I‐En Liao

2.5k total citations · 1 hit paper
57 papers, 1.9k citations indexed

About

I‐En Liao is a scholar working on Computer Networks and Communications, Artificial Intelligence and Information Systems. According to data from OpenAlex, I‐En Liao has authored 57 papers receiving a total of 1.9k indexed citations (citations by other indexed papers that have themselves been cited), including 33 papers in Computer Networks and Communications, 28 papers in Artificial Intelligence and 23 papers in Information Systems. Recurrent topics in I‐En Liao's work include Advanced Authentication Protocols Security (10 papers), User Authentication and Security Systems (8 papers) and Advanced Database Systems and Queries (7 papers). I‐En Liao is often cited by papers focused on Advanced Authentication Protocols Security (10 papers), User Authentication and Security Systems (8 papers) and Advanced Database Systems and Queries (7 papers). I‐En Liao collaborates with scholars based in Taiwan, United States and China. I‐En Liao's co-authors include Cheng‐Chi Lee, Min‐Shiang Hwang, Feng‐Mao Lin, Ching-Min Lin, Anas Khaleel, Kuang‐Wen Liao, Shu-Yi Ho, Shun‐Long Weng, Chih‐Hung Chou and Yu‐Ting Tseng and has published in prestigious journals such as Nucleic Acids Research, IEEE Transactions on Industrial Electronics and Expert Systems with Applications.

In The Last Decade

I‐En Liao

50 papers receiving 1.8k citations

Hit Papers

miRTarBase update 2014: an information resource for exper... 2013 2026 2017 2021 2013 250 500 750

Peers

I‐En Liao
Di Xie China
Guangzhi Qu United States
Keon Myung Lee South Korea
Dakai Zhu United States
I‐En Liao
Citations per year, relative to I‐En Liao I‐En Liao (= 1×) peers Nectarios Koziris

Countries citing papers authored by I‐En Liao

Since Specialization
Citations

This map shows the geographic impact of I‐En Liao's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by I‐En Liao with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites I‐En Liao more than expected).

Fields of papers citing papers by I‐En Liao

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by I‐En Liao. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by I‐En Liao. The network helps show where I‐En Liao may publish in the future.

Co-authorship network of co-authors of I‐En Liao

This figure shows the co-authorship network connecting the top 25 collaborators of I‐En Liao. A scholar is included among the top collaborators of I‐En Liao based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with I‐En Liao. I‐En Liao is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Wang, Chien‐Lung, et al.. (2022). An Evaluation of Cybersecurity Risks of DLMS/COSEM Smart Meter Using Fuzzing Testing. 1–2. 2 indexed citations
2.
Liao, I‐En, et al.. (2020). UCIS-X: An Updatable Compact Indexing Scheme for Efficient Extensible Markup Language Document Updating and Query Evaluation. IEEE Access. 8. 176375–176392. 4 indexed citations
3.
Liao, I‐En, et al.. (2018). Mining Anomaly Communication Patterns for Industrial Control Systems. 1–6. 1 indexed citations
4.
Liao, I‐En, et al.. (2017). Implementing publish/subscribe pattern for CoAP in fog computing environment. 7 indexed citations
5.
Li, I-hui, et al.. (2014). Mining Sequential Pattern Changes. Journal of information science and engineering. 30(4). 973–990. 1 indexed citations
6.
Liao, I‐En, et al.. (2014). A scalable XML indexing method using MapReduce. 81–86. 1 indexed citations
7.
Hsu, Sheng‐Da, Yu‐Ting Tseng, Sirjana Shrestha, et al.. (2013). miRTarBase update 2014: an information resource for experimentally validated miRNA-target interactions. Nucleic Acids Research. 42(D1). D78–D85. 892 indexed citations breakdown →
8.
Tzeng, David T.W., Yu‐Ting Tseng, Matthew Ung, et al.. (2013). DPRP: a database of phenotype-specific regulatory programs derived from transcription factor binding data. Nucleic Acids Research. 42(D1). D178–D183. 3 indexed citations
9.
Liao, I‐En, et al.. (2012). A searchable encryption scheme for outsourcing cloud storage. 3027. 142–146. 12 indexed citations
10.
Liao, I‐En, et al.. (2011). Reversible Data Hiding Based on Median Difference Histogram. Journal of information science and engineering. 27(2). 577–593. 3 indexed citations
11.
Li, I-hui, et al.. (2010). An uncapacitated facility location based cluster hierarchy scheme on wireless sensor networks. WSEAS TRANSACTIONS on COMMUNICATIONS archive. 9(11). 740–757. 4 indexed citations
12.
Liao, I‐En, et al.. (2010). An improved frequent pattern growth method for mining association rules. Expert Systems with Applications. 38(5). 5154–5161. 67 indexed citations
13.
Lee, Cheng‐Chi, I‐En Liao, & Min‐Shiang Hwang. (2010). An efficient authentication protocol for mobile communications. Telecommunication Systems. 46(1). 31–41. 12 indexed citations
14.
Liao, I‐En, et al.. (2010). A Forward Authentication Key Management Scheme for Heterogeneous Sensor Networks. EURASIP Journal on Wireless Communications and Networking. 2011(1). 28 indexed citations
15.
Liao, I‐En, et al.. (2010). An indoor location-based service using access points as signal strength data collectors. 1–6. 3 indexed citations
16.
Liao, I‐En, et al.. (2009). Reversible data hiding based on grayscale value histogram with optimal multiple pairs of crests and troughs. 147–151. 1 indexed citations
17.
Lee, Cheng‐Chi, et al.. (2009). AN EXTENDED CERTIfiCATE-BASED AUTHENTICATION AND SECURITY PROTOCOL FOR MOBILE NETWORKS. Information Technology And Control. 38(1). 9 indexed citations
18.
Liao, I‐En & Kuo-Sheng Kao. (2007). Enhancing the accuracy of WLAN-based location determination systems using predicted orientation information. Information Sciences. 178(4). 1049–1068. 28 indexed citations
19.
Liao, I‐En, Cheng‐Chi Lee, & Min‐Shiang Hwang. (2006). Identity-based deniable authentication protocol from pairings.. 112–114. 3 indexed citations
20.
Liao, I‐En, Cheng‐Chi Lee, & Min‐Shiang Hwang. (2005). A password authentication scheme over insecure networks. Journal of Computer and System Sciences. 72(4). 727–740. 190 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026