This map shows the geographic impact of Dawu Gu's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Dawu Gu with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Dawu Gu more than expected).
This network shows the impact of papers produced by Dawu Gu. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Dawu Gu. The network helps show where Dawu Gu may publish in the future.
Co-authorship network of co-authors of Dawu Gu
This figure shows the co-authorship network connecting the top 25 collaborators of Dawu Gu.
A scholar is included among the top collaborators of Dawu Gu based on the total number of
citations received by their joint publications. Widths of edges
represent the number of papers authors have co-authored together.
Node borders
signify the number of papers an author published with Dawu Gu. Dawu Gu is excluded from
the visualization to improve readability, since they are connected to all nodes in the network.
Wang, Jianqiang, Siqi Ma, Yuanyuan Zhang, et al.. (2019). NLP-EYE: detecting memory corruptions via semantic-aware memory operation function identification. Queensland's institutional digital repository (The University of Queensland).5 indexed citations
Ding, Ning, et al.. (2017). PAC Learning Depth-3 $\textrm{AC}^0$ Circuits of Bounded Top Fanin. 667–680.
12.
Ding, Xuhua, et al.. (2017). Seeing Through The Same Lens: Introspecting Guest Address Space At Native Speed. Singapore Management University Institutional Knowledge (InK) (Singapore Management University). 799–813.2 indexed citations
Ren, Yanli, et al.. (2015). Verifiable outsourcing private key generation algorithm in an identity-based encryption scheme. 36(11).2 indexed citations
16.
Delvaux, Jeroen, Dawu Gu, Dries Schellekens, & Ingrid Verbauwhede. (2014). Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible?. Lecture notes in computer science. 451–475.21 indexed citations
17.
Mouha, Nicky, Qingju Wang, Dawu Gu, & Bart Preneel. (2011). Differential and Linear Cryptanalysis using Mixed-Integer Linear Programming. Lecture notes in computer science. 7537. 57–76.5 indexed citations
18.
Gu, Dawu. (2008). Differential fault analysis on the SMS4 cipher by inducing faults to the key schedule. Journal of Communications.5 indexed citations
19.
Gu, Dawu. (2007). Study on the Secure Communication Technology of Skype and QQ.
20.
Gu, Dawu. (2004). An Identity-based Authenticated Group Key Agreement Scheme. Jisuanji gongcheng.1 indexed citations
Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive
bibliographic database. While OpenAlex provides broad and valuable coverage of the global
research landscape, it—like all bibliographic datasets—has inherent limitations. These include
incomplete records, variations in author disambiguation, differences in journal indexing, and
delays in data updates. As a result, some metrics and network relationships displayed in
Rankless may not fully capture the entirety of a scholar's output or impact.