Dajiang Chen

2.2k total citations
58 papers, 1.5k citations indexed

About

Dajiang Chen is a scholar working on Electrical and Electronic Engineering, Computer Networks and Communications and Artificial Intelligence. According to data from OpenAlex, Dajiang Chen has authored 58 papers receiving a total of 1.5k indexed citations (citations by other indexed papers that have themselves been cited), including 24 papers in Electrical and Electronic Engineering, 20 papers in Computer Networks and Communications and 20 papers in Artificial Intelligence. Recurrent topics in Dajiang Chen's work include Wireless Communication Security Techniques (15 papers), IoT and Edge/Fog Computing (8 papers) and Chaos-based Image/Signal Encryption (8 papers). Dajiang Chen is often cited by papers focused on Wireless Communication Security Techniques (15 papers), IoT and Edge/Fog Computing (8 papers) and Chaos-based Image/Signal Encryption (8 papers). Dajiang Chen collaborates with scholars based in China, Canada and United States. Dajiang Chen's co-authors include Ning Zhang, Xuemin Shen, Zhiguang Qin, Zhen Qin, Peng Yang, Laha Ale, Kuan Zhang, Huici Wu, Tao Han and Xufei Mao and has published in prestigious journals such as IEEE Access, IEEE Journal on Selected Areas in Communications and IEEE Transactions on Wireless Communications.

In The Last Decade

Dajiang Chen

53 papers receiving 1.5k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Dajiang Chen China 21 661 508 506 388 284 58 1.5k
Penglin Dai China 24 937 1.4× 583 1.1× 462 0.9× 293 0.8× 264 0.9× 69 1.8k
Imran Memon China 23 500 0.8× 653 1.3× 508 1.0× 276 0.7× 203 0.7× 62 1.4k
Xiaoqiang Ma China 27 939 1.4× 742 1.5× 343 0.7× 265 0.7× 461 1.6× 76 1.9k
Jean‐Luc Gaudiot United States 22 1.0k 1.5× 405 0.8× 410 0.8× 442 1.1× 271 1.0× 183 2.0k
Guangtao Xue China 25 1.1k 1.6× 667 1.3× 533 1.1× 467 1.2× 305 1.1× 169 2.2k
Chu‐Sing Yang Taiwan 22 898 1.4× 546 1.1× 370 0.7× 399 1.0× 301 1.1× 150 1.7k
Chai Kiat Yeo Singapore 26 1.4k 2.1× 650 1.3× 663 1.3× 314 0.8× 233 0.8× 223 2.6k
Mahdi Zareei Mexico 25 1.0k 1.5× 721 1.4× 404 0.8× 286 0.7× 159 0.6× 91 1.8k
Xiaolong Xu China 20 598 0.9× 168 0.3× 563 1.1× 356 0.9× 160 0.6× 173 1.5k

Countries citing papers authored by Dajiang Chen

Since Specialization
Citations

This map shows the geographic impact of Dajiang Chen's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Dajiang Chen with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Dajiang Chen more than expected).

Fields of papers citing papers by Dajiang Chen

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Dajiang Chen. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Dajiang Chen. The network helps show where Dajiang Chen may publish in the future.

