Danping Shi

527 total citations
14 papers, 41 citations indexed

About

Danping Shi is a scholar working on Artificial Intelligence, Computer Vision and Pattern Recognition and Hardware and Architecture. According to data from OpenAlex, Danping Shi has authored 14 papers receiving a total of 41 indexed citations (citations by other indexed papers that have themselves been cited), including 13 papers in Artificial Intelligence, 6 papers in Computer Vision and Pattern Recognition and 5 papers in Hardware and Architecture. Recurrent topics in Danping Shi's work include Cryptographic Implementations and Security (12 papers), Coding theory and cryptography (8 papers) and Chaos-based Image/Signal Encryption (6 papers). Danping Shi is often cited by papers focused on Cryptographic Implementations and Security (12 papers), Coding theory and cryptography (8 papers) and Chaos-based Image/Signal Encryption (6 papers). Danping Shi collaborates with scholars based in China, Japan and Belgium. Danping Shi's co-authors include Siwei Sun, Ling Song, Lei Hu, Kexin Qiao, Xiaoshuang Ma, Lei Hu, Yu Sasaki, L. Sun, Siwei Sun and Yingjie Zhang and has published in prestigious journals such as SHILAP Revista de lepidopterología, The Computer Journal and Science China Information Sciences.

In The Last Decade

Danping Shi

10 papers receiving 41 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Danping Shi China 4 39 30 8 3 3 14 41
Eik List Germany 4 37 0.9× 27 0.9× 4 0.5× 7 2.3× 5 1.7× 15 39
Shangyu Chen Singapore 5 39 1.0× 39 1.3× 3 0.4× 2 0.7× 6 2.0× 5 54
Maki Shigeri Japan 5 40 1.0× 24 0.8× 9 1.1× 6 2.0× 4 1.3× 9 42
Prakash Dey India 4 42 1.1× 30 1.0× 15 1.9× 8 2.7× 2 0.7× 8 49
Souradyuti Paul India 4 30 0.8× 23 0.8× 4 0.5× 3 1.0× 3 1.0× 11 35
Mathieu Renauld Belgium 4 19 0.5× 12 0.4× 13 1.6× 1 0.3× 2 0.7× 4 20
Aline Gouget France 4 47 1.2× 26 0.9× 17 2.1× 5 1.7× 4 1.3× 6 48
Houssem Maghrebi France 5 40 1.0× 16 0.5× 23 2.9× 12 4.0× 5 1.7× 7 41
Yisong Xiao China 5 34 0.9× 25 0.8× 3 0.4× 3 1.0× 1 0.3× 10 59

Countries citing papers authored by Danping Shi

Since Specialization
Citations

This map shows the geographic impact of Danping Shi's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Danping Shi with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Danping Shi more than expected).

Fields of papers citing papers by Danping Shi

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Danping Shi. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Danping Shi. The network helps show where Danping Shi may publish in the future.

Co-authorship network of co-authors of Danping Shi

This figure shows the co-authorship network connecting the top 25 collaborators of Danping Shi. A scholar is included among the top collaborators of Danping Shi based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Danping Shi. Danping Shi is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

14 of 14 papers shown
1.
Chen, I‐Ming, et al.. (2025). Optimization Strategy for Underwater Target Recognition Based on Multi-Domain Feature Fusion and Deep Learning. Journal of Marine Science and Engineering. 13(7). 1311–1311.
2.
Yang, Qianqian, Ling Song, Danping Shi, et al.. (2024). Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery. Journal of Cryptology. 37(2). 2 indexed citations
3.
Shi, Danping, et al.. (2024). Utilizing FWT in linear cryptanalysis of block ciphers with various structures. Designs Codes and Cryptography. 92(11). 3813–3842.
4.
Song, Ling, et al.. (2022). New Properties of the Double Boomerang Connectivity Table. IACR Transactions on Symmetric Cryptology. 208–242. 6 indexed citations
5.
Shi, Danping, et al.. (2022). Automatic Demirci–Selçuk Meet-In-The-Middle Attack On SIMON. The Computer Journal. 66(12). 3052–3068.
6.
Saha, Dhiman, et al.. (2020). On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis. IACR Transactions on Symmetric Cryptology. 152–174. 6 indexed citations
7.
Saha, Dhiman, et al.. (2020). On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis. SHILAP Revista de lepidopterología.
8.
Guo, Hao, Siwei Sun, Danping Shi, et al.. (2020). Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions. SHILAP Revista de lepidopterología. 2 indexed citations
9.
Sun, Siwei, et al.. (2020). Lightweight Iterative MDS Matrices: How Small Can We Go?. IACR Transactions on Symmetric Cryptology. 147–170. 3 indexed citations
10.
Guo, Hao, Siwei Sun, Danping Shi, et al.. (2020). Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions. IACR Transactions on Symmetric Cryptology. 119–151. 8 indexed citations
11.
Hu, Lei, et al.. (2018). On the Complexity of Impossible Differential Cryptanalysis. Security and Communication Networks. 2018. 1–11. 1 indexed citations
12.
Shi, Danping, Lei Hu, Siwei Sun, et al.. (2016). Improved linear (hull) cryptanalysis of round-reduced versions of SIMON. Science China Information Sciences. 60(3). 9 indexed citations
13.
Shi, Danping, Lei Hu, Siwei Sun, & Ling Song. (2016). Linear(hull) Cryptanalysis of Round-reduced Versions of KATAN. 364–371. 3 indexed citations
14.
Shi, Danping, Lei Hu, Ling Song, & Siwei Sun. (2015). Differential fault attack on Zorro block cipher. Security and Communication Networks. 8(16). 2826–2835. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026