Jingqiang Lin

2.2k total citations · 1 hit paper
67 papers, 1.1k citations indexed

About

Jingqiang Lin is a scholar working on Artificial Intelligence, Information Systems and Computer Networks and Communications. According to data from OpenAlex, Jingqiang Lin has authored 67 papers receiving a total of 1.1k indexed citations (citations by other indexed papers that have themselves been cited), including 51 papers in Artificial Intelligence, 27 papers in Information Systems and 19 papers in Computer Networks and Communications. Recurrent topics in Jingqiang Lin's work include Cryptography and Data Security (28 papers), Security and Verification in Computing (15 papers) and Cryptographic Implementations and Security (13 papers). Jingqiang Lin is often cited by papers focused on Cryptography and Data Security (28 papers), Security and Verification in Computing (15 papers) and Cryptographic Implementations and Security (13 papers). Jingqiang Lin collaborates with scholars based in China, United States and Denmark. Jingqiang Lin's co-authors include Bo Luo, Fengjun Li, Abdulmalik Humayed, Jiwu Jing, Le Guan, Yuan Ma, Fangyu Zheng, Jing Wang, Zhaohui Chen and Tianyu Chen and has published in prestigious journals such as SHILAP Revista de lepidopterología, IEEE Transactions on Industrial Informatics and IEEE Transactions on Computers.

In The Last Decade

Jingqiang Lin

59 papers receiving 1.1k citations

Hit Papers

Cyber-Physical Systems Security—A Survey 2017 2026 2020 2023 2017 200 400 600

Peers

Jingqiang Lin
Sibin Mohan United States
Tiago Cruz Portugal
Neetesh Saxena United Kingdom
Lucas C. K. Hui Hong Kong
Richard Candell United States
Abdulmalik Humayed United States
Jairo Giraldo Colombia
Bruce McMillin United States
Sibin Mohan United States
Jingqiang Lin
Citations per year, relative to Jingqiang Lin Jingqiang Lin (= 1×) peers Sibin Mohan

Countries citing papers authored by Jingqiang Lin

Since Specialization
Citations

This map shows the geographic impact of Jingqiang Lin's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Jingqiang Lin with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Jingqiang Lin more than expected).

Fields of papers citing papers by Jingqiang Lin

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Jingqiang Lin. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Jingqiang Lin. The network helps show where Jingqiang Lin may publish in the future.

Co-authorship network of co-authors of Jingqiang Lin

This figure shows the co-authorship network connecting the top 25 collaborators of Jingqiang Lin. A scholar is included among the top collaborators of Jingqiang Lin based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Jingqiang Lin. Jingqiang Lin is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Zheng, Fangyu, et al.. (2025). HTM-PQC: Hardening Cryptography Keys Under the Trend of Post-Quantum Cryptography Migration on Industrial Internet. IEEE Transactions on Industrial Informatics. 21(4). 3504–3514. 2 indexed citations
2.
Li, Meng, et al.. (2025). Swift: Fast Secure Neural Network Inference With Fully Homomorphic Encryption. IEEE Transactions on Information Forensics and Security. 20. 2793–2806. 1 indexed citations
3.
Zheng, Fangyu, et al.. (2025). GIF-FHE: A Comprehensive Implementation and Evaluation of GPU-Accelerated FHE With Integer and Floating-Point Computing Power. IEEE Transactions on Parallel and Distributed Systems. 36(8). 1524–1541. 1 indexed citations
4.
Dong, Zhenjiang, et al.. (2024). ECO-BIKE: Bridging the Gap Between PQC BIKE and GPU Acceleration. IEEE Transactions on Information Forensics and Security. 19. 8952–8965. 2 indexed citations
5.
Shi, Yusheng, et al.. (2024). On P-value Combination Procedures. Acta Mathematica Sinica English Series. 41(2). 569–587.
6.
Guo, Xiangxin, Shijie Jia, Jingqiang Lin, et al.. (2024). CryptoPyt: Unraveling Python Cryptographic APIs Misuse with Precise Static Taint Analysis. 1075–1091.
7.
Xiao, Fu, et al.. (2024). ECO-CRYSTALS: Efficient Cryptography CRYSTALS on Standard RISC-V ISA. IEEE Transactions on Computers. 74(2). 401–413. 2 indexed citations
9.
Jia, Shijie, Yuan Ma, Yuan Cao, et al.. (2023). A Design of High-Efficiency Coherent Sampling Based TRNG With On-Chip Entropy Assurance. IEEE Transactions on Circuits and Systems I Regular Papers. 70(12). 5060–5073. 4 indexed citations
10.
Wang, Qiongxiao, et al.. (2023). Semi-CT: Certificates Transparent to Identity Owners but Opaque to Snoopers. 1207–1213. 1 indexed citations
11.
Zheng, Fangyu, et al.. (2022). TEGRAS: An Efficient Tegra Embedded GPU-Based RSA Acceleration Server. IEEE Internet of Things Journal. 9(18). 16850–16861. 3 indexed citations
12.
Ma, Yuan, et al.. (2021). A Lightweight Full Entropy TRNG With On-Chip Entropy Assurance. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 40(12). 2431–2444. 17 indexed citations
13.
Lv, Na, et al.. (2020). High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators. Security and Communication Networks. 2020. 1–18. 5 indexed citations
14.
Wang, Ziyang, et al.. (2020). SEGIVE: A Practical Framework of Secure GPU Execution in Virtualization Environment. 1–10. 2 indexed citations
15.
Ma, Yuan, et al.. (2019). Entropy Estimation for ADC Sampling-Based True Random Number Generators. IEEE Transactions on Information Forensics and Security. 14(11). 2887–2900. 23 indexed citations
16.
Ma, Yuan, et al.. (2019). On the Analysis and Improvement of Min-Entropy Estimation on Time-Varying Data. IEEE Transactions on Information Forensics and Security. 15. 1696–1708. 9 indexed citations
17.
18.
Guan, Le, et al.. (2019). Mimosa: Protecting Private Keys Against Memory Disclosure Attacks Using Hardware Transactional Memory. IEEE Transactions on Dependable and Secure Computing. 18(3). 1196–1213. 6 indexed citations
19.
Zheng, Fangyu, et al.. (2018). Towards High-performance X25519/448 Key Agreement in General Purpose GPUs. 1–9. 9 indexed citations
20.
Guan, Le, Jingqiang Lin, Bo Luo, Jiwu Jing, & Jing Wang. (2015). Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory. 3–19. 68 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026