Guodong Ye

3.7k total citations
81 papers, 3.0k citations indexed

About

Guodong Ye is a scholar working on Computer Vision and Pattern Recognition, Artificial Intelligence and Computational Theory and Mathematics. According to data from OpenAlex, Guodong Ye has authored 81 papers receiving a total of 3.0k indexed citations (citations by other indexed papers that have themselves been cited), including 71 papers in Computer Vision and Pattern Recognition, 16 papers in Artificial Intelligence and 12 papers in Computational Theory and Mathematics. Recurrent topics in Guodong Ye's work include Chaos-based Image/Signal Encryption (65 papers), Advanced Steganography and Watermarking Techniques (52 papers) and Digital Media Forensic Detection (13 papers). Guodong Ye is often cited by papers focused on Chaos-based Image/Signal Encryption (65 papers), Advanced Steganography and Watermarking Techniques (52 papers) and Digital Media Forensic Detection (13 papers). Guodong Ye collaborates with scholars based in China, Hong Kong and Malaysia. Guodong Ye's co-authors include Xiaoling Huang, Chen Pan, Kwok‐Wo Wong, Youxia Dong, Kaixin Jiao, Yang Shi, Qixiang Mei, Min Liu, Min Liu and Junwei Zhou and has published in prestigious journals such as Journal of The Electrochemical Society, Scientific Reports and Expert Systems with Applications.

In The Last Decade

Guodong Ye

78 papers receiving 2.9k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Guodong Ye China 31 2.6k 726 601 406 347 81 3.0k
Zhiliang Zhu China 30 2.7k 1.0× 750 1.0× 686 1.1× 595 1.5× 325 0.9× 104 3.1k
Li-Hua Gong China 30 2.7k 1.0× 1.6k 2.2× 583 1.0× 342 0.8× 267 0.8× 103 3.8k
Chengqing Li China 35 3.6k 1.4× 1.2k 1.6× 921 1.5× 850 2.1× 1.0k 2.9× 76 4.2k
Hejiao Huang China 16 1.5k 0.6× 488 0.7× 483 0.8× 295 0.7× 383 1.1× 51 2.0k
Tiegang Gao China 21 1.6k 0.6× 357 0.5× 287 0.5× 231 0.6× 471 1.4× 134 2.2k
Bassem Abd-El-Atty Egypt 29 1.6k 0.6× 1.1k 1.5× 406 0.7× 153 0.4× 509 1.5× 55 2.6k
Je Sen Teh Malaysia 22 1.3k 0.5× 443 0.6× 329 0.5× 225 0.6× 341 1.0× 50 1.6k
Leo Yu Zhang China 28 1.7k 0.7× 1.1k 1.5× 304 0.5× 215 0.5× 193 0.6× 172 3.0k
Ali Kanso Kuwait 23 1.2k 0.5× 459 0.6× 259 0.4× 179 0.4× 234 0.7× 77 1.7k
Mohamed Amine Ben Farah Tunisia 13 1.0k 0.4× 370 0.5× 277 0.5× 124 0.3× 133 0.4× 26 1.3k

Countries citing papers authored by Guodong Ye

Since Specialization
Citations

This map shows the geographic impact of Guodong Ye's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Guodong Ye with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Guodong Ye more than expected).

Fields of papers citing papers by Guodong Ye

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Guodong Ye. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Guodong Ye. The network helps show where Guodong Ye may publish in the future.

