Chunxiang Gu

615 total citations
39 papers, 185 citations indexed

About

Chunxiang Gu is a scholar working on Artificial Intelligence, Computer Networks and Communications and Information Systems. According to data from OpenAlex, Chunxiang Gu has authored 39 papers receiving a total of 185 indexed citations (citations by other indexed papers that have themselves been cited), including 32 papers in Artificial Intelligence, 19 papers in Computer Networks and Communications and 13 papers in Information Systems. Recurrent topics in Chunxiang Gu's work include Cryptography and Data Security (17 papers), Network Security and Intrusion Detection (10 papers) and Internet Traffic Analysis and Secure E-voting (9 papers). Chunxiang Gu is often cited by papers focused on Cryptography and Data Security (17 papers), Network Security and Intrusion Detection (10 papers) and Internet Traffic Analysis and Secure E-voting (9 papers). Chunxiang Gu collaborates with scholars based in China. Chunxiang Gu's co-authors include Fushan Wei, Yuefei Zhu, Jinlong Fei, Xinyi Hu, Mingwu Zhang, Yanwei Zhou, Yongjuan Wang, Jianhua Zheng, Zirui Qiao and Bo Yang and has published in prestigious journals such as IEEE Access, Sensors and IEEE Internet of Things Journal.

In The Last Decade

Chunxiang Gu

33 papers receiving 156 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Chunxiang Gu China 8 112 82 73 33 31 39 185
Christophe Bidan France 9 119 1.1× 154 1.9× 95 1.3× 22 0.7× 24 0.8× 22 221
Liang Feng Zhang China 8 123 1.1× 34 0.4× 72 1.0× 15 0.5× 10 0.3× 34 173
Atsuo Inomata Japan 8 94 0.8× 146 1.8× 129 1.8× 48 1.5× 8 0.3× 37 251
Thyla van der Merwe United Kingdom 5 119 1.1× 122 1.5× 98 1.3× 20 0.6× 12 0.4× 9 188
Scott A. Watterson United States 9 102 0.9× 189 2.3× 59 0.8× 62 1.9× 13 0.4× 12 303
Jean Wolter Germany 6 128 1.1× 221 2.7× 87 1.2× 14 0.4× 11 0.4× 8 322
Toshiaki Tanaka Japan 6 77 0.7× 96 1.2× 28 0.4× 60 1.8× 24 0.8× 46 160
Paul Franklin United States 6 44 0.4× 143 1.7× 31 0.4× 64 1.9× 15 0.5× 11 249
Bertram Poettering United Kingdom 7 151 1.3× 50 0.6× 67 0.9× 26 0.8× 37 1.2× 24 180
Olivier Blazy France 7 117 1.0× 62 0.8× 54 0.7× 36 1.1× 23 0.7× 23 171

Countries citing papers authored by Chunxiang Gu

Since Specialization
Citations

This map shows the geographic impact of Chunxiang Gu's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Chunxiang Gu with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Chunxiang Gu more than expected).

Fields of papers citing papers by Chunxiang Gu

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Chunxiang Gu. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Chunxiang Gu. The network helps show where Chunxiang Gu may publish in the future.

Co-authorship network of co-authors of Chunxiang Gu

This figure shows the co-authorship network connecting the top 25 collaborators of Chunxiang Gu. A scholar is included among the top collaborators of Chunxiang Gu based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Chunxiang Gu. Chunxiang Gu is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Zhu, Mingliang, et al.. (2025). A fine-grained message clustering method based on message representation and identifier fingerprints. Computers & Security. 158. 104631–104631.
2.
Gu, Chunxiang, et al.. (2025). TMC-GCN: Encrypted Traffic Mapping Classification Method Based on Graph Convolutional Networks. Computers, materials & continua/Computers, materials & continua (Print). 82(2). 3179–3201.
3.
Meng, Qingjuan, et al.. (2025). Entropy-regulated cross-modal generative fusion for multimodal network intrusion detection. Information Fusion. 126. 103581–103581. 2 indexed citations
4.
Zhao, Dongliang, et al.. (2024). AGLFuzz: Automata-Guided Fuzzing for detecting logic errors in security protocol implementations. Computers & Security. 149. 103979–103979. 1 indexed citations
5.
Wang, Yongjuan, et al.. (2024). Combine intra- and inter-flow: A multimodal encrypted traffic classification model driven by diverse features. Computer Networks. 245. 110403–110403. 3 indexed citations
6.
Gu, Chunxiang, et al.. (2024). Stateful black-box fuzzing for encryption protocols and its application in IPsec. Computer Networks. 251. 110605–110605.
7.
Zhao, Dongliang, et al.. (2024). An enhanced state-aware model learning approach for security analysis in lightweight protocol implementations. Journal of Cloud Computing Advances Systems and Applications. 13(1). 1 indexed citations
8.
Gu, Chunxiang, et al.. (2023). Lattice Enumeration with Discrete Pruning: Improvements, Cost Estimation and Optimal Parameters. Mathematics. 11(3). 766–766.
9.
Gu, Chunxiang, et al.. (2022). A Certificateless-Based Authentication and Key Agreement Scheme for IIoT Cross-Domain. Security and Communication Networks. 2022. 1–17. 7 indexed citations
10.
Ji, Li, et al.. (2021). LightSEEN: Real-Time Unknown Traffic Discovery via Lightweight Siamese Networks. Security and Communication Networks. 2021. 1–12. 2 indexed citations
12.
Hu, Xinyi, et al.. (2021). CBD: A Deep-Learning-Based Scheme for Encrypted Traffic Classification with a General Pre-Training Method. Sensors. 21(24). 8231–8231. 12 indexed citations
13.
Gu, Chunxiang, et al.. (2020). Protocol Reverse Engineering by Analysis of the Probability Distribution of Messages. 25. 73–76. 1 indexed citations
14.
Gu, Chunxiang, et al.. (2020). A Genetic Algorithm with Restart Strategy for Solving Approximate Shortest Vector Problem. 243–250. 1 indexed citations
15.
Zhu, Yuefei, et al.. (2013). A Framework for Automated Security Proof and its Application to OAEP. Journal of Networks. 8(3). 20 indexed citations
16.
Fei, Jinlong, et al.. (2012). A Framework for Automatic Security Proof of Public-Key Cryptography in Computational Model. 882–886. 1 indexed citations
17.
Gu, Chunxiang & Yuefei Zhu. (2010). New Efficient Searchable Encryption Schemes from Bilinear Pairings.. International journal of network security. 10. 25–31. 21 indexed citations
18.
Gu, Chunxiang, et al.. (2010). Automated security proof of the ElGamal encryption scheme. 950. V1–200. 1 indexed citations
19.
Gu, Chunxiang, et al.. (2006). A new ID-based proxy multi-signature scheme from bilinear pairings. Wuhan University Journal of Natural Sciences. 11(1). 193–197. 2 indexed citations
20.
Gu, Chunxiang, et al.. (2005). A formal model for the security of proxy signature schemes. Wuhan University Journal of Natural Sciences. 10(1). 275–278. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026