Jiqiang Lu

743 total citations
20 papers, 92 citations indexed

About

Jiqiang Lu is a scholar working on Artificial Intelligence, Computer Vision and Pattern Recognition and Signal Processing. According to data from OpenAlex, Jiqiang Lu has authored 20 papers receiving a total of 92 indexed citations (citations by other indexed papers that have themselves been cited), including 16 papers in Artificial Intelligence, 15 papers in Computer Vision and Pattern Recognition and 3 papers in Signal Processing. Recurrent topics in Jiqiang Lu's work include Cryptographic Implementations and Security (16 papers), Chaos-based Image/Signal Encryption (14 papers) and Coding theory and cryptography (9 papers). Jiqiang Lu is often cited by papers focused on Cryptographic Implementations and Security (16 papers), Chaos-based Image/Signal Encryption (14 papers) and Coding theory and cryptography (9 papers). Jiqiang Lu collaborates with scholars based in Singapore, China and South Korea. Jiqiang Lu's co-authors include Hua Guo, Jianwei Liu, Jongsung Kim, Qinglin Wang, Swee‐Huay Heng, Huaqun Guo, Wun‐She Yap, Matt Henricksen, Changhoon Lee and Bharadwaj Veeravalli and has published in prestigious journals such as Theoretical Computer Science, Lecture notes in computer science and The Computer Journal.

In The Last Decade

Jiqiang Lu

18 papers receiving 85 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Jiqiang Lu Singapore 6 71 67 13 12 12 20 92
Deniz Toz Belgium 3 66 0.9× 43 0.6× 17 1.3× 17 1.4× 8 0.7× 9 83
Kyoji Shibutani Taiwan 4 109 1.5× 81 1.2× 14 1.1× 13 1.1× 8 0.7× 10 124
Itai Dinur Israel 6 49 0.7× 29 0.4× 11 0.8× 10 0.8× 7 0.6× 17 63
Yonglin Hao China 5 103 1.5× 67 1.0× 7 0.5× 11 0.9× 12 1.0× 17 124
Kerem Varıcı Belgium 4 97 1.4× 69 1.0× 24 1.8× 16 1.3× 10 0.8× 12 116
Toru Akishita Denmark 4 96 1.4× 70 1.0× 12 0.9× 15 1.3× 8 0.7× 7 114
Taizo Shirai Japan 3 97 1.4× 70 1.0× 11 0.8× 12 1.0× 7 0.6× 4 109
Elena Andreeva Belgium 7 84 1.2× 67 1.0× 20 1.5× 19 1.6× 13 1.1× 25 104
Norbert Pramstaller Austria 8 101 1.4× 84 1.3× 14 1.1× 20 1.7× 15 1.3× 15 130
Erik Zenner Denmark 4 39 0.5× 34 0.5× 9 0.7× 11 0.9× 9 0.8× 12 56

Countries citing papers authored by Jiqiang Lu

Since Specialization
Citations

This map shows the geographic impact of Jiqiang Lu's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Jiqiang Lu with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Jiqiang Lu more than expected).

Fields of papers citing papers by Jiqiang Lu

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Jiqiang Lu. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Jiqiang Lu. The network helps show where Jiqiang Lu may publish in the future.

Co-authorship network of co-authors of Jiqiang Lu

This figure shows the co-authorship network connecting the top 25 collaborators of Jiqiang Lu. A scholar is included among the top collaborators of Jiqiang Lu based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Jiqiang Lu. Jiqiang Lu is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Lu, Jiqiang, et al.. (2025). Leading Degree: A Metric for Model Performance Evaluation and Hyperparameter Tuning in Deep Learning-Based Side-Channel Analysis. IACR Transactions on Cryptographic Hardware and Embedded Systems. 2025(2). 333–361.
2.
Lu, Jiqiang, et al.. (2023). Cryptanalysis Of A Type Of White-Box Implementations Of The SM4 Block Cipher. The Computer Journal. 67(5). 1663–1673.
3.
Lu, Jiqiang, et al.. (2023). Improved meet-in-the-middle attack on 10 rounds of the AES-256 block cipher. Designs Codes and Cryptography. 92(4). 957–973. 1 indexed citations
4.
Guo, Hua, et al.. (2021). Cryptanalysis of a white‐box SM4 implementation based on collision attack. IET Information Security. 16(1). 18–27. 7 indexed citations
5.
Wang, Qinglin & Jiqiang Lu. (2021). Fault Analysis of the ARIA and uBlock Block Ciphers. 1–6. 1 indexed citations
6.
Lu, Jiqiang, et al.. (2020). A Key Selected S-Box Mechanism and Its Investigation in Modern Block Cipher Design. Security and Communication Networks. 2020. 1–26. 4 indexed citations
7.
Guo, Huaqun, et al.. (2018). Protecting Train Balise Telegram Data Integrity. 806–811. 2 indexed citations
8.
Qiu, Ying & Jiqiang Lu. (2018). Critical Analysis of New Protocols on Lightweight Authentication. 325–330. 1 indexed citations
9.
Lu, Jiqiang, et al.. (2017). An investigation of an S-box mechanism in modern block cipher design. 28. 145–152. 1 indexed citations
11.
Lu, Jiqiang, Yongzhuang Wei, Jongsung Kim, & Enes Pašalić. (2014). The higher-order meet-in-the-middle attack and its application to the Camellia block cipher. Theoretical Computer Science. 527. 102–122. 1 indexed citations
12.
Lu, Jiqiang. (2014). A methodology for differential-linear cryptanalysis and its applications. Designs Codes and Cryptography. 77(1). 11–48. 15 indexed citations
13.
Kim, Jongsung, Hamid R. Arabnia, & Jiqiang Lu. (2013). Advanced Information Technologies in Future Computing Environments. Wireless Personal Communications. 73(4). 1345–1348. 1 indexed citations
14.
Lu, Jiqiang, Wun‐She Yap, Matt Henricksen, & Swee‐Huay Heng. (2013). Differential attack on nine rounds of the SEED block cipher. Information Processing Letters. 114(3). 116–123. 3 indexed citations
15.
Lu, Jiqiang. (2012). A Methodology for Differential-Linear Cryptanalysis and Its Applications - (Extended Abstract).. 69–89. 5 indexed citations
16.
Kim, Jongsung, Jiqiang Lu, & Ching‐Hsien Hsu. (2012). Advanced security technologies and applications for ubiquitous computing. Personal and Ubiquitous Computing. 17(5). 835–836. 1 indexed citations
17.
Lu, Jiqiang. (2010). The (related-key) impossible boomerang attack and its application to the AES block cipher. Designs Codes and Cryptography. 60(2). 123–143. 5 indexed citations
18.
Lu, Jiqiang. (2008). Related-key rectangle attack on 36 rounds of the XTEA block cipher. International Journal of Information Security. 8(1). 1–11. 27 indexed citations
19.
Lu, Jiqiang. (2008). Cryptanalysis of Block Ciphers. Royal Holloway Digital Repository (University of London). 12 indexed citations
20.
Lu, Jiqiang, Changhoon Lee, & Jongsung Kim. (2006). Related-key attacks on the full-round Cobra-F64a and Cobra-F64b. Lecture notes in computer science. 4116. 95–110. 2 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026