Gwoboa Horng

1.7k total citations
69 papers, 1.1k citations indexed

About

Gwoboa Horng is a scholar working on Artificial Intelligence, Computer Vision and Pattern Recognition and Information Systems. According to data from OpenAlex, Gwoboa Horng has authored 69 papers receiving a total of 1.1k indexed citations (citations by other indexed papers that have themselves been cited), including 36 papers in Artificial Intelligence, 32 papers in Computer Vision and Pattern Recognition and 27 papers in Information Systems. Recurrent topics in Gwoboa Horng's work include Cryptography and Data Security (28 papers), Chaos-based Image/Signal Encryption (21 papers) and Advanced Steganography and Watermarking Techniques (20 papers). Gwoboa Horng is often cited by papers focused on Cryptography and Data Security (28 papers), Chaos-based Image/Signal Encryption (21 papers) and Advanced Steganography and Watermarking Techniques (20 papers). Gwoboa Horng collaborates with scholars based in Taiwan, China and United Kingdom. Gwoboa Horng's co-authors include Tzung‐Her Chen, Yu‐Chi Chen, Du-Shiau Tsai, Chih-Wei Shiu, Shiuh-Jeng Wang, Cheng-Ta Huang, Ying‐Hsuan Huang, Chin‐Chen Chang, Raylin Tso and Tzu-Chuen Lu and has published in prestigious journals such as IEEE Transactions on Industrial Electronics, Mathematics of Computation and Pattern Recognition.

In The Last Decade

Gwoboa Horng

60 papers receiving 990 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Gwoboa Horng Taiwan 16 812 296 189 181 83 69 1.1k
Chwei‐Shyong Tsai Taiwan 19 1.1k 1.4× 226 0.8× 223 1.2× 174 1.0× 117 1.4× 45 1.4k
Chi-Kwong Chan Hong Kong 12 1.4k 1.7× 164 0.6× 278 1.5× 257 1.4× 182 2.2× 22 1.7k
Nazir A. Loan India 13 884 1.1× 130 0.4× 110 0.6× 73 0.4× 105 1.3× 17 1.0k
Ali Al‐Haj Jordan 18 1.1k 1.4× 103 0.3× 107 0.6× 56 0.3× 182 2.2× 57 1.2k
Xuehu Yan China 21 1.3k 1.6× 608 2.1× 190 1.0× 38 0.2× 137 1.7× 135 1.5k
Wei‐Liang Tai Taiwan 17 1.6k 1.9× 122 0.4× 161 0.9× 152 0.8× 96 1.2× 45 1.7k
Shangwei Guo China 16 294 0.4× 395 1.3× 105 0.6× 64 0.4× 85 1.0× 54 687
Zhenxing Qian China 26 2.2k 2.7× 314 1.1× 79 0.4× 30 0.2× 144 1.7× 103 2.3k
Chunfang Yang China 19 1.1k 1.3× 196 0.7× 54 0.3× 42 0.2× 75 0.9× 94 1.2k
Paolo D’Arco Italy 10 328 0.4× 291 1.0× 225 1.2× 322 1.8× 70 0.8× 31 649

Countries citing papers authored by Gwoboa Horng

Since Specialization
Citations

This map shows the geographic impact of Gwoboa Horng's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Gwoboa Horng with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Gwoboa Horng more than expected).

Fields of papers citing papers by Gwoboa Horng

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Gwoboa Horng. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Gwoboa Horng. The network helps show where Gwoboa Horng may publish in the future.

