Jiguo Li

6.5k total citations · 2 hit papers
171 papers, 4.8k citations indexed

About

Jiguo Li is a scholar working on Artificial Intelligence, Information Systems and Computational Theory and Mathematics. According to data from OpenAlex, Jiguo Li has authored 171 papers receiving a total of 4.8k indexed citations (citations by other indexed papers that have themselves been cited), including 157 papers in Artificial Intelligence, 75 papers in Information Systems and 60 papers in Computational Theory and Mathematics. Recurrent topics in Jiguo Li's work include Cryptography and Data Security (153 papers), Complexity and Algorithms in Graphs (60 papers) and Cloud Data Security Solutions (48 papers). Jiguo Li is often cited by papers focused on Cryptography and Data Security (153 papers), Complexity and Algorithms in Graphs (60 papers) and Cloud Data Security Solutions (48 papers). Jiguo Li collaborates with scholars based in China, Australia and Singapore. Jiguo Li's co-authors include Yichen Zhang, Yang Lu, Jinguang Han, Hao Yan, Qihong Yu, Jian Shen, Yao Wei, Yichen Zhang, Xinyi Huang and Yuyan Guo and has published in prestigious journals such as IEEE Access, Molecular Cancer and Information Sciences.

In The Last Decade

Jiguo Li

163 papers receiving 4.7k citations

Hit Papers

KSF-OABE: Outsourced Attribute-Based Encryption with Keyw... 2016 2026 2019 2022 2016 2016 50 100 150 200 250

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Jiguo Li China 38 4.3k 2.9k 832 832 420 171 4.8k
Yinbin Miao China 33 2.9k 0.7× 1.6k 0.5× 738 0.9× 292 0.4× 609 1.4× 166 3.6k
Jianting Ning China 24 1.9k 0.4× 1.3k 0.4× 481 0.6× 211 0.3× 216 0.5× 137 2.3k
Fuchun Guo Australia 23 1.4k 0.3× 964 0.3× 538 0.6× 249 0.3× 238 0.6× 120 1.9k
Seny Kamara United States 17 2.8k 0.7× 1.5k 0.5× 477 0.6× 671 0.8× 624 1.5× 35 3.2k
Masahiro Mambo Japan 14 1.4k 0.3× 1.2k 0.4× 1.2k 1.4× 315 0.4× 246 0.6× 71 2.3k
Mariana Raykova United States 15 1.4k 0.3× 1.1k 0.4× 649 0.8× 312 0.4× 144 0.3× 38 2.0k
Rocco De Nicola Italy 25 1.5k 0.4× 648 0.2× 1.0k 1.2× 1.3k 1.6× 43 0.1× 131 2.5k
Xingliang Yuan Australia 27 1.6k 0.4× 777 0.3× 415 0.5× 130 0.2× 310 0.7× 102 1.9k
Bernd–Holger Schlingloff Germany 10 1.3k 0.3× 409 0.1× 394 0.5× 1.9k 2.3× 43 0.1× 47 2.8k
Chunpeng Ge China 22 1.0k 0.2× 860 0.3× 353 0.4× 151 0.2× 175 0.4× 70 1.5k

Countries citing papers authored by Jiguo Li

Since Specialization
Citations

This map shows the geographic impact of Jiguo Li's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Jiguo Li with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Jiguo Li more than expected).

Fields of papers citing papers by Jiguo Li

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Jiguo Li. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Jiguo Li. The network helps show where Jiguo Li may publish in the future.

