Cong Peng

882 total citations
52 papers, 525 citations indexed

About

Cong Peng is a scholar working on Artificial Intelligence, Information Systems and Computer Networks and Communications. According to data from OpenAlex, Cong Peng has authored 52 papers receiving a total of 525 indexed citations (citations by other indexed papers that have themselves been cited), including 39 papers in Artificial Intelligence, 31 papers in Information Systems and 16 papers in Computer Networks and Communications. Recurrent topics in Cong Peng's work include Cryptography and Data Security (33 papers), Privacy-Preserving Technologies in Data (17 papers) and Blockchain Technology Applications and Security (15 papers). Cong Peng is often cited by papers focused on Cryptography and Data Security (33 papers), Privacy-Preserving Technologies in Data (17 papers) and Blockchain Technology Applications and Security (15 papers). Cong Peng collaborates with scholars based in China, Hong Kong and United States. Cong Peng's co-authors include Debiao He, Min Luo, Pandi Vijayakumar, Jianhua Chen, Ming Zhao, Qian Zhang, Muhammad Khurram Khan, Huaqun Wang, Zijian Bao and Weijia Jia and has published in prestigious journals such as SHILAP Revista de lepidopterología, IEEE Transactions on Wireless Communications and IEEE Transactions on Vehicular Technology.

In The Last Decade

Cong Peng

47 papers receiving 508 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Cong Peng China 13 283 257 195 192 45 52 525
Carlos Colman-Meixner Italy 14 384 1.4× 116 0.5× 232 1.2× 146 0.8× 38 0.8× 24 581
Yan-Ming Lai Taiwan 11 321 1.1× 199 0.8× 233 1.2× 230 1.2× 65 1.4× 19 465
Vankamamidi S. Naresh India 12 194 0.7× 161 0.6× 74 0.4× 124 0.6× 34 0.8× 51 380
Ruei‐Hau Hsu Taiwan 13 273 1.0× 230 0.9× 111 0.6× 197 1.0× 38 0.8× 29 431
Ao Xiong China 11 222 0.8× 109 0.4× 116 0.6× 159 0.8× 24 0.5× 46 411
Hyoung-Kee Choi South Korea 12 379 1.3× 136 0.5× 224 1.1× 104 0.5× 30 0.7× 41 464
Mohammad‐Reza Sadeghi Iran 15 358 1.3× 263 1.0× 342 1.8× 115 0.6× 26 0.6× 67 626
Yuanyuan Sun China 10 155 0.5× 133 0.5× 112 0.6× 105 0.5× 38 0.8× 28 349
Yacine Rebahi Germany 12 333 1.2× 126 0.5× 161 0.8× 97 0.5× 34 0.8× 44 436
Bing Luo China 14 332 1.2× 386 1.5× 222 1.1× 142 0.7× 31 0.7× 45 681

Countries citing papers authored by Cong Peng

Since Specialization
Citations

This map shows the geographic impact of Cong Peng's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Cong Peng with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Cong Peng more than expected).

Fields of papers citing papers by Cong Peng

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Cong Peng. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Cong Peng. The network helps show where Cong Peng may publish in the future.