Co-authorship network of co-authors of Dajiang Chen

This figure shows the co-authorship network connecting the top 25 collaborators of Dajiang Chen. A scholar is included among the top collaborators of Dajiang Chen based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Dajiang Chen. Dajiang Chen is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Yuan, Lei, et al.. (2025). DPCTS: Dual-Perspective Cross-Client Trust Scoring for Robust Backdoor Defense of Federated Learning Over 6G Networks. IEEE Transactions on Network Science and Engineering. 13. 5262–5280.
2.
Wu, Qiong, et al.. (2025). TMAE: Entropy-Aware Masked Autoencoder for Low-Cost Traffic Flow Map Inference. IEEE Internet of Things Journal. 12(14). 27255–27268.
3.
Chen, Dajiang, et al.. (2025). Edge-Adaptive Dynamic Scalable Convolution for Efficient Remote Mobile Pathology Analysis. ACM Transactions on Autonomous and Adaptive Systems. 20(4). 1–24.
4.
Chen, Dajiang, et al.. (2024). MFSSE: Multi-Keyword Fuzzy Ranked Symmetric Searchable Encryption With Pattern Hidden in Mobile Cloud Computing. IEEE Transactions on Cloud Computing. 12(4). 1042–1057. 4 indexed citations
5.
Chen, Dajiang, et al.. (2024). Privacy-Preserving Anomaly Detection of Encrypted Smart Contract for Blockchain-Based Data Trading. IEEE Transactions on Dependable and Secure Computing. 21(5). 4510–4525. 12 indexed citations
6.
Wu, Huici, et al.. (2024). Anti-Quantum Certificateless Group Authentication for Massive Accessing IoT Devices. IEEE Internet of Things Journal. 11(9). 16561–16577. 8 indexed citations
7.
Zhang, Fengli, et al.. (2024). LsiA3CS: Deep-Reinforcement-Learning-Based Cloud–Edge Collaborative Task Scheduling in Large-Scale IIoT. IEEE Internet of Things Journal. 11(13). 23917–23930. 11 indexed citations
8.
Ale, Laha, Ning Zhang, Scott A. King, & Dajiang Chen. (2024). Empowering generative AI through mobile edge computing. 1(7). 478–486. 22 indexed citations
9.
Chen, Dajiang, et al.. (2023). Flexible and Fine-Grained Access Control for EHR in Blockchain-Assisted E-Healthcare Systems. IEEE Internet of Things Journal. 11(6). 10992–11007. 12 indexed citations
10.
Chen, Dajiang, Ning Zhang, Xuyun Nie, et al.. (2022). Privacy-Preserving Encrypted Traffic Inspection With Symmetric Cryptographic Techniques in IoT. IEEE Internet of Things Journal. 9(18). 17265–17279. 33 indexed citations
11.
Zhou, Fan, et al.. (2022). Reservoir Inflow Forecasting in Hydropower Industry: A Generative Flow-Based Approach. IEEE Transactions on Industrial Informatics. 19(2). 1196–1206. 6 indexed citations
12.
Ding, Yi, et al.. (2022). MallesNet: A multi-object assistance based network for brachial plexus segmentation in ultrasound images. Medical Image Analysis. 80. 102511–102511. 15 indexed citations
13.
Ding, Yi, et al.. (2022). RLSegNet: An Medical Image Segmentation Network Based on Reinforcement Learning. IEEE/ACM Transactions on Computational Biology and Bioinformatics. 20(4). 2565–2576. 10 indexed citations
14.
Wu, Huici, et al.. (2021). Differential Game Approach for Attack-Defense Strategy Analysis in Internet of Things Networks. IEEE Internet of Things Journal. 9(12). 10340–10353. 26 indexed citations
15.
Chen, Dajiang, et al.. (2020). MAGLeak: A Learning-Based Side-Channel Attack for Password Recognition With Multiple Sensors in IIoT Environment. IEEE Transactions on Industrial Informatics. 18(1). 467–476. 36 indexed citations
16.
Ale, Laha, Ning Zhang, Huici Wu, Dajiang Chen, & Tao Han. (2019). Online Proactive Caching in Mobile Edge Computing Using Bidirectional Deep Recurrent Neural Network. IEEE Internet of Things Journal. 6(3). 5520–5530. 153 indexed citations
17.
Chen, Dajiang, Ning Zhang, Nan Cheng, et al.. (2018). Physical Layer based Message Authentication with Secure Channel Codes. IEEE Transactions on Dependable and Secure Computing. 17(5). 1079–1093. 46 indexed citations
18.
Qin, Zhen, Jianfei Sun, Dajiang Chen, & Hu Xiong. (2017). Flexible and Lightweight Access Control for Online Healthcare Social Networks in the Context of the Internet of Things. Mobile Information Systems. 2017. 1–15. 8 indexed citations
19.
Huang, Yaodong, et al.. (2016). DCIL: Devices Collaboration Indoor Localization with Soft AP.. Ad Hoc & Sensor Wireless Networks. 30. 47–64. 3 indexed citations
20.
Chen, Dajiang, Shaoquan Jiang, & Zhiguang Qin. (2013). Rate Efficient Authentication over a Wiretap Channel.. arXiv (Cornell University). 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026