Co-authorship network of co-authors of Jiguo Li

This figure shows the co-authorship network connecting the top 25 collaborators of Jiguo Li. A scholar is included among the top collaborators of Jiguo Li based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Jiguo Li. Jiguo Li is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Li, Jiguo, et al.. (2025). TERCT: A Traceable and Editable Ring Confidential Transaction for Blockchain. IEEE Transactions on Dependable and Secure Computing. 22(6). 5931–5942.
2.
Li, Jiguo, et al.. (2025). Revocable Registered Attribute-Based Encryption With User Deregistration. IEEE Internet of Things Journal. 12(15). 31526–31535. 2 indexed citations
3.
Li, Jiguo, Ji Lin, Yichen Zhang, Yang Lu, & Jianting Ning. (2024). Response-Hiding and Volume-Hiding Verifiable Searchable Encryption With Conjunctive Keyword Search. IEEE Transactions on Computers. 74(2). 455–467. 7 indexed citations
4.
Ning, Jianting, et al.. (2024). Fine-Grained and Sanitizable Access Control Service for IoT-Based Digital Subscriptions. IEEE Internet of Things Journal. 11(20). 33940–33952.
5.
Ning, Jianting, et al.. (2024). DTACB: Dynamic Threshold Anonymous Credentials With Batch-Showing. IEEE Transactions on Information Forensics and Security. 19. 7744–7758. 1 indexed citations
6.
Du, Ruiying, Kun He, Jing Chen, et al.. (2024). Efficient Verifiable Dynamic Searchable Symmetric Encryption With Forward and Backward Security. IEEE Internet of Things Journal. 12(3). 2633–2645. 3 indexed citations
7.
Liu, Chao, Jing Yuan, Qiaoling Wang, et al.. (2023). The Effect of Diabetes Management Shared Care Clinic on Glycated Hemoglobin A1c Compliance and Self-Management Abilities in Patients with Type 2 Diabetes Mellitus. International Journal of Clinical Practice. 2023. 1–10. 3 indexed citations
8.
Yu, Qihong, Jiguo Li, & Jian Shen. (2023). ID-Based Ring Signature against Continual Side Channel Attack. Symmetry. 15(1). 179–179. 1 indexed citations
9.
Yu, Qihong, Jiguo Li, & Sai Ji. (2022). Hierarchical Identity-Based Online/Offline Encryption Scheme with Leakage Resilience. Security and Communication Networks. 2022. 1–11. 2 indexed citations
10.
Yu, Qihong, Jiguo Li, & Sai Ji. (2022). Fully Secure ID-Based Signature Scheme with Continuous Leakage Resilience. Security and Communication Networks. 2022. 1–12. 7 indexed citations
11.
Yu, Qihong, Jiguo Li, & Sai Ji. (2022). Anonymous Identity Based Broadcast Encryption against Continual Side Channel Attacks in the State Partition Model. Applied Sciences. 12(18). 9395–9395. 1 indexed citations
12.
Li, Jiguo, et al.. (2020). Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT. IEEE Transactions on Cloud Computing. 10(2). 762–773. 181 indexed citations
13.
Chen, Liqing, Jiguo Li, & Yichen Zhang. (2019). Adaptively Secure Anonymous Identity-based Broadcast Encryption for Data Access Control in Cloud Storage Service. KSII Transactions on Internet and Information Systems. 13(3). 12 indexed citations
14.
Lu, Yang, et al.. (2019). A certificate-based AKA protocol secure against public key replacement attacks.. The International Arab Journal of Information Technology. 16. 754–765. 4 indexed citations
15.
Miao, Yinbin, Ximeng Liu, Kim‐Kwang Raymond Choo, et al.. (2019). Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting. IEEE Transactions on Dependable and Secure Computing. 18(3). 1080–1094. 151 indexed citations
16.
Li, Jiguo, et al.. (2016). Provably Secure Certificate-based Conditional Proxy Re-encryption.. Journal of information science and engineering. 32. 813–830. 15 indexed citations
17.
Lu, Yang & Jiguo Li. (2014). Efficient Certificate-Based Encryption Scheme Secure Against Key Replacement Attacks in the Standard Model *. Journal of information science and engineering. 30. 1553–1568. 10 indexed citations
18.
Lu, Yang & Jiguo Li. (2012). CONSTRUCTING CERTIFICATE-BASED ENCRYPTION SECURE AGAINST KEY REPLACEMENT ATTACKS. 3(1). 195–200. 4 indexed citations
19.
Weng, Jian, et al.. (2011). On the Relation between Identity-Based Proxy Re-Encryption and Mediated Identity-Based Encryption *. Journal of information science and engineering. 27(1). 243–259. 3 indexed citations
20.
Li, Jiguo & Shuhong Wang. (2007). New Efficient Proxy Blind Signature Scheme Using Verifiable Self-certified Public Key. International journal of network security. 4. 193–200. 12 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026