Jean Leneutre

679 total citations
35 papers, 383 citations indexed

About

Jean Leneutre is a scholar working on Computer Networks and Communications, Information Systems and Artificial Intelligence. According to data from OpenAlex, Jean Leneutre has authored 35 papers receiving a total of 383 indexed citations (citations by other indexed papers that have themselves been cited), including 23 papers in Computer Networks and Communications, 10 papers in Information Systems and 8 papers in Artificial Intelligence. Recurrent topics in Jean Leneutre's work include Mobile Ad Hoc Networks (12 papers), Cooperative Communication and Network Coding (7 papers) and Wireless Networks and Protocols (6 papers). Jean Leneutre is often cited by papers focused on Mobile Ad Hoc Networks (12 papers), Cooperative Communication and Network Coding (7 papers) and Wireless Networks and Protocols (6 papers). Jean Leneutre collaborates with scholars based in France, United States and Australia. Jean Leneutre's co-authors include Lin Chen, Hervé Debar, Lavy Libman, David Bateman, Ruan He, Marc Lacoste, Sophie Chabridon, Maryline Laurent, Yves Roudier and Nouha Oualha and has published in prestigious journals such as IEEE Journal on Selected Areas in Communications, Sensors and ACM Computing Surveys.

In The Last Decade

Jean Leneutre

33 papers receiving 370 citations

Peers

Jean Leneutre
Stuart H. Kurkowski United States
Omid Fatemieh United States
Kai Zhou United States
Thomas Locher Switzerland
Jinchun Choi United States
Stuart H. Kurkowski United States
Jean Leneutre
Citations per year, relative to Jean Leneutre Jean Leneutre (= 1×) peers Stuart H. Kurkowski

Countries citing papers authored by Jean Leneutre

Since Specialization
Citations

This map shows the geographic impact of Jean Leneutre's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Jean Leneutre with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Jean Leneutre more than expected).

Fields of papers citing papers by Jean Leneutre

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Jean Leneutre. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Jean Leneutre. The network helps show where Jean Leneutre may publish in the future.

Co-authorship network of co-authors of Jean Leneutre

This figure shows the co-authorship network connecting the top 25 collaborators of Jean Leneutre. A scholar is included among the top collaborators of Jean Leneutre based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Jean Leneutre. Jean Leneutre is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Leneutre, Jean, et al.. (2023). Attack Graphs & Subset Sabotage Games. SPIRE - Sciences Po Institutional REpository. 17(1). 77–88.
2.
Leneutre, Jean, et al.. (2022). Reasoning about Moving Target Defense in Attack Modeling Formalisms. SPIRE - Sciences Po Institutional REpository. 55–65. 2 indexed citations
3.
Leneutre, Jean, et al.. (2021). Subset sabotage games & attack graphs. SPIRE - Sciences Po Institutional REpository. 1 indexed citations
4.
Leneutre, Jean, et al.. (2021). Risks and Security of Internet and Systems. Lecture notes in computer science. 7 indexed citations
5.
Leneutre, Jean, et al.. (2021). Water- PUF: An Insider Threat Resistant PUF Enrollment Protocol Based on Machine Learning Watermarking. SPIRE - Sciences Po Institutional REpository. 1–10. 2 indexed citations
6.
Leneutre, Jean, et al.. (2021). Security Analysis of Machine Learning-Based PUF Enrollment Protocols: A Review. Sensors. 21(24). 8415–8415. 6 indexed citations
7.
Conan, Denis, et al.. (2020). Privacy-preserving Content-based Publish/Subscribe with Encrypted Matching and Data Splitting. SPIRE - Sciences Po Institutional REpository. 405–414. 1 indexed citations
8.
Laurent, Maryline, et al.. (2019). Authenticated and Privacy-Preserving Consent Management in the Internet of Things. Procedia Computer Science. 151. 256–263. 10 indexed citations
9.
Debar, Hervé, et al.. (2018). A Survey on Game-Theoretic Approaches for Intrusion Detection and Response Optimization. ACM Computing Surveys. 51(5). 1–31. 41 indexed citations
10.
Oualha, Nouha, Jean Leneutre, & Yves Roudier. (2011). Verifying remote data integrity in peer-to-peer data storage: A comprehensive survey of protocols. Peer-to-Peer Networking and Applications. 5(3). 231–243. 6 indexed citations
11.
Chen, Lin & Jean Leneutre. (2011). Fight jamming with jamming – A game theoretic analysis of jamming attack in wireless networks and defense strategy. Computer Networks. 55(9). 2259–2270. 25 indexed citations
12.
Chen, Lin & Jean Leneutre. (2009). On Multipath Routing in Multihop Wireless Networks: Security, Performance, and Their Tradeoff. EURASIP Journal on Wireless Communications and Networking. 2009(1). 21 indexed citations
13.
Chen, Lin & Jean Leneutre. (2009). Efficient medium access control design for autonomous wireless networks - A game theoretic approach. 6. 376–383. 3 indexed citations
14.
Leneutre, Jean, et al.. (2007). A Security Policy System for Mobile Autonomic Networks. 1 indexed citations
15.
Leneutre, Jean, et al.. (2007). Towards an Autonomic Security System for Mobile Ad Hoc Networks. 29–32. 3 indexed citations
16.
Chen, Lin & Jean Leneutre. (2007). A Game Theoretic Framework of Distributed Power and Rate Control in IEEE 802.11 WLANs. 338–339. 1 indexed citations
17.
Leneutre, Jean, et al.. (2007). Towards an Autonomic Security System for Mobile Ad Hoc Networks. 29–32. 2 indexed citations
18.
Chen, Lin, et al.. (2006). A Lightweight Mechanism to Secure OLSR.. International MultiConference of Engineers and Computer Scientists. 887–895. 1 indexed citations
19.
Chen, Lin, et al.. (2006). A Secure and Efficient Link State Routing Protocol for Ad Hoc Networks. 36–36. 2 indexed citations
20.
Chen, Lin & Jean Leneutre. (2006). A Secure and Scalable Time Synchronization Protocol in IEEE 802.11 Ad Hoc Networks. 207–214. 7 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026