Jiwu Jing

3.7k total citations · 1 hit paper
104 papers, 2.4k citations indexed

About

Jiwu Jing is a scholar working on Artificial Intelligence, Computer Networks and Communications and Information Systems. According to data from OpenAlex, Jiwu Jing has authored 104 papers receiving a total of 2.4k indexed citations (citations by other indexed papers that have themselves been cited), including 66 papers in Artificial Intelligence, 39 papers in Computer Networks and Communications and 36 papers in Information Systems. Recurrent topics in Jiwu Jing's work include Security and Verification in Computing (26 papers), Cryptography and Data Security (24 papers) and Advanced Malware Detection Techