Im-Yeong Lee

770 total citations
71 papers, 404 citations indexed

About

Im-Yeong Lee is a scholar working on Information Systems, Artificial Intelligence and Computer Networks and Communications. According to data from OpenAlex, Im-Yeong Lee has authored 71 papers receiving a total of 404 indexed citations (citations by other indexed papers that have themselves been cited), including 48 papers in Information Systems, 40 papers in Artificial Intelligence and 39 papers in Computer Networks and Communications. Recurrent topics in Im-Yeong Lee's work include Cryptography and Data Security (33 papers), Advanced Authentication Protocols Security (26 papers) and Cloud Data Security Solutions (25 papers). Im-Yeong Lee is often cited by papers focused on Cryptography and Data Security (33 papers), Advanced Authentication Protocols Security (26 papers) and Cloud Data Security Solutions (25 papers). Im-Yeong Lee collaborates with scholars based in South Korea, United States and Spain. Im-Yeong Lee's co-authors include Suhyun Kim, Donghyun Kim, Taehoon Kim, Wonbin Kim, J.A. Silvester, Hwankuk Kim, Kangbin Yim, Jang-Su Park, Md Zakirul Alam Bhuiyan and Sun‐Ho Lee and has published in prestigious journals such as SHILAP Revista de lepidopterología, IEEE Access and Sensors.

In The Last Decade

Im-Yeong Lee

64 papers receiving 366 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Im-Yeong Lee South Korea 12 247 212 162 71 48 71 404
Gökay Saldamlı United States 10 175 0.7× 107 0.5× 133 0.8× 44 0.6× 15 0.3× 37 324
Lingdi Ping China 12 301 1.2× 283 1.3× 139 0.9× 41 0.6× 14 0.3× 53 573
Jinglong Zuo China 5 160 0.6× 218 1.0× 55 0.3× 50 0.7× 15 0.3× 16 311
Zhibin Zhou United States 9 303 1.2× 229 1.1× 379 2.3× 60 0.8× 20 0.4× 16 543
Christoforos Ntantogian Greece 12 218 0.9× 183 0.9× 126 0.8× 81 1.1× 9 0.2× 45 397
Juan Manuel González Nieto Australia 10 145 0.6× 192 0.9× 167 1.0× 58 0.8× 68 1.4× 33 360
Kyungroul Lee South Korea 10 152 0.6× 130 0.6× 90 0.6× 25 0.4× 13 0.3× 38 306
P. Balasubramanie India 10 76 0.3× 123 0.6× 102 0.6× 59 0.8× 12 0.3× 61 282
Mohammad M. R. Chowdhury Norway 8 125 0.5× 186 0.9× 73 0.5× 42 0.6× 12 0.3× 23 289
Thanh T. L. Tran United States 7 70 0.3× 141 0.7× 168 1.0× 50 0.7× 39 0.8× 8 329

Countries citing papers authored by Im-Yeong Lee

Since Specialization
Citations

This map shows the geographic impact of Im-Yeong Lee's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Im-Yeong Lee with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Im-Yeong Lee more than expected).

Fields of papers citing papers by Im-Yeong Lee

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Im-Yeong Lee. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Im-Yeong Lee. The network helps show where Im-Yeong Lee may publish in the future.

Co-authorship network of co-authors of Im-Yeong Lee

This figure shows the co-authorship network connecting the top 25 collaborators of Im-Yeong Lee. A scholar is included among the top collaborators of Im-Yeong Lee based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Im-Yeong Lee. Im-Yeong Lee is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
2.
Kim, Taehoon, et al.. (2023). Data Access Control for Secure Authentication Using Dual VC Scheme Based on CP-ABE in DID. Journal of Circuits Systems and Computers. 33(5).
3.
Lee, Im-Yeong, et al.. (2022). An SKP‐ABE Scheme for Secure and Efficient Data Sharing in Cloud Environments. Wireless Communications and Mobile Computing. 2022(1). 4 indexed citations
4.
Kim, Wonbin & Im-Yeong Lee. (2021). Survey on Data Deduplication in Cloud StorageEnvironments. Journal of Information Processing Systems. 17(3). 658–673. 5 indexed citations
5.
Kim, Donghyun, et al.. (2021). A Federated Framework for Fine-Grained Cloud Access Control for Intelligent Big Data Analytic by Service Providers. IEEE Access. 9. 47084–47095. 9 indexed citations
6.
Kim, Wonbin, et al.. (2021). Data Distribution for Multiple Receivers in a Connected Car Environment Using 5G Communication. Security and Communication Networks. 2021. 1–14. 3 indexed citations
7.
Lee, Im-Yeong, et al.. (2021). Pairing-Free Signatures With Insider-Attack Resistance for Vehicular Ad-Hoc Networks (VANETs). IEEE Access. 9. 159587–159597. 7 indexed citations
8.
Lee, Im-Yeong, et al.. (2021). A Study on CP-ABE Based Data Sharing System that Provides Signature-based Verifiable Outsourcing. 14. 1–5. 2 indexed citations
9.
Lee, Im-Yeong, et al.. (2021). A Lightweight Certificate-Based Aggregate Signature Scheme Providing Key Insulation. Computers, materials & continua/Computers, materials & continua (Print). 69(2). 1747–1764. 5 indexed citations
11.
Lee, Im-Yeong, et al.. (2016). Mutual Authentication Scheme Based on Lattice for NFC-PCM Payment Service Environment. International Journal of Distributed Sensor Networks. 12(7). 9471539–9471539. 6 indexed citations
12.
Kim, Suhyun & Im-Yeong Lee. (2014). Block Access Token Renewal Scheme Based on Secret Sharing in Apache Hadoop. Entropy. 16(8). 4185–4198. 11 indexed citations
13.
Lee, Im-Yeong, et al.. (2011). Authentication protocol using an identifier in an ad hoc network environment. Mathematical and Computer Modelling. 55(1-2). 134–141. 3 indexed citations
14.
Yim, Kangbin, et al.. (2010). A Secure Solution for USB Flash Drives Using FAT File System Structure. 9. 487–492. 2 indexed citations
15.
Lee, Im-Yeong, et al.. (2008). A Study on UICC(Universal IC Card)-based Authentication Mechanism using OTP. Information Security and Cryptology. 18(2). 21–31. 1 indexed citations
16.
Lee, Im-Yeong, et al.. (2006). A Study on the Electronic Voting System using blind Signature for Anonymity. 2. 660–663. 5 indexed citations
17.
Lee, Im-Yeong, et al.. (2005). A Study on RFID System with Secure Service Availability for Ubiquitous Computing. Journal of Information Processing Systems. 1(1). 96–101. 5 indexed citations
18.
Lee, Im-Yeong, et al.. (2004). A study on contents distribution using electronic cash system. 47. 333–340. 2 indexed citations
19.
Lee, Im-Yeong, et al.. (1999). An Efficient Electronic Cash Protocol with Anonymity Control and Divisible Scheme. 26(7). 839–846. 2 indexed citations
20.
Lee, Im-Yeong & J.A. Silvester. (1982). An iterative scheme for performance modeling of slotted ALOHA packet radio networks. International Conference on Communications. 3. 9 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026