Cong Tang

805 total citations
39 papers, 434 citations indexed

About

Cong Tang is a scholar working on Artificial Intelligence, Computer Vision and Pattern Recognition and Computer Networks and Communications. According to data from OpenAlex, Cong Tang has authored 39 papers receiving a total of 434 indexed citations (citations by other indexed papers that have themselves been cited), including 12 papers in Artificial Intelligence, 10 papers in Computer Vision and Pattern Recognition and 9 papers in Computer Networks and Communications. Recurrent topics in Cong Tang's work include Cryptography and Data Security (6 papers), EEG and Brain-Computer Interfaces (6 papers) and Privacy-Preserving Technologies in Data (5 papers). Cong Tang is often cited by papers focused on Cryptography and Data Security (6 papers), EEG and Brain-Computer Interfaces (6 papers) and Privacy-Preserving Technologies in Data (5 papers). Cong Tang collaborates with scholars based in China, Greece and United Kingdom. Cong Tang's co-authors include Anastasios Bezerianos, Hongtao Wang, Keith Ross, Ratan Dey, Nitesh Saxena, Xing Yang, Tao Xu, Ting Li, Jingru Sun and Jianbin Hu and has published in prestigious journals such as IEEE Access, Sustainability and Separation and Purification Technology.

In The Last Decade

Cong Tang

36 papers receiving 407 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Cong Tang China 11 119 95 92 91 71 39 434
Vikas Khullar India 14 82 0.7× 179 1.9× 61 0.7× 66 0.7× 72 1.0× 88 661
Minh-Son Dao Japan 12 42 0.4× 156 1.6× 228 2.5× 60 0.7× 51 0.7× 101 517
Daniel Takabi United States 10 64 0.5× 273 2.9× 78 0.8× 44 0.5× 41 0.6× 23 537
Amitabha Chakrabarty Bangladesh 16 28 0.2× 203 2.1× 132 1.4× 117 1.3× 99 1.4× 85 760
Ran Tao China 13 78 0.7× 56 0.6× 74 0.8× 39 0.4× 55 0.8× 44 444
Muharram Mansoorizadeh Iran 12 39 0.3× 178 1.9× 151 1.6× 59 0.6× 35 0.5× 47 522
Kris Vanhecke Belgium 12 48 0.4× 38 0.4× 79 0.9× 87 1.0× 99 1.4× 35 462
Hela Ltifi Tunisia 13 45 0.4× 156 1.6× 144 1.6× 38 0.4× 43 0.6× 64 424
Hassan Hajjdiab United Arab Emirates 15 149 1.3× 64 0.7× 88 1.0× 143 1.6× 68 1.0× 48 557
Md. Manjur Ahmed Malaysia 9 94 0.8× 137 1.4× 59 0.6× 57 0.6× 46 0.6× 23 365

Countries citing papers authored by Cong Tang

Since Specialization
Citations

This map shows the geographic impact of Cong Tang's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Cong Tang with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Cong Tang more than expected).

Fields of papers citing papers by Cong Tang

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Cong Tang. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Cong Tang. The network helps show where Cong Tang may publish in the future.

Co-authorship network of co-authors of Cong Tang

This figure shows the co-authorship network connecting the top 25 collaborators of Cong Tang. A scholar is included among the top collaborators of Cong Tang based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Cong Tang. Cong Tang is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Liu, Yi‐Sheng, Cong Tang, Xingdong Qiu, et al.. (2025). Effect of shale surface wettability on the CO2 huff-n-puff behavior in oil-bearing nanopores: A molecular dynamics study. Separation and Purification Technology. 373. 133574–133574. 1 indexed citations
2.
Tang, Cong, et al.. (2021). Malware Detection Model Based on Deep Convolution Generation Adversarial Network. Journal of Physics Conference Series. 1738(1). 12110–12110. 1 indexed citations
3.
Wang, Hongtao, Tao Xu, Cong Tang, et al.. (2020). Diverse Feature Blend Based on Filter-Bank Common Spatial Pattern and Brain Functional Connectivity for Multiple Motor Imagery Detection. IEEE Access. 8. 155590–155601. 25 indexed citations
4.
Wang, Hongtao, Cong Tang, Tao Xu, et al.. (2020). An Approach of One-vs-Rest Filter Bank Common Spatial Pattern and Spiking Neural Networks for Multiple Motor Imagery Decoding. IEEE Access. 8. 86850–86861. 31 indexed citations
5.
Lu, Wenbo, et al.. (2020). A fast top-k group skyline query method based on skyline layer. 146–151. 1 indexed citations
6.
Zhang, Hong, et al.. (2020). A Request-level Guaranteed Delivery Advertising Planning. 2980–2988. 9 indexed citations
7.
Sun, Jingru, et al.. (2020). Protecting Compressive Ghost Imaging with Hyperchaotic System and DNA Encoding. Complexity. 2020. 1–13. 13 indexed citations
8.
Tang, Cong, Jingru Sun, & Yichuang Sun. (2020). Dynamic Spatial-Temporal Graph Attention Graph Convolutional Network for Short-Term Traffic Flow Forecasting. 1–5. 3 indexed citations
10.
Zhang, Tao, et al.. (2017). On Scaling and Accelerating Decentralized Private Blockchains. 19 indexed citations
11.
Tang, Cong, et al.. (2017). The Object Detection Based on Deep Learning. 723–728. 35 indexed citations
12.
Huang, Jiejun, et al.. (2017). Double iterative optimal dictionary learning-based SAR image filtering method. Signal Image and Video Processing. 12(4). 783–790. 3 indexed citations
13.
Chen, Zhong, et al.. (2017). Versatile routing and self-certifying features support for secure mobility in expressive internet architecture. China Communications. 14(4). 73–88. 2 indexed citations
15.
Li, Zhou, Cong Tang, Jianbin Hu, & Zhong Chen. (2015). Vulnerabilities Scoring Approach for Cloud SaaS. 2 indexed citations
16.
Wei, Xin, Cong Tang, Tao Yang, Huiping Sun, & Zhong Chen. (2012). Towards privacy-preserving RFID-based location-based services. 2827–2831.
17.
Hu, Jianbin, Hu Xiong, Zhi Guan, et al.. (2011). Yet Another Certificateless Three-Party Authenticated Key Agreement Protocol. 3. 222–226. 1 indexed citations
18.
Deng, Yong, et al.. (2010). A Hybrid Movie Recommender Based on Ontology and Neural Networks. 846–851. 7 indexed citations
19.
Cai, Zhuhua, et al.. (2009). Evaluating Network Security With Two-Layer Attack Graphs. 127–136. 24 indexed citations
20.
Tang, Cong, Ruichuan Chen, Zhuhua Cai, et al.. (2009). SKIP: A Secure Key Issuing Scheme for Peer-to-Peer Networks. 1. 296–302. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026