Co-authorship network of co-authors of Gwoboa Horng

This figure shows the co-authorship network connecting the top 25 collaborators of Gwoboa Horng. A scholar is included among the top collaborators of Gwoboa Horng based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Gwoboa Horng. Gwoboa Horng is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Horng, Gwoboa, et al.. (2020). A Chaotic Attack Offering with Improving Mechanism in Economic Denial of Sustainability. 41–45. 1 indexed citations
2.
Horng, Gwoboa, et al.. (2016). Cryptanalysis of a Compact Certificateless Aggregate Signature Scheme. International journal of network security. 18(4). 793–797. 2 indexed citations
3.
Chen, Yu‐Chi, Raylin Tso, Gwoboa Horng, Chun‐I Fan, & Ruei‐Hau Hsu. (2015). Strongly Secure Certificateless Signature: Cryptanalysis and Improvement of Two Schemes *. Journal of information science and engineering. 31(1). 297–314. 12 indexed citations
4.
Horng, Gwoboa, Ying‐Hsuan Huang, Chin‐Chen Chang, & Yanjun Liu. (2014). (k, n)-Image Reversible Data Hiding.. J. Inf. Hiding Multim. Signal Process.. 5. 152–164. 10 indexed citations
5.
Chang, Chin‐Chen, et al.. (2013). A high payload data embedding scheme using dual stego-images with reversibility. 1–5. 47 indexed citations
6.
Chen, Tzer‐Shyong, et al.. (2012). An Authentication Scheme to Healthcare Security under Wireless Sensor Networks. Journal of Medical Systems. 36(6). 3649–3664. 14 indexed citations
7.
Lu, Eric Jui‐Lin, et al.. (2010). Extended Relation Metadata for SCORM-based Learning Content Management Systems. Educational Technology & Society. 13(1). 220–235. 6 indexed citations
8.
Chen, Yu‐Chi, et al.. (2009). Privacy Protection in On-line Shopping for Electronic Documents. 963. 105–108. 1 indexed citations
9.
Horng, Gwoboa, et al.. (2007). Further refinement of pairing computation based on Miller’s algorithm. Applied Mathematics and Computation. 189(1). 395–409. 4 indexed citations
10.
Lu, Eric Jui‐Lin, et al.. (2007). A Web-based Authoring System Supporting Metadata - Using e-Learning As An Example ∗.
11.
Horng, Gwoboa, et al.. (2006). (Designs, Codes and Cryptography,38(2):219-236)Cheating in Visual Cryptography. 2 indexed citations
12.
Hong, Tzung‐Pei, et al.. (2006). A Key Renewal Scheme under the Power Consumption for Wireless Sensor Networks. Advances in intelligent systems research. 3 indexed citations
13.
Chen, Chunhua & Gwoboa Horng. (2006). MORE ROBUST PRIVATE INFORMATION RETRIEVAL SCHEME. 297–302.
14.
Chen, Tzung‐Her, Gwoboa Horng, & Du-Shiau Tsai. (2005). An anonymous buyer‐reseller watermarking protocol. Journal of the Chinese Institute of Engineers. 28(3). 535–538. 6 indexed citations
15.
Horng, Gwoboa, et al.. (2004). Security Analysis of a Threshold Access Control Scheme Based on Smart Cards. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. 87(8). 2177–2179. 1 indexed citations
16.
Chen, Tzung‐Her, et al.. (2003). A Robust Wavelet-Based Watermarking Scheme Using Quantization and Human Visual System Model. Information Technology Journal. 2(3). 213–230. 14 indexed citations
17.
Horng, Gwoboa. (2002). Cryptanalysis of a key management scheme for secure multicast communications. IEICE Transactions on Communications. 85(5). 1050–1051. 20 indexed citations
18.
Horng, Gwoboa. (2001). A New Method for Construction Multiple Assignment Schemes for Generalized Secret Sharing.. Journal of information science and engineering. 17. 959–965. 3 indexed citations
19.
Horng, Gwoboa. (2000). A Secure Server-Aided RSA Signature Computation Protocol for Smart Cards. Journal of information science and engineering. 16(6). 847–855. 2 indexed citations
20.
Horng, Gwoboa. (1997). Active Attacks on Two Efficient Server-Aided RSA Secret Computation Protocols. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. 80(10). 2038–2039. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026