Hung‐Yu Chien

3.3k total citations
93 papers, 2.3k citations indexed

About

Hung‐Yu Chien is a scholar working on Computer Networks and Communications, Information Systems and Artificial Intelligence. According to data from OpenAlex, Hung‐Yu Chien has authored 93 papers receiving a total of 2.3k indexed citations (citations by other indexed papers that have themselves been cited), including 62 papers in Computer Networks and Communications, 46 papers in Information Systems and 44 papers in Artificial Intelligence. Recurrent topics in Hung‐Yu Chien's work include Advanced Authentication Protocols Security (56 papers), Cryptography and Data Security (36 papers) and User Authentication and Security Systems (33 papers). Hung‐Yu Chien is often cited by papers focused on Advanced Authentication Protocols Security (56 papers), Cryptography and Data Security (36 papers) and User Authentication and Security Systems (33 papers). Hung‐Yu Chien collaborates with scholars based in Taiwan, China and Japan. Hung‐Yu Chien's co-authors include Jinn‐Ke Jan, Yuh‐Min Tseng, Lo‐Yao Yeh, Jiun‐Long Huang, Chin‐Feng Lee, Chi‐Sung Laih, Chen‐Wei Huang, Tzong‐Chen Wu, T. C. Wu and Vincent K. S. Hsiao and has published in prestigious journals such as Sensors, IEEE Transactions on Vehicular Technology and IEEE Internet of Things Journal.

In The Last Decade

Hung‐Yu Chien

91 papers receiving 2.1k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Hung‐Yu Chien Taiwan 22 1.6k 1.4k 900 888 427 93 2.3k
Nai‐Wei Lo Taiwan 21 1.2k 0.7× 951 0.7× 787 0.9× 153 0.2× 557 1.3× 92 1.8k
Mohammad Sabzinejad Farash Iran 26 1.7k 1.0× 1.5k 1.1× 824 0.9× 135 0.2× 180 0.4× 43 1.9k
Vanga Odelu India 30 2.5k 1.5× 2.3k 1.7× 1.2k 1.3× 108 0.1× 428 1.0× 65 3.3k
Aikaterini Mitrokotsa Sweden 15 1.0k 0.6× 407 0.3× 573 0.6× 246 0.3× 181 0.4× 61 1.3k
Jianhua Chen China 27 1.8k 1.1× 1.6k 1.2× 1.5k 1.6× 61 0.1× 263 0.6× 116 2.7k
Rashid Mijumbi Spain 19 2.9k 1.8× 645 0.5× 289 0.3× 86 0.1× 1.3k 3.1× 32 3.2k
Luigi V. Mancini Italy 30 2.0k 1.3× 1.2k 0.8× 1.5k 1.7× 54 0.1× 181 0.4× 116 3.2k
G. P. Biswas India 25 1.5k 0.9× 1.4k 1.0× 1.1k 1.2× 48 0.1× 164 0.4× 69 2.1k
Jianfeng Ma China 17 979 0.6× 692 0.5× 557 0.6× 35 0.0× 314 0.7× 119 1.4k
Dongho Won South Korea 24 1.5k 0.9× 1.3k 0.9× 651 0.7× 70 0.1× 156 0.4× 178 1.9k

Countries citing papers authored by Hung‐Yu Chien

Since Specialization
Citations

This map shows the geographic impact of Hung‐Yu Chien's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Hung‐Yu Chien with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Hung‐Yu Chien more than expected).

Fields of papers citing papers by Hung‐Yu Chien

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Hung‐Yu Chien. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Hung‐Yu Chien. The network helps show where Hung‐Yu Chien may publish in the future.

