Fang−Yie Leu

1.9k total citations
129 papers, 1.1k citations indexed

About

Fang−Yie Leu is a scholar working on Computer Networks and Communications, Artificial Intelligence and Information Systems. According to data from OpenAlex, Fang−Yie Leu has authored 129 papers receiving a total of 1.1k indexed citations (citations by other indexed papers that have themselves been cited), including 82 papers in Computer Networks and Communications, 37 papers in Artificial Intelligence and 35 papers in Information Systems. Recurrent topics in Fang−Yie Leu's work include Advanced Authentication Protocols Security (19 papers), Chaos-based Image/Signal Encryption (15 papers) and Cryptography and Data Security (14 papers). Fang−Yie Leu is often cited by papers focused on Advanced Authentication Protocols Security (19 papers), Chaos-based Image/Signal Encryption (15 papers) and Cryptography and Data Security (14 papers). Fang−Yie Leu collaborates with scholars based in Taiwan, South Korea and Indonesia. Fang−Yie Leu's co-authors include Kun-Lin Tsai, Ilsun You, Yi‐Li Huang, Chao‐Tung Yang, Li‐Ling Hung, Ying-ping Chen, Szu‐Yin Lin, Ming‐Chang Lee, Cheng-Han Tsai and Kim‐Kwang Raymond Choo and has published in prestigious journals such as SHILAP Revista de lepidopterología, IEEE Access and International Journal of Information Management.

In The Last Decade

Fang−Yie Leu

122 papers receiving 1.1k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Fang−Yie Leu Taiwan 16 667 357 307 284 168 129 1.1k
Mohammad Ayoub Khan Saudi Arabia 20 617 0.9× 412 1.2× 337 1.1× 394 1.4× 129 0.8× 67 1.5k
Xiang-Yang Li China 20 722 1.1× 538 1.5× 432 1.4× 221 0.8× 177 1.1× 40 1.8k
Anwar Ghani Pakistan 19 663 1.0× 170 0.5× 357 1.2× 562 2.0× 105 0.6× 79 1.2k
B. D. Deebak India 21 782 1.2× 207 0.6× 362 1.2× 679 2.4× 113 0.7× 51 1.3k
George Oikonomou United Kingdom 24 1.1k 1.6× 430 1.2× 321 1.0× 343 1.2× 261 1.6× 113 1.6k
Erkki Harjula Finland 21 1.1k 1.7× 319 0.9× 183 0.6× 489 1.7× 151 0.9× 85 1.5k
Doan B. Hoang Australia 17 823 1.2× 303 0.8× 147 0.5× 343 1.2× 114 0.7× 137 1.1k
Sohail Abbas United Arab Emirates 19 623 0.9× 262 0.7× 250 0.8× 200 0.7× 67 0.4× 61 1.0k
Rashid Amin Pakistan 22 900 1.3× 225 0.6× 525 1.7× 470 1.7× 230 1.4× 66 1.7k

Countries citing papers authored by Fang−Yie Leu

Since Specialization
Citations

This map shows the geographic impact of Fang−Yie Leu's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Fang−Yie Leu with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Fang−Yie Leu more than expected).

Fields of papers citing papers by Fang−Yie Leu

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Fang−Yie Leu. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Fang−Yie Leu. The network helps show where Fang−Yie Leu may publish in the future.

Co-authorship network of co-authors of Fang−Yie Leu

This figure shows the co-authorship network connecting the top 25 collaborators of Fang−Yie Leu. A scholar is included among the top collaborators of Fang−Yie Leu based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Fang−Yie Leu. Fang−Yie Leu is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Tsai, Kun-Lin, et al.. (2024). Time Parameter Based Low-Energy Data Encryption Method for Mobile Applications. Computer Modeling in Engineering & Sciences. 140(3). 2779–2794. 1 indexed citations
2.
Susanto, Heru, et al.. (2019). Business Process Reengineering: An ICT Approach. CERN Document Server (European Organization for Nuclear Research). 2 indexed citations
3.
5.
Huang, Yi‐Li, Fang−Yie Leu, Jung‐Chun Liu, et al.. (2015). A Secure Authentication System for Controlling Traffic Lights for Ambulances. 網際網路技術學刊. 16(1). 19–33. 2 indexed citations
6.
Lin, Jeng-Wei, et al.. (2015). GA-SVM modeling of multiclass seizure detector in epilepsy analysis system using cloud computing. Soft Computing. 21(8). 2139–2149. 8 indexed citations
7.
Leu, Fang−Yie, et al.. (2015). Constructing Military Smartphone Usage Criterion of Cloud-DEFSOP for Mobile Security. 2. 420–425. 2 indexed citations
8.
You, Ilsun, et al.. (2014). A Secure Wireless Communication System Integrating PRNG and Diffie-Hellman PKDS by Using a Data Connection Core. 網際網路技術學刊. 15(5). 713–726. 1 indexed citations
9.
Leu, Fang−Yie, et al.. (2014). A Grid System Detecting Internal Malicious Behaviors at System Call Level.. 4. 14–24. 1 indexed citations
10.
Tsai, Kun-Lin, et al.. (2014). A Group File Encryption Method using Dynamic System Environment Key. 1. 476–483. 1 indexed citations
11.
Chen, Chin‐Ling, et al.. (2014). Designing A Healthcare Authorization Model Based On Cloud Authentication. Intelligent Automation & Soft Computing. 20(3). 365–379. 12 indexed citations
12.
Huang, Yi‐Li, Chu‐Hsing Lin, & Fang−Yie Leu. (2012). A Batch Verification Scheme by Using the Matrix-Detection Algorithm. 網際網路技術學刊. 13(4). 681–690. 1 indexed citations
13.
Leu, Fang−Yie, et al.. (2012). A rate-allocation based multi-path control scheme for event-driven wireless sensor networks on constant event packet rates.. Computer Systems: Science & Engineering. 27. 295–315. 1 indexed citations
14.
Huang, Yi‐Li, et al.. (2012). A Secure Communication over Wireless Environments by Using a Data Connection Core. 2. 570–575. 1 indexed citations
15.
Leu, Fang−Yie, et al.. (2011). A handover security mechanism employing the Diffie-Hellman key exchange approach for the IEEE802.16e wireless networks. ˜The œMissouri review. 7(3). 241–269. 11 indexed citations
16.
Leu, Fang−Yie, Ilsun You, & Feilong Tang. (2011). Emerging Wireless and Mobile Technologies. SHILAP Revista de lepidopterología. 4 indexed citations
17.
Leu, Fang−Yie, et al.. (2010). A DoS/DDoS Attack Detection System Using Chi-Square Statistic Approach. SHILAP Revista de lepidopterología. 6 indexed citations
19.
Leu, Fang−Yie, et al.. (2010). An Automated Term Definition Extraction System Using the Web Corpus in the Chinese Language. Journal of information science and engineering. 26(2). 505–525. 3 indexed citations
20.
Leu, Fang−Yie, et al.. (2005). Predicting vertebrate promoters with heterogeneous cluster computing.. 143–148.

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026