy India 9 83 0.8× 126 1.5× 102 1.8× 94 1.7× 50 0.9× 38 314
Jinghua Zhu China 11 87 0.8× 112 1.3× 79 1.4× 52 1.0× 12 0.2× 53 319
Sahar F. Sabbeh Egypt 9 125 1.2× 63 0.8× 70 1.3× 41 0.8× 15 0.3× 27 274
Yongjian Ren China 9 96 0.9× 82 1.0× 70 1.3× 52 1.0× 13 0.2× 36 248
Mohammed Al-Shabi Saudi Arabia 9 124 1.2× 91 1.1× 84 1.5× 58 1.1× 26 0.5× 24 291
Mohammed Altaf Ahmed Saudi Arabia 10 95 0.9× 57 0.7× 46 0.8× 35 0.6× 27 0.5× 38 309
Guangxue Zhang China 4 101 1.0× 287 3.4× 132 2.4× 46 0.9× 32 0.6× 6 384

Countries citing papers authored by Chunjie Cao

Since Specialization
Citations

This map shows the geographic impact of Chunjie Cao's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Chunjie Cao with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Chunjie Cao more than expected).

Fields of papers citing papers by Chunjie Cao

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Chunjie Cao. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Chunjie Cao. The network helps show where Chunjie Cao may publish in the future.

Co-authorship network of co-authors of Chunjie Cao

This figure shows the co-authorship network connecting the top 25 collaborators of Chunjie Cao. A scholar is included among the top collaborators of Chunjie Cao based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Chunjie Cao. Chunjie Cao is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Lin, Zhizhe, et al.. (2025). GSA-KAN: A Hybrid Model for Short-Term Traffic Forecasting. Mathematics. 13(7). 1158–1158. 5 indexed citations
2.
Cao, Chunjie, et al.. (2025). JPEG-Domain Malware Detection With Pretrained Lightweight Vision Transformer Model. IEEE Transactions on Dependable and Secure Computing. 22(6). 7403–7417.
3.
Feng, Xia, et al.. (2024). DPFLA: Defending Private Federated Learning Against Poisoning Attacks. IEEE Transactions on Services Computing. 17(4). 1480–1491. 11 indexed citations
4.
Cao, Chunjie, et al.. (2024). Research on Underwater Sensor Network Adaptive Clustering Algorithm for Marine Environment Monitoring. Journal of Marine Science and Engineering. 12(11). 1958–1958. 1 indexed citations
5.
Cao, Chunjie, et al.. (2023). FACILE: A capsule network with fewer capsules and richer hierarchical information for malware image classification. Computers & Security. 137. 103606–103606. 6 indexed citations
6.
Cao, Chunjie, et al.. (2023). Joint Channel and Power Assignment for Underwater Cognitive Acoustic Networks on Marine Mammal-Friendly. Applied Sciences. 13(23). 12950–12950. 2 indexed citations
7.
Cao, Chunjie, et al.. (2023). Adversarial Attack for Deep Steganography Based on Surrogate Training and Knowledge Diffusion. Applied Sciences. 13(11). 6588–6588. 3 indexed citations
9.
Cao, Chunjie, et al.. (2022). A Short Signal Backoff MAC Protocol Based on Game Theory for Underwater Sensor Networks. IEEE Access. 10. 125992–126000. 3 indexed citations
10.
Cao, Chunjie, et al.. (2022). Blind Identification of Channel Codes under AWGN and Fading Conditions via Deep Learning. 67–73. 2 indexed citations
11.
Chen, Xiaohong, et al.. (2020). Network Anomaly Detection Based on Deep Support Vector Data Description. 251–255. 11 indexed citations
12.
Cao, Chunjie, et al.. (2020). Privacy Protection in Blockchain Systems: A Review. Advances in intelligent systems and computing. 2045–2052. 1 indexed citations
13.
Duan, Yucong, et al.. (2019). Modeling Data, Information and Knowledge for Security Protection of Hybrid IoT and Edge Resources. IEEE Access. 7. 99161–99176. 33 indexed citations
14.
Zhou, Xiaoyi, et al.. (2019). Adaptive Robust Blind Watermarking Scheme Improved by Entropy‐Based SVM and Optimized Quantum Genetic Algorithm. Mathematical Problems in Engineering. 2019(1). 5 indexed citations
15.
Zhou, Xiaoyi, et al.. (2018). Adaptive Digital Watermarking Scheme Based on Support Vector Machines and Optimized Genetic Algorithm. Mathematical Problems in Engineering. 2018. 1–9. 19 indexed citations
16.
Wang, Xianpeng, Wensi Wang, Mengxing Huang, et al.. (2018). Tensor-Based Angle Estimation Approach for Strictly Noncircular Sources with Unknown Mutual Coupling in Bistatic MIMO Radar. Sensors. 18(9). 2788–2788. 7 indexed citations
17.
Cao, Chunjie, et al.. (2017). Vulnerability Analysis of Interdependent Scale-Free Networks with Complex Coupling. Journal of Electrical and Computer Engineering. 2017. 1–5. 1 indexed citations
18.
Cao, Chunjie & Jugurta Montalvão. (2008). Identity-based constant round group key exchange protocol via secret-share. WSEAS TRANSACTIONS on SYSTEMS archive. 7(1). 7–16. 3 indexed citations
19.
Cao, Chunjie, Chao Yang, Jianfeng Ma, & SangJae Moon. (2008). Constructing UC Secure and Constant-Round Group Key Exchange Protocols via Secret Sharing. EURASIP Journal on Wireless Communications and Networking. 2008(1). 5 indexed citations
20.
Cao, Chunjie, Jianfeng Ma, & SangJae Moon. (2007). Provable efficient certificateless group key exchange protocol. Wuhan University Journal of Natural Sciences. 12(1). 41–45. 12 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026