Guan-Hua Tu

897 total citations
44 papers, 572 citations indexed

About

Guan-Hua Tu is a scholar working on Computer Networks and Communications, Electrical and Electronic Engineering and Artificial Intelligence. According to data from OpenAlex, Guan-Hua Tu has authored 44 papers receiving a total of 572 indexed citations (citations by other indexed papers that have themselves been cited), including 34 papers in Computer Networks and Communications, 28 papers in Electrical and Electronic Engineering and 14 papers in Artificial Intelligence. Recurrent topics in Guan-Hua Tu's work include Advanced Malware Detection Techniques (13 papers), IPv6, Mobility, Handover, Networks, Security (12 papers) and Network Security and Intrusion Detection (11 papers). Guan-Hua Tu is often cited by papers focused on Advanced Malware Detection Techniques (13 papers), IPv6, Mobility, Handover, Networks, Security (12 papers) and Network Security and Intrusion Detection (11 papers). Guan-Hua Tu collaborates with scholars based in United States, Taiwan and China. Guan-Hua Tu's co-authors include Chi-Yu Li, Chunyi Peng, Songwu Lu, Xinyu Lei, Yuanjie Li, Alex X. Liu, Zengwen Yuan, Rui Li, Xinbing Wang and Chunyi Peng and has published in prestigious journals such as ACM Computing Surveys, IEEE Internet of Things Journal and IEEE/ACM Transactions on Networking.

In The Last Decade

Guan-Hua Tu

39 papers receiving 555 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Guan-Hua Tu United States 15 356 264 190 164 114 44 572
Chi-Yu Li Taiwan 15 512 1.4× 381 1.4× 155 0.8× 160 1.0× 124 1.1× 67 728
Mahdi Aiash United Kingdom 14 686 1.9× 192 0.7× 201 1.1× 161 1.0× 181 1.6× 64 818
Ravishankar Borgaonkar Germany 12 398 1.1× 214 0.8× 221 1.2× 142 0.9× 225 2.0× 29 591
Ashraf Matrawy Canada 15 878 2.5× 277 1.0× 194 1.0× 165 1.0× 201 1.8× 82 1.0k
Natalija Vlajic Canada 14 531 1.5× 156 0.6× 218 1.1× 180 1.1× 161 1.4× 56 692
Randy Marchany United States 13 624 1.8× 161 0.6× 169 0.9× 225 1.4× 141 1.2× 55 736
Thomas Bauschert Germany 15 544 1.5× 354 1.3× 106 0.6× 73 0.4× 100 0.9× 90 722
Olivier Mehani Australia 9 388 1.1× 193 0.7× 121 0.6× 160 1.0× 124 1.1× 14 524
Mowei Wang China 10 412 1.2× 159 0.6× 152 0.8× 62 0.4× 74 0.6× 23 573
Jesse Walker United States 12 293 0.8× 185 0.7× 138 0.7× 49 0.3× 124 1.1× 22 476

Countries citing papers authored by Guan-Hua Tu

Since Specialization
Citations

This map shows the geographic impact of Guan-Hua Tu's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Guan-Hua Tu with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Guan-Hua Tu more than expected).

Fields of papers citing papers by Guan-Hua Tu

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Guan-Hua Tu. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Guan-Hua Tu. The network helps show where Guan-Hua Tu may publish in the future.

Co-authorship network of co-authors of Guan-Hua Tu

This figure shows the co-authorship network connecting the top 25 collaborators of Guan-Hua Tu. A scholar is included among the top collaborators of Guan-Hua Tu based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Guan-Hua Tu. Guan-Hua Tu is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Liu, Che‐Hung, et al.. (2023). A Runtime Anomaly Detector via Service Communication Proxy for 5G Mobile Networks. 1–2. 3 indexed citations
2.
Tu, Guan-Hua, et al.. (2023). Unveiling the Insecurity of Operational Cellular Emergency Services (911): Vulnerabilities, Attacks, and Countermeasures. GetMobile Mobile Computing and Communications. 27(1). 39–43. 2 indexed citations
4.
Tu, Guan-Hua, et al.. (2022). Uncovering insecure designs of cellular emergency services (911). 703–715. 5 indexed citations
5.
Li, Chi-Yu, et al.. (2022). Insecurity of Operational IMS Call Systems: Vulnerabilities, Attacks, and Countermeasures. IEEE/ACM Transactions on Networking. 31(2). 800–815. 7 indexed citations
6.
Lei, Xinyu, et al.. (2020). SecWIR. 260–272. 10 indexed citations
7.
Li, Chi-Yu, et al.. (2020). Ghost calls from operational 4G call systems. 1–14. 8 indexed citations
8.
Tu, Guan-Hua, Bangjie Yin, Chi-Yu Li, et al.. (2020). The Untold Secrets of WiFi-Calling Services: Vulnerabilities, Attacks, and Countermeasures. IEEE Transactions on Mobile Computing. 20(11). 3131–3147. 6 indexed citations
9.
Lei, Xinyu, et al.. (2020). Fast and Secure kNN Query Processing in Cloud Computing. 1–9. 11 indexed citations
10.
Tu, Guan-Hua, et al.. (2019). Exploring the Insecurity of Google Account Registration Protocol via Model Checking. 3087–3096. 1 indexed citations
11.
Lei, Xinyu, Alex X. Liu, Rui Li, & Guan-Hua Tu. (2019). SecEQP: A Secure and Efficient Scheme for SkNN Query Problem Over Encrypted Geodata on Cloud. 37 indexed citations
12.
Tu, Guan-Hua, et al.. (2018). Mobile Edge Computing Platform Deployment in 4G {LTE} Networks: A Middlebox Approach. e-Archivo (Carlos III University of Madrid). 18 indexed citations
13.
Tu, Guan-Hua, et al.. (2018). The Dark Side of Operational Wi-Fi Calling Services. 1–1. 9 indexed citations
14.
Li, Yuanjie, et al.. (2016). iCellular: device-customized cellular network access on commodity smartphones. Networked Systems Design and Implementation. 643–656. 18 indexed citations
15.
Tu, Guan-Hua, Chi-Yu Li, Chunyi Peng, et al.. (2016). VoLTE*. 3–8. 6 indexed citations
16.
Peng, Chunyi, Chi-Yu Li, Hongyi Wang, Guan-Hua Tu, & Songwu Lu. (2014). Real Threats to Your Data Bills. 727–738. 22 indexed citations
17.
Peng, Chunyi, Chi-Yu Li, Guan-Hua Tu, Songwu Lu, & Lixia Zhang. (2012). Mobile data charging. 195–204. 27 indexed citations
18.
Peng, Chunyi, Guan-Hua Tu, Chi-Yu Li, & Songwu Lu. (2012). Can we pay for what we get in 3G data access?. 113–124. 28 indexed citations
19.
Cheng, Shin‐Ming, et al.. (2004). An intelligent GGSN dispatching mechanism for UMTS. Computer Communications. 28(8). 947–955. 1 indexed citations
20.
He, Liang, et al.. (2000). [IR search through Internet].. PubMed. 20(6). 825–6.

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026