Chun‐Ta Li

4.1k total citations · 1 hit paper
113 papers, 3.0k citations indexed

About

Chun‐Ta Li is a scholar working on Computer Networks and Communications, Information Systems and Artificial Intelligence. According to data from OpenAlex, Chun‐Ta Li has authored 113 papers receiving a total of 3.0k indexed citations (citations by other indexed papers that have themselves been cited), including 72 papers in Computer Networks and Communications, 68 papers in Information Systems and 44 papers in Artificial Intelligence. Recurrent topics in Chun‐Ta Li's work include Advanced Authentication Protocols Security (61 papers), User Authentication and Security Systems (47 papers) and Cryptography and Data Security (33 papers). Chun‐Ta Li is often cited by papers focused on Advanced Authentication Protocols Security (61 papers), User Authentication and Security Systems (47 papers) and Cryptography and Data Security (33 papers). Chun‐Ta Li collaborates with scholars based in Taiwan, Nigeria and India. Chun‐Ta Li's co-authors include Cheng‐Chi Lee, Min‐Shiang Hwang, Chi-Yao Weng, Yen‐Ping Chu, Chin‐Ling Chen, Agbotiname Lucky Imoize, Chien‐Ming Chen, Dong‐Her Shih, Che-Wei Hsu and Yan-Ming Lai and has published in prestigious journals such as Journal of Cleaner Production, IEEE Access and Sensors.

In The Last Decade

Chun‐Ta Li

110 papers receiving 2.8k citations

Hit Papers

An efficient biometrics-b... 2009 2026 2014 2020 2009 100 200 300

Author Peers

Peers are selected by citation overlap in the author's most active subfields. citations · hero ref

Author Last Decade Papers Cites
Chun‐Ta Li 2.1k 1.9k 1.0k 564 421 113 3.0k
Marimuthu Karuppiah 1.7k 0.8× 1.5k 0.8× 1.0k 1.0× 312 0.6× 297 0.7× 80 2.7k
Jong‐Hyouk Lee 2.2k 1.1× 1.5k 0.8× 812 0.8× 372 0.7× 203 0.5× 138 3.1k
Rakesh Tripathi 1.8k 0.9× 1.5k 0.8× 1.2k 1.1× 612 1.1× 333 0.8× 55 3.0k
Kuo‐Hui Yeh 1.2k 0.6× 1.2k 0.7× 784 0.8× 240 0.4× 187 0.4× 99 2.1k
Walter de Donato 2.2k 1.1× 1.2k 0.7× 530 0.5× 174 0.3× 316 0.8× 23 2.7k
Saqib Hakak 1.6k 0.8× 826 0.4× 1.0k 1.0× 569 1.0× 313 0.7× 54 2.7k
Alberto Coen‐Porisini 1.6k 0.8× 1.1k 0.6× 692 0.7× 432 0.8× 180 0.4× 75 2.5k
Youliang Tian 1.0k 0.5× 1.1k 0.6× 1.1k 1.1× 211 0.4× 320 0.8× 144 2.3k
Massimo Ficco 1.4k 0.7× 981 0.5× 664 0.6× 507 0.9× 205 0.5× 98 2.2k
Zhiyuan Tan 1.8k 0.9× 553 0.3× 1.4k 1.4× 668 1.2× 269 0.6× 109 2.9k

Countries citing papers authored by Chun‐Ta Li

Since Specialization
Citations

This map shows the geographic impact of Chun‐Ta Li's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Chun‐Ta Li with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Chun‐Ta Li more than expected).

Fields of papers citing papers by Chun‐Ta Li

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Chun‐Ta Li. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Chun‐Ta Li. The network helps show where Chun‐Ta Li may publish in the future.