Co-authorship network of co-authors of Cong Peng

This figure shows the co-authorship network connecting the top 25 collaborators of Cong Peng. A scholar is included among the top collaborators of Cong Peng based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Cong Peng. Cong Peng is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Li, Jin, Hongyang Yan, Arthur Sandor Voundi Koe, et al.. (2024). Self-sovereign identity management in ciphertext policy attribute based encryption for IoT protocols. Journal of Information Security and Applications. 86. 103885–103885. 5 indexed citations
2.
Li, Mengze, et al.. (2024). High-speed batch verification for discrete-logarithm-based signatures via Multi-Scalar Multiplication Algorithm. Journal of Information Security and Applications. 87. 103898–103898. 2 indexed citations
3.
Liu, Yang, Debiao He, Min Luo, Lianhai Wang, & Cong Peng. (2024). k-TEVS: A k-Times E-Voting Scheme on Blockchain With Supervision. IEEE Transactions on Dependable and Secure Computing. 22(3). 2326–2337.
4.
Peng, Cong, et al.. (2024). Ciphertext Range Query Scheme Against Agent Transfer and Permission Extension Attacks for Cloud Computing. IEEE Internet of Things Journal. 11(10). 17975–17988. 1 indexed citations
5.
Peng, Cong, et al.. (2024). An Efficient Delegatable Order-Revealing Encryption Scheme for Multi-User Range Queries. IEEE Transactions on Cloud Computing. 13(1). 75–86. 1 indexed citations
6.
Zhu, Guocheng, et al.. (2023). The governance technology for blockchain systems: a survey. Frontiers of Computer Science. 18(2). 7 indexed citations
7.
He, Debiao, et al.. (2023). An Efficient Decentralized Identity Management System Based on Range Proof for Social Networks. SHILAP Revista de lepidopterología. 4. 84–96. 6 indexed citations
8.
Bao, Zijian, Debiao He, Cong Peng, Min Luo, & Kim‐Kwang Raymond Choo. (2023). An Identity-Based Adaptor Signature Scheme and its Applications in the Blockchain System. SHILAP Revista de lepidopterología. 4. 231–242. 2 indexed citations
9.
Luo, Min, et al.. (2023). A Certificateless Anonymous Authentication Scheme for VANETs Based on Ring Signature. Journal of Circuits Systems and Computers. 33(3). 3 indexed citations
10.
He, Debiao, et al.. (2023). Two-Party Adaptor Signature Scheme Based on IEEE P1363 Identity-Based Signature. IEEE Open Journal of the Communications Society. 4. 2717–2728. 1 indexed citations
11.
Bao, Zijian, Debiao He, Huaqun Wang, Min Luo, & Cong Peng. (2023). BAP: A Blockchain-Assisted Privacy-Preserving Authentication Protocol With User-Controlled Data Linkability for VANETs. IEEE Transactions on Intelligent Vehicles. 9(2). 4206–4220. 13 indexed citations
12.
He, Debiao, et al.. (2022). The Applications of Blockchain in the Covert Communication. Wireless Communications and Mobile Computing. 2022(1). 6 indexed citations
13.
Luo, Min, et al.. (2022). IsoqurPEKS: An Isogeny-Based Quantum-Resistant Public-Key Encryption Scheme with Keyword Search. Security and Communication Networks. 2022. 1–13.
14.
Luo, Min, et al.. (2022). A Security-Enhanced Pairing-Free Certificateless Aggregate Signature for Vehicular Ad-Hoc Networks. IEEE Systems Journal. 17(3). 3822–3833. 14 indexed citations
15.
Luo, Min, et al.. (2022). Efficient certificateless designated verifier proxy signature scheme using UAV network for sustainable smart city. Sustainable Cities and Society. 80. 103771–103771. 17 indexed citations
16.
Peng, Cong, Jianhua Chen, Lu Zhou, Kim‐Kwang Raymond Choo, & Debiao He. (2020). CsiIBS: A post-quantum identity-based signature scheme based on isogenies. Journal of Information Security and Applications. 54. 102504–102504. 6 indexed citations
18.
Peng, Cong, Jianhua Chen, Sherali Zeadally, & Debiao He. (2019). Isogeny-Based Cryptography: A Promising Post-Quantum Technique. IT Professional. 21(6). 27–32. 15 indexed citations
19.
Chen, Xiang, et al.. (2007). Osseointegration and biomechanical properties of the onplant system. American Journal of Orthodontics and Dentofacial Orthopedics. 132(3). 278.e1–278.e6. 8 indexed citations
20.
Peng, Cong, Fan Yang, Qian Zhang, et al.. (2006). Impact of Power and Rate Selection on the Throughput of Ad Hoc Networks. 2006 IEEE International Conference on Communications. 3897–3902. 10 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026