Co-authorship network of co-authors of Hung‐Yu Chien

This figure shows the co-authorship network connecting the top 25 collaborators of Hung‐Yu Chien. A scholar is included among the top collaborators of Hung‐Yu Chien based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Hung‐Yu Chien. Hung‐Yu Chien is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Chien, Hung‐Yu, et al.. (2025). Exploring MQTT Broker-Based, End-to-End Models for Security and Efficiency. Sensors. 25(17). 5308–5308.
2.
Chien, Hung‐Yu, et al.. (2023). Design and Implementation of MQTT-Based Over-the-Air Updating Against Curious Brokers. IEEE Internet of Things Journal. 11(6). 10768–10777. 3 indexed citations
3.
Chien, Hung‐Yu, et al.. (2022). A Novel MQTT 5.0-Based Over-the-Air Updating Architecture Facilitating Stronger Security. Electronics. 11(23). 3899–3899. 11 indexed citations
4.
Chien, Hung‐Yu. (2021). Dynamic Public Key Certificates with Forward Secrecy. Electronics. 10(16). 2009–2009. 3 indexed citations
5.
Chien, Hung‐Yu. (2021). Two-Level-Composite-Hashing Facilitating Highly Efficient Anonymous IoT and D2D Authentication. Electronics. 10(7). 789–789. 9 indexed citations
6.
Chien, Hung‐Yu. (2021). Self-Healing Group Key Distribution Facilitating Source Authentication Using Block Codes. Security and Communication Networks. 2021. 1–11. 3 indexed citations
7.
Chen, Chiun‐Chuan, et al.. (2021). A variational approach to three-phase traveling waves for a gradient system. Discrete and Continuous Dynamical Systems. 41(10). 4737–4765. 1 indexed citations
8.
Chien, Hung‐Yu, et al.. (2020). Efficient MQTT Platform Facilitating Secure Group Communication. 網際網路技術學刊. 21(7). 1929–1940. 7 indexed citations
9.
Chien, Hung‐Yu. (2018). Group-Oriented Range-Bound Key Agreement for Internet of Things Scenarios. IEEE Internet of Things Journal. 5(3). 1890–1903. 21 indexed citations
10.
Chien, Hung‐Yu. (2017). Using the Modified Diffie–Hellman Problem to Enhance Client Computational Performance in a Three-Party Authenticated Key Agreement. Arabian Journal for Science and Engineering. 43(2). 637–644. 5 indexed citations
11.
Chien, Hung‐Yu. (2017). Group Authentication with Multiple Trials and Multiple Authentications. Security and Communication Networks. 2017. 1–7. 11 indexed citations
12.
Chien, Hung‐Yu. (2017). An effective approach to solving large communication overhead issue and strengthening the securities of AKA protocols. International Journal of Communication Systems. 31(1). 6 indexed citations
13.
Chien, Hung‐Yu. (2016). Elliptic Curve Cryptography-Based RFID Authentication Resisting Active Tracking. Wireless Personal Communications. 94(4). 2925–2936. 16 indexed citations
14.
Chien, Hung‐Yu, et al.. (2013). Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol Resistant to Password Guessing Attacks.. Journal of information science and engineering. 29. 249–265. 8 indexed citations
15.
Chien, Hung‐Yu. (2011). Secure Verifier-Based Three-Party Key Exchange in the Random Oracle Model. Journal of information science and engineering. 27(4). 1487–1501. 12 indexed citations
16.
Chien, Hung‐Yu. (2011). Improved Anonymous Multi-receiver Identity-Based Encryption. The Computer Journal. 55(4). 439–446. 39 indexed citations
17.
Chien, Hung‐Yu & Tzong‐Chen Wu. (2008). Improving Varying-Pseudonym-Based RFID Authentication Protocols to Resist Denial-of-Service Attacks. Information Security and Cryptology. 18. 259–269. 3 indexed citations
18.
Chien, Hung‐Yu, et al.. (2008). Fast pre-authentication with minimized overhead and high security for WLAN handoff. WSEAS Transactions on Computers archive. 7(2). 46–51. 1 indexed citations
19.
Chien, Hung‐Yu, Jinn‐Ke Jan, & Yuh‐Min Tseng. (2001). A modified remote login authentication scheme based on geometric approach. Journal of Systems and Software. 55(3). 287–290. 32 indexed citations
20.
Chien, Hung‐Yu, Jinn‐Ke Jan, & Yuh‐Min Tseng. (2000). A Practical ( t , n ) Multi-Secret Sharing Scheme. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. 83(12). 2762–2765. 84 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026