Conghuan Ye

643 total citations · 2 hit papers
43 papers, 456 citations indexed

About

Conghuan Ye is a scholar working on Computer Vision and Pattern Recognition, Information Systems and Computer Networks and Communications. According to data from OpenAlex, Conghuan Ye has authored 43 papers receiving a total of 456 indexed citations (citations by other indexed papers that have themselves been cited), including 23 papers in Computer Vision and Pattern Recognition, 11 papers in Information Systems and 9 papers in Computer Networks and Communications. Recurrent topics in Conghuan Ye's work include Chaos-based Image/Signal Encryption (20 papers), Advanced Steganography and Watermarking Techniques (19 papers) and Digital Media Forensic Detection (8 papers). Conghuan Ye is often cited by papers focused on Chaos-based Image/Signal Encryption (20 papers), Advanced Steganography and Watermarking Techniques (19 papers) and Digital Media Forensic Detection (8 papers). Conghuan Ye collaborates with scholars based in China and United Kingdom. Conghuan Ye's co-authors include Zenggang Xiong, Xuemin Zhang, Fang Xu, Yuan Wu, Qiong Xu, Nan Xiao, Wei Feng, Guangwei Wang, Shi Li and Jun Wang and has published in prestigious journals such as Medical Physics, Biomedical Signal Processing and Control and Multimedia Tools and Applications.

In The Last Decade

Conghuan Ye

39 papers receiving 441 citations

Hit Papers

Integrating Fractional-Order Hopfield Neural Network with... 2025 2026 2025 2025 10 20 30

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Conghuan Ye China 10 200 101 63 52 40 43 456
K. Ganesan India 17 309 1.5× 138 1.4× 53 0.8× 42 0.8× 58 1.4× 49 700
Hakim El Fadili Morocco 13 241 1.2× 201 2.0× 56 0.9× 13 0.3× 135 3.4× 47 517
Jiayi Shi China 9 182 0.9× 163 1.6× 13 0.2× 18 0.3× 57 1.4× 23 459
Edy Winarno Indonesia 12 187 0.9× 169 1.7× 19 0.3× 145 2.8× 46 1.1× 74 488
Priti Maheshwary India 10 134 0.7× 93 0.9× 140 2.2× 71 1.4× 129 3.2× 29 503
Junhua Gu China 12 111 0.6× 237 2.3× 65 1.0× 63 1.2× 53 1.3× 50 418
Zhanshan Li China 13 145 0.7× 212 2.1× 50 0.8× 37 0.7× 12 0.3× 48 489
Hossein Nematzadeh Iran 14 307 1.5× 371 3.7× 40 0.6× 62 1.2× 24 0.6× 31 688
Chengwei Zhang China 12 151 0.8× 209 2.1× 127 2.0× 58 1.1× 53 1.3× 74 507

Countries citing papers authored by Conghuan Ye

Since Specialization
Citations

This map shows the geographic impact of Conghuan Ye's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Conghuan Ye with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Conghuan Ye more than expected).

Fields of papers citing papers by Conghuan Ye

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Conghuan Ye. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Conghuan Ye. The network helps show where Conghuan Ye may publish in the future.

Co-authorship network of co-authors of Conghuan Ye

This figure shows the co-authorship network connecting the top 25 collaborators of Conghuan Ye. A scholar is included among the top collaborators of Conghuan Ye based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Conghuan Ye. Conghuan Ye is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
2.
Feng, Wei, Keyuan Zhang, Jing Zhang, et al.. (2025). Integrating Fractional-Order Hopfield Neural Network with Differentiated Encryption: Achieving High-Performance Privacy Protection for Medical Images. Fractal and Fractional. 9(7). 426–426. 31 indexed citations breakdown →
3.
Zuo, Qiankun, et al.. (2025). Bidirectional generative diffusion model with cascaded symmetric attention for brain connectivity-to-connectivity translation. Biomedical Signal Processing and Control. 108. 107900–107900. 1 indexed citations
4.
Zuo, Qiankun, Jiaojiao Yu, Conghuan Ye, et al.. (2025). Spatiotemporal coarse‐to‐fine diffusion model for automatic brain network generation. Medical Physics. 52(7). e17833–e17833. 1 indexed citations
5.
Ye, Conghuan, Shenglong Tan, Jun Wang, et al.. (2025). Social Image Security with Encryption and Watermarking in Hybrid Domains. Entropy. 27(3). 276–276. 22 indexed citations breakdown →
6.
Ye, Conghuan, Shenglong Tan, Jun Wang, et al.. (2025). Double Security Level Protection Based on Chaotic Maps and SVD for Medical Images. Mathematics. 13(2). 182–182. 2 indexed citations
7.
Ye, Conghuan, Shenglong Tan, Zheng Wang, Binghua Shi, & Shi Li. (2023). Hybridized Hierarchical Watermarking and Selective Encryption for Social Image Security. Entropy. 25(7). 1031–1031. 1 indexed citations
8.
Xiong, Zenggang, et al.. (2021). Subspace Identification of Closed-Loop EIV System Based on Instrumental Variables Using Orthoprojection. Journal of Signal Processing Systems. 93(2-3). 345–355. 2 indexed citations
9.
Xiong, Zenggang, Nan Xiao, Fang Xu, et al.. (2020). An Equivalent Exchange Based Data Forwarding Incentive Scheme for Socially Aware Networks. Journal of Signal Processing Systems. 93(2-3). 249–263. 55 indexed citations
10.
Xiong, Zenggang, et al.. (2019). Research on Image Retrieval Algorithm Based on Combination of Color and Shape Features. Journal of Signal Processing Systems. 93(2-3). 139–146. 101 indexed citations
11.
Ye, Conghuan, et al.. (2016). Joint Fingerprinting and Encryption in the DWT Domain for Secure M2M Communication. International Journal of Security and Its Applications. 10(1). 125–138. 3 indexed citations
12.
Ye, Conghuan, et al.. (2016). A trust-based cloud computing access control model. International Journal of Knowledge-based and Intelligent Engineering Systems. 20(4). 197–203. 3 indexed citations
13.
Ye, Conghuan, et al.. (2016). Secure Social Multimedia Big Data Sharing Using Scalable JFE in the TSHWT Domain. ACM Transactions on Multimedia Computing Communications and Applications. 12(4s). 1–23. 6 indexed citations
14.
Zhang, Xuemin, et al.. (2015). Evaluation in Food Security Supervision System Based on Cloud Computing. Advance Journal of Food Science and Technology. 8(10). 704–706. 1 indexed citations
15.
Ye, Conghuan, et al.. (2015). Joint Fingerprinting and Encryption for JPEG Images Sharing in Mobile Social Network. 2015. 264–273. 1 indexed citations
16.
Ye, Conghuan, et al.. (2015). Joint Fingerprinting/Encryption for Medical Image Security. International Journal of Security and Its Applications. 9(1). 409–418. 8 indexed citations
17.
Ye, Conghuan, Hefei Ling, Fuhao Zou, & Zhengding Lu. (2013). A new fingerprinting scheme using social network analysis for majority attack. Telecommunication Systems. 54(3). 315–331. 11 indexed citations
19.
Ye, Conghuan, et al.. (2011). E-learning support service based on interaction among local campus clouds. 2005. 1–6. 3 indexed citations
20.
Ye, Conghuan, Hefei Ling, Fuhao Zou, & Zhengding Lu. (2010). Social Networks Based Fingerprint Code: SNBFC and Its Pirates Tracing Algorithm to Majority Attack. 26. 345–350. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026