Jianhua Li

7.1k total citations
321 papers, 4.7k citations indexed

About

Jianhua Li is a scholar working on Computer Networks and Communications, Artificial Intelligence and Information Systems. According to data from OpenAlex, Jianhua Li has authored 321 papers receiving a total of 4.7k indexed citations (citations by other indexed papers that have themselves been cited), including 181 papers in Computer Networks and Communications, 140 papers in Artificial Intelligence and 83 papers in Information Systems. Recurrent topics in Jianhua Li's work include IoT and Edge/Fog Computing (47 papers), Network Security and Intrusion Detection (44 papers) and Privacy-Preserving Technologies in Data (42 papers). Jianhua Li is often cited by papers focused on IoT and Edge/Fog Computing (47 papers), Network Security and Intrusion Detection (44 papers) and Privacy-Preserving Technologies in Data (42 papers). Jianhua Li collaborates with scholars based in China, Japan and United States. Jianhua Li's co-authors include Jun Wu, Kaoru Ota, Mianxiong Dong, Wu Yang, Xi Lin, Gaolei Li, Zhitao Guan, Gongliang Chen, Ali Kashif Bashir and Shahid Mumtaz and has published in prestigious journals such as SHILAP Revista de lepidopterología, PLoS ONE and IEEE Transactions on Industrial Electronics.

In The Last Decade

Jianhua Li

285 papers receiving 4.5k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Jianhua Li China 38 2.5k 1.6k 1.5k 1.1k 574 321 4.7k
Pradip Kumar Sharma United Kingdom 36 2.6k 1.0× 1.4k 0.8× 2.4k 1.7× 926 0.9× 521 0.9× 134 5.2k
Changjun Jiang China 39 2.2k 0.9× 2.2k 1.3× 2.3k 1.6× 839 0.8× 602 1.0× 370 6.3k
Daojing He China 41 2.8k 1.1× 1.4k 0.9× 1.5k 1.0× 838 0.8× 410 0.7× 184 4.2k
Jianhua Ma Japan 32 2.0k 0.8× 1.5k 0.9× 961 0.7× 723 0.7× 729 1.3× 252 4.5k
Sammy Chan Hong Kong 43 3.8k 1.5× 1.4k 0.8× 1.3k 0.9× 1.7k 1.6× 356 0.6× 254 5.4k
Nadra Guizani United States 38 2.2k 0.9× 1.2k 0.7× 1.4k 1.0× 1.1k 1.1× 443 0.8× 104 4.4k
Yulei Wu China 41 2.6k 1.1× 1.5k 0.9× 1.0k 0.7× 2.0k 1.9× 346 0.6× 201 5.3k
Kostas E. Psannis Greece 29 2.0k 0.8× 1.0k 0.6× 1.5k 1.0× 925 0.9× 773 1.3× 164 4.4k
Roberto Di Pietro Italy 41 3.7k 1.5× 2.6k 1.6× 3.0k 2.0× 723 0.7× 435 0.8× 241 6.8k
Yunhao Liu China 32 3.0k 1.2× 810 0.5× 1.1k 0.8× 1.1k 1.1× 460 0.8× 138 5.1k

Countries citing papers authored by Jianhua Li

Since Specialization
Citations

This map shows the geographic impact of Jianhua Li's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Jianhua Li with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Jianhua Li more than expected).

Fields of papers citing papers by Jianhua Li

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Jianhua Li. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Jianhua Li. The network helps show where Jianhua Li may publish in the future.

