Haipeng Qu

536 total citations
39 papers, 350 citations indexed

About

Haipeng Qu is a scholar working on Artificial Intelligence, Information Systems and Computer Networks and Communications. According to data from OpenAlex, Haipeng Qu has authored 39 papers receiving a total of 350 indexed citations (citations by other indexed papers that have themselves been cited), including 24 papers in Artificial Intelligence, 15 papers in Information Systems and 13 papers in Computer Networks and Communications. Recurrent topics in Haipeng Qu's work include Cryptography and Data Security (13 papers), Advanced Malware Detection Techniques (11 papers) and Internet Traffic Analysis and Secure E-voting (8 papers). Haipeng Qu is often cited by papers focused on Cryptography and Data Security (13 papers), Advanced Malware Detection Techniques (11 papers) and Internet Traffic Analysis and Secure E-voting (8 papers). Haipeng Qu collaborates with scholars based in China and United Kingdom. Haipeng Qu's co-authors include Lin Sun, Qi Zhang, Xiaoshuai Zhang, Purui Su, Ruobing Jiang, Dengguo Feng, Jianliang Xu, Qihui Wang, Xiao-Yun Zhou and Yuan Zhuang and has published in prestigious journals such as Expert Systems with Applications, Information Sciences and IEEE Transactions on Information Forensics and Security.

In The Last Decade

Haipeng Qu

34 papers receiving 331 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Haipeng Qu China 11 247 128 123 62 58 39 350
Yoshiaki Shiraishi Japan 9 142 0.6× 136 1.1× 105 0.9× 49 0.8× 51 0.9× 55 268
Muslum Ozgur Ozmen United States 8 149 0.6× 59 0.5× 67 0.5× 29 0.5× 34 0.6× 20 223
Ruei‐Hau Hsu Taiwan 13 230 0.9× 273 2.1× 197 1.6× 111 1.8× 62 1.1× 29 431
Nouha Oualha France 7 167 0.7× 259 2.0× 164 1.3× 50 0.8× 56 1.0× 28 408
Rishabh Poddar United States 9 354 1.4× 459 3.6× 112 0.9× 78 1.3× 73 1.3× 12 617
Massimo Merro Italy 13 256 1.0× 278 2.2× 78 0.6× 37 0.6× 54 0.9× 45 485
P. Visalakshi India 8 91 0.4× 143 1.1× 108 0.9× 35 0.6× 31 0.5× 35 271
Ronald Watro United States 7 155 0.6× 450 3.5× 170 1.4× 19 0.3× 33 0.6× 12 531
Anish Mathuria India 5 246 1.0× 339 2.6× 231 1.9× 56 0.9× 41 0.7× 16 450
Jean-Baptiste Jeannin United States 9 141 0.6× 282 2.2× 71 0.6× 60 1.0× 32 0.6× 32 439

Countries citing papers authored by Haipeng Qu

Since Specialization
Citations

This map shows the geographic impact of Haipeng Qu's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Haipeng Qu with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Haipeng Qu more than expected).

Fields of papers citing papers by Haipeng Qu

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Haipeng Qu. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Haipeng Qu. The network helps show where Haipeng Qu may publish in the future.

Co-authorship network of co-authors of Haipeng Qu

This figure shows the co-authorship network connecting the top 25 collaborators of Haipeng Qu. A scholar is included among the top collaborators of Haipeng Qu based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Haipeng Qu. Haipeng Qu is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Zhang, Xiaoshuai, et al.. (2024). Identity-Based Matchmaking Encryption with Equality Test. Entropy. 26(1). 74–74. 1 indexed citations
2.
Qu, Haipeng, et al.. (2024). Privacy preserving and secure robust federated learning: A survey. Concurrency and Computation Practice and Experience. 36(13). 12 indexed citations
3.
Qu, Haipeng, et al.. (2023). Identity-based proxy matchmaking encryption for cloud-based anonymous messaging systems. Journal of Systems Architecture. 142. 102950–102950. 9 indexed citations
4.
Qu, Haipeng, et al.. (2023). A systematic review of fuzzing. Soft Computing. 28(6). 5493–5522. 11 indexed citations
5.
Li, Yuezun, et al.. (2023). Improving transferable adversarial attack via feature-momentum. Computers & Security. 128. 103135–103135. 8 indexed citations
6.
Qu, Haipeng, et al.. (2021). MooFuzz: Many-Objective Optimization Seed Schedule for Fuzzer. Mathematics. 9(3). 205–205. 4 indexed citations
7.
Wang, Qihui, et al.. (2021). Identity-based encryption with equality test and datestamp-based authorization mechanism. Theoretical Computer Science. 861. 117–132. 19 indexed citations
8.
Jiang, Ruobing, et al.. (2020). Advanced Temperature-Varied ECU Fingerprints for Source Identification and Intrusion Detection in Controller Area Networks. Security and Communication Networks. 2020. 1–17. 6 indexed citations
9.
Sun, Lei, Xumei Li, Haipeng Qu, & Xiaoshuai Zhang. (2020). AFLTurbo: Speed up Path Discovery for Greybox Fuzzing. 81–91. 10 indexed citations
10.
Jiang, Ruobing, et al.. (2019). BiRe: A client-side Bi-directional SYN Reflection mechanism against multi-model evil twin attacks. Computers & Security. 88. 101618–101618. 10 indexed citations
11.
Qu, Haipeng, et al.. (2019). An Effective Hybrid Network Coding Scheme Against Pollution Attacks. 19(5). 69. 3 indexed citations
12.
Sun, Lin, et al.. (2019). On the Security Of A Certificateless Signcryption With Known Session-Specific Temporary Information Security In The Standard Model. The Computer Journal. 63(8). 1259–1262. 10 indexed citations
13.
Sun, Lin, et al.. (2018). On the Security of Secure Server-Designation Public Key Encryption with Keyword Search. The Computer Journal. 61(12). 1791–1793. 1 indexed citations
14.
Qu, Haipeng, et al.. (2018). Certificateless public key encryption with equality test. Information Sciences. 462. 76–92. 64 indexed citations
15.
Sun, Lin, et al.. (2017). An efficient RSA-based certificateless public key encryption scheme. Discrete Applied Mathematics. 241. 39–47. 21 indexed citations
16.
Sun, Lin, et al.. (2017). Cryptanalysis of A Pairing-Free Certificateless Signcryption Scheme. The Computer Journal. 61(4). 539–544. 11 indexed citations
17.
Qu, Haipeng, et al.. (2017). A Passive Client-based Approach to Detect Evil Twin Attacks. 233–239. 12 indexed citations
18.
Qu, Haipeng. (2009). Key management scheme for wireless sensor network based on multiple key spaces. Journal of Computer Applications.
19.
Qu, Haipeng. (2008). Finite 2-groups Whose Subgroups are Cyclic or Normal. Shuxue de shijian yu renshi. 2 indexed citations
20.
Qu, Haipeng. (2006). An IP Traceback Scheme Based on Marking-in-Order. Dianzi xuebao. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026