Fenghua Li

1.6k total citations
95 papers, 1.1k citations indexed

About

Fenghua Li is a scholar working on Artificial Intelligence, Computer Networks and Communications and Information Systems. According to data from OpenAlex, Fenghua Li has authored 95 papers receiving a total of 1.1k indexed citations (citations by other indexed papers that have themselves been cited), including 54 papers in Artificial Intelligence, 36 papers in Computer Networks and Communications and 21 papers in Information Systems. Recurrent topics in Fenghua Li's work include Privacy-Preserving Technologies in Data (27 papers), Cryptography and Data Security (19 papers) and Internet Traffic Analysis and Secure E-voting (14 papers). Fenghua Li is often cited by papers focused on Privacy-Preserving Technologies in Data (27 papers), Cryptography and Data Security (19 papers) and Internet Traffic Analysis and Secure E-voting (14 papers). Fenghua Li collaborates with scholars based in China, United States and Canada. Fenghua Li's co-authors include Hui–Ming Cheng, Ge Su, Qiang Cai, Hui Li, M. S. Dresselhaus, Boyang Wang, Ben Niu, Ping‐Heng Tan, Baochun Li and C. Y. Hu and has published in prestigious journals such as SHILAP Revista de lepidopterología, Applied Physics Letters and Carbon.

In The Last Decade

Fenghua Li

78 papers receiving 1.1k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Fenghua Li China 18 373 372 225 189 144 95 1.1k
Wenhao Zhu China 22 495 1.3× 369 1.0× 182 0.8× 81 0.4× 139 1.0× 133 1.8k
Siguang Chen China 16 301 0.8× 139 0.4× 168 0.7× 346 1.8× 70 0.5× 68 993
Brian R. Burg Switzerland 20 333 0.9× 259 0.7× 404 1.8× 153 0.8× 299 2.1× 50 1.4k
Weining Zhang China 16 226 0.6× 200 0.5× 101 0.4× 131 0.7× 142 1.0× 65 976
Shu Gao China 13 111 0.3× 166 0.4× 81 0.4× 100 0.5× 102 0.7× 62 674
Tao Xiang China 21 230 0.6× 161 0.4× 136 0.6× 93 0.5× 91 0.6× 72 1.1k
Yuanchun Li China 18 178 0.5× 229 0.6× 171 0.8× 195 1.0× 79 0.5× 83 1.0k
Zhu Zhang China 21 372 1.0× 260 0.7× 96 0.4× 33 0.2× 243 1.7× 94 2.1k
Zhenhua Wang China 14 138 0.4× 167 0.4× 184 0.8× 87 0.5× 104 0.7× 43 765

Countries citing papers authored by Fenghua Li

Since Specialization
Citations

This map shows the geographic impact of Fenghua Li's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Fenghua Li with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Fenghua Li more than expected).

Fields of papers citing papers by Fenghua Li

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Fenghua Li. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Fenghua Li. The network helps show where Fenghua Li may publish in the future.

Co-authorship network of co-authors of Fenghua Li

This figure shows the co-authorship network connecting the top 25 collaborators of Fenghua Li. A scholar is included among the top collaborators of Fenghua Li based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Fenghua Li. Fenghua Li is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Fan, Kai, et al.. (2025). Hide Yourself: Multi-Dimensional Range Queries for Responses-Hiding Over Outsourced Data. IEEE Transactions on Information Forensics and Security. 20. 6923–6936.
2.
Fan, Kai, et al.. (2025). Beyond Access Pattern: Efficient Volume-Hiding Multi-Range Queries Over Outsourced Data Services. IEEE Transactions on Information Forensics and Security. 20. 2509–2522.
3.
Yang, Haijun, Lu Wang, Haijun Yan, et al.. (2025). Hierarchical porous carbon from PVC plastic wastes with efficient catalytic performance for acetylene hydrochlorination. New Journal of Chemistry. 49(7). 2835–2840. 2 indexed citations
4.
Du, Lidong, et al.. (2024). A deep learning method for contactless emotion recognition from ballistocardiogram. Biomedical Signal Processing and Control. 99. 106891–106891.
5.
Wang, Xiao, et al.. (2024). An on-the-fly framework for usable access control policy mining. Computers & Security. 150. 104211–104211. 1 indexed citations
7.
Zhang, Menghao, et al.. (2023). IMap: Toward a Fast, Scalable and Reconfigurable In-Network Scanner With Programmable Switches. IEEE Transactions on Information Forensics and Security. 19. 601–615.
8.
Niu, Ben, et al.. (2021). A Framework for Personalized Location Privacy. IEEE Transactions on Mobile Computing. 21(9). 3071–3083. 7 indexed citations
9.
He, Kun, et al.. (2020). Achieving Privacy-Preserving Group Recommendation with Local Differential Privacy and Random Transmission. Wireless Communications and Mobile Computing. 2020. 1–10. 7 indexed citations
10.
Wang, Hui, Yuanchao Liu, Xiao Liang, et al.. (2020). Effects of Secreted frizzled-related protein 1 on inhibiting cardiac remodeling.. PubMed. 24(11). 6270–6278. 5 indexed citations
11.
Li, Fenghua, et al.. (2019). Research Progress and Development Trend of Seafloor Observation Network. Bulletin of Chinese Academy of Sciences (Chinese Version). 34(3). 321–330. 14 indexed citations
12.
Feng, Tao, et al.. (2019). A Searchable CP-ABE Privacy Preserving Scheme.. Int. J. Netw. Secur.. 21. 680–689. 1 indexed citations
13.
Chen, Siyu, et al.. (2019). User random access authentication protocol for low earth orbit satellite networks. Journal of Tsinghua University(Science and Technology). 59(1). 1–8. 4 indexed citations
14.
Wang, Fengwei, Hui Zhu, Ximeng Liu, et al.. (2018). Efficient and Privacy-Preserving Dynamic Spatial Query Scheme for Ride-Hailing Services. IEEE Transactions on Vehicular Technology. 67(11). 11084–11097. 27 indexed citations
15.
Xiong, Jinbo, et al.. (2016). Research progress on secure data deduplication in cloud. SHILAP Revista de lepidopterología. 37(11). 180. 5 indexed citations
16.
Li, Fenghua, Sheng Wan, Ben Niu, Hui Li, & Yuanyuan He. (2016). Time obfuscation-based privacy-preserving scheme for Location-Based Services. 465–470. 1 indexed citations
17.
Li, Li, et al.. (2016). Stochastic job stream scheduling method for cipher chip with multi-cryptography. SHILAP Revista de lepidopterología. 37(12). 94.
18.
Li, Fenghua. (2011). Application of nursing information system. Yixue yanjiusheng xuebao. 1 indexed citations
19.
Ma, Jianfeng, et al.. (2010). Key Pre-distribution Scheme with Node Revocation for Wireless Sensor Networks.. Ad Hoc & Sensor Wireless Networks. 10. 235–251. 9 indexed citations
20.
Li, Fenghua. (2008). Efficient and Universally Composable Security Oblivious Transfer. Dianzi xuebao. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026