Co-authorship network of co-authors of Jianhua Li

This figure shows the co-authorship network connecting the top 25 collaborators of Jianhua Li. A scholar is included among the top collaborators of Jianhua Li based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Jianhua Li. Jianhua Li is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Li, Gaolei, et al.. (2025). HFL-RD: Heterogeneous Federated Learning-Empowered Ransomware Detection via APIs and Traffic Features. IEEE Transactions on Network and Service Management. 1–1.
2.
Li, Jianhua, et al.. (2024). A generative adversarial learning strategy for spatial inspection of compaction quality. Advanced Engineering Informatics. 62. 102791–102791. 8 indexed citations
4.
Li, Gaolei, et al.. (2024). BlockAgents: Towards Byzantine-Robust LLM-Based Multi-Agent Coordination via Blockchain. 187–192. 3 indexed citations
5.
Li, Gaolei, et al.. (2024). HSESR: Hierarchical Software Execution State Representation for Ultralow-Latency Threat Alerting Over Internet of Things. IEEE Internet of Things Journal. 11(21). 34283–34295. 2 indexed citations
6.
Sun, Kangkang, Lizheng Liu, Qianqian Pan, Jianhua Li, & Jun Wu. (2024). Large-Scale Mean-Field Federated Learning for Detection and Defense: A Byzantine Robustness Approach in IoT. IEEE Internet of Things Journal. 11(22). 36370–36383. 2 indexed citations
7.
Sun, Kangkang, Jun Wu, Ali Kashif Bashir, et al.. (2024). Personalized Privacy-Preserving Distributed Artificial Intelligence for Digital-Twin-Driven Vehicle Road Cooperation. IEEE Internet of Things Journal. 11(22). 35902–35916. 4 indexed citations
8.
Wu, Jun, et al.. (2023). Vulnerability-Aware Task Scheduling for Edge Intelligence Empowered Trajectory Analysis in Intelligent Transportation Systems. IEEE Transactions on Intelligent Transportation Systems. 24(4). 4661–4670. 15 indexed citations
9.
Wu, Jun, et al.. (2021). Privacy Preserved Cyber-Physical Searching for Information-Centric Intelligent Agriculture. SHILAP Revista de lepidopterología. 2. 106–116. 2 indexed citations
10.
Pan, Qianqian, Jun Wu, Xi Lin, & Jianhua Li. (2021). Side-Channel Analysis-Based Model Extraction on Intelligent CPS: An Information Theory Perspective. 254–261. 2 indexed citations
11.
Lin, Xi, Jun Wu, Shahid Mumtaz, et al.. (2020). Blockchain-Based On-Demand Computing Resource Trading in IoV-Assisted Smart City. IEEE Transactions on Emerging Topics in Computing. 9(3). 1373–1385. 146 indexed citations
12.
Wu, Jun, et al.. (2020). Trustworthy Edge Storage Orchestration in Intelligent Transportation Systems Using Reinforcement Learning. IEEE Transactions on Intelligent Transportation Systems. 22(7). 4443–4456. 63 indexed citations
13.
Li, Jianan, Jun Wu, Guangquan Xu, et al.. (2019). Integrating NFV and ICN for Advanced Driver-Assistance Systems. IEEE Internet of Things Journal. 7(7). 5861–5873. 21 indexed citations
14.
Dong, Mianxiong, et al.. (2019). Security Function Virtualization Based Moving Target Defense of SDN-Enabled Smart Grid. 1–6. 7 indexed citations
15.
Guo, Longhua, Jun Wu, Jun Wu, et al.. (2017). Software-defined networking model for smart transformers with ISO/IEC/IEEE 21451 sensors. ICT Express. 3(2). 67–71. 3 indexed citations
16.
Xu, Lei, Chunxiao Jiang, Yi Qian, et al.. (2016). Dynamic Privacy Pricing: A Multi-Armed Bandit Approach With Time-Variant Rewards. IEEE Transactions on Information Forensics and Security. 12(2). 271–285. 38 indexed citations
17.
Li, Jianhua, et al.. (2015). Fast Image Search with Locality‐Sensitive Hashing and Homogeneous Kernels Map. The Scientific World JOURNAL. 2015(1). 350676–350676. 4 indexed citations
18.
Li, Jianhua, et al.. (2010). Trading rules on stock markets using genetic network programming with subroutines. Society of Instrument and Control Engineers of Japan. 3084–3088. 2 indexed citations
19.
Liu, Jie & Jianhua Li. (2010). A Better Improvement on the Integrated Diffie-Hellman-DSA Key Agreement Protocol.. International journal of network security. 11. 114–117. 6 indexed citations
20.
Li, Jianhua, et al.. (2008). Constructing Efficient Certificateless Public Key Encryption with Pairing. International journal of network security. 6(1). 26–32. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026