Co-authorship network of co-authors of Chun‐Ta Li

This figure shows the co-authorship network connecting the top 25 collaborators of Chun‐Ta Li. A scholar is included among the top collaborators of Chun‐Ta Li based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Chun‐Ta Li. Chun‐Ta Li is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Imoize, Agbotiname Lucky, et al.. (2023). Data-Driven Diffraction Loss Estimation for Future Intelligent Transportation Systems in 6G Networks. Mathematics. 11(13). 3004–3004. 3 indexed citations
2.
Khan, Muhammad Bilal, Ali Althobaiti, Cheng‐Chi Lee, Mohamed S. Soliman, & Chun‐Ta Li. (2023). Some New Properties of Convex Fuzzy-Number-Valued Mappings on Coordinates Using Up and Down Fuzzy Relations and Related Inequalities. Mathematics. 11(13). 2851–2851. 4 indexed citations
3.
Awotunde, Joseph Bamidele, Sakinat Oluwabukonla Folorunso, Agbotiname Lucky Imoize, et al.. (2023). An Ensemble Tree-Based Model for Intrusion Detection in Industrial Internet of Things Networks. Applied Sciences. 13(4). 2479–2479. 58 indexed citations
4.
Lilhore, Umesh Kumar, Agbotiname Lucky Imoize, Chun‐Ta Li, et al.. (2022). Design and Implementation of an ML and IoT Based Adaptive Traffic-Management System for Smart Cities. Sensors. 22(8). 2908–2908. 102 indexed citations
5.
Isabona, Joseph, et al.. (2022). Development of a Multilayer Perceptron Neural Network for Optimal Predictive Modeling in Urban Microcellular Radio Environments. Applied Sciences. 12(11). 5713–5713. 44 indexed citations
6.
Lilhore, Umesh Kumar, Agbotiname Lucky Imoize, Cheng‐Chi Lee, et al.. (2022). Enhanced Convolutional Neural Network Model for Cassava Leaf Disease Identification and Classification. Mathematics. 10(4). 580–580. 56 indexed citations
7.
Isabona, Joseph, Agbotiname Lucky Imoize, Stephen Ojo, Cheng‐Chi Lee, & Chun‐Ta Li. (2022). Atmospheric Propagation Modelling for Terrestrial Radio Frequency Communication Links in a Tropical Wet and Dry Savanna Climate. Information. 13(3). 141–141. 20 indexed citations
8.
Chen, Chin‐Ling, Ming Zhou, Woei-Jiunn Tsaur, et al.. (2022). Blockchain-Based Anti-Counterfeiting Management System for Traceable Luxury Products. Sustainability. 14(19). 12814–12814. 17 indexed citations
9.
Chen, Chin‐Ling, Yong‐Yuan Deng, Woei-Jiunn Tsaur, et al.. (2021). A Traceable Online Insurance Claims System Based on Blockchain and Smart Contract Technology. Sustainability. 13(16). 9386–9386. 37 indexed citations
10.
Chen, Chin‐Ling, et al.. (2020). Traceable and Private Satellite Communication for Emergency Notification in VANET. 網際網路技術學刊. 21(1). 217–233. 1 indexed citations
11.
Li, Chun‐Ta, Tsu‐Yang Wu, & Chien‐Ming Chen. (2018). A Provably Secure Group Key Agreement Scheme With Privacy Preservation for Online Social Networks Using Extended Chaotic Maps. IEEE Access. 6. 66742–66753. 11 indexed citations
12.
Li, Chun‐Ta, Cheng‐Chi Lee, & Chi-Yao Weng. (2018). A Secure Three Party Node Authentication and Key Establishment Scheme for the Internet of Things Environment. 網際網路技術學刊. 19(1). 147–155. 4 indexed citations
13.
Li, Chun‐Ta, Cheng‐Chi Lee, & Chi-Yao Weng. (2018). Security and Efficiency Enhancement of Robust ID Based Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Mobile Networks.. Journal of information science and engineering. 34. 155–170. 7 indexed citations
14.
Li, Chun‐Ta, Tsu‐Yang Wu, Chin‐Ling Chen, Cheng‐Chi Lee, & Chien‐Ming Chen. (2017). An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System. Sensors. 17(7). 1482–1482. 86 indexed citations
15.
Li, Chun‐Ta, Cheng‐Chi Lee, Chi-Yao Weng, & Chun‐I Fan. (2015). A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture. Journal of information science and engineering. 31(6). 1975–1992. 17 indexed citations
16.
Lee, Cheng‐Chi, et al.. (2015). Improving Security of a Communication-Efficient Three-Party Password Authentication Key Exchange Protocol. International journal of network security. 17(1). 1–6. 8 indexed citations
17.
Lee, Cheng‐Chi, et al.. (2014). A Novel Frequency Billing Service in Digital Television System.. J. Inf. Hiding Multim. Signal Process.. 5. 439–450. 1 indexed citations
18.
Li, Chun‐Ta & Yen‐Ping Chu. (2009). Cryptanalysis of Threshold Password Authentication Against Guessing Attacks in Ad Hoc Networks. International journal of network security. 8(2). 166–168. 16 indexed citations
19.
Li, Chun‐Ta, et al.. (2009). An Efficient Sensor-to-Sensor Authenticated Path-Key Establishment Scheme for Secure Communications in Wireless Sensor Networks. International journal of innovative computing, information & control. 22 indexed citations
20.
Li, Chun‐Ta, Min‐Shiang Hwang, & Yen‐Ping Chu. (2008). Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks. Computer Systems: Science & Engineering. 23. 10 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026