Co-authorship network of co-authors of Guodong Ye

This figure shows the co-authorship network connecting the top 25 collaborators of Guodong Ye. A scholar is included among the top collaborators of Guodong Ye based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Guodong Ye. Guodong Ye is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Liu, Min, Guodong Ye, & Junwei Zhou. (2025). Asymmetric image encryption-hiding scheme based on reversible neural network. Science China Technological Sciences. 68(9). 1 indexed citations
2.
Ye, Guodong, et al.. (2025). Image hiding algorithm based on local binary pattern and compressive sensing. Mathematics and Computers in Simulation. 237. 316–334. 7 indexed citations
3.
Xiao, Xiuchun, et al.. (2024). Two gradient-based RNNs for achieving zero residual in time-dependent zero-searching problems. Expert Systems with Applications. 267. 126002–126002. 3 indexed citations
4.
Ye, Guodong, et al.. (2024). Adaptive reversible image-data hiding algorithm based on blockchain and zero watermarking. Optics & Laser Technology. 179. 111380–111380. 13 indexed citations
5.
Yap, Wun‐She, et al.. (2024). Cryptanalysis of an image encryption scheme based on two-point diffusion strategy and Henon map. Journal of Information Security and Applications. 81. 103692–103692. 2 indexed citations
6.
Mei, Qixiang, et al.. (2024). Image encryption scheme based on pseudo-DWT and cubic S-box. Physica Scripta. 99(8). 85259–85259. 5 indexed citations
7.
Ye, Guodong, et al.. (2024). Authenticated reversible image hiding algorithm based on blockchain technology. Cluster Computing. 28(1). 3 indexed citations
8.
Ye, Guodong, et al.. (2024). Tropical cyclone track prediction model for multidimensional features and time differences series observation. Alexandria Engineering Journal. 111. 432–445.
9.
Ye, Guodong, et al.. (2024). Reversible image hiding algorithm based on adaptive embedding mechanism. Expert Systems with Applications. 260. 125468–125468.
10.
Ye, Guodong, et al.. (2023). Image compression-hiding algorithm based on compressive sensing and integer wavelet transformation. Applied Mathematical Modelling. 124. 576–596. 16 indexed citations
11.
Ye, Guodong, et al.. (2023). Reversible Blind Image Hiding Algorithm Based on Compressive Sensing and Fusion Mechanism. SSRN Electronic Journal. 1 indexed citations
12.
Ye, Guodong, et al.. (2023). Image encryption algorithm based on ElGamal cryptography and selective random diffusion. Physica Scripta. 98(11). 115251–115251. 4 indexed citations
13.
Ye, Guodong, et al.. (2023). Asymmetric image encryption algorithm using a new chaotic map and an improved radial diffusion. Optik. 288. 171181–171181. 6 indexed citations
14.
Liu, Min & Guodong Ye. (2021). A new DNA coding and hyperchaotic system based asymmetric image encryption algorithm. Mathematical Biosciences & Engineering. 18(4). 3887–3906. 23 indexed citations
15.
Ye, Guodong, et al.. (2021). Public key image encryption algorithm based on pixel information and random number insertion. Physica Scripta. 96(10). 105202–105202. 19 indexed citations
16.
Ye, Guodong, et al.. (2021). Asymmetric image encryption scheme based on the Quantum logistic map and cyclic modulo diffusion. Mathematical Biosciences & Engineering. 18(5). 5427–5448. 23 indexed citations
17.
Li, Qiuxia, Guangquan Mo, & Guodong Ye. (2021). Unique Nitrogen-Doped Carbon Polyhedron Embedded with Co Derived Core-Shell Nanoparticles for the Electro-Catalysis towards Hydrogen Peroxide Redox Reaction and Nonenzymatic Detection. Journal of The Electrochemical Society. 168(3). 37501–37501. 5 indexed citations
18.
Ye, Guodong, Kaixin Jiao, Xiaoling Huang, Bok‐Min Goi, & Wun‐She Yap. (2021). Author Correction: An image encryption scheme based on public key cryptosystem and quantum logistic map. Scientific Reports. 11(1). 8549–8549. 4 indexed citations
19.
Cai, Chengfu, Guodong Ye, Dong‐Yan Shen, et al.. (2018). Chibby suppresses aerobic glycolysis and proliferation of nasopharyngeal carcinoma via the Wnt/β-catenin-Lin28/let7-PDK1 cascade. Journal of Experimental & Clinical Cancer Research. 37(1). 104–104. 43 indexed citations
20.
Ye, Guodong. (2013). A block image encryption algorithm based on wave transmission and chaotic systems. Nonlinear Dynamics. 75(3). 417–427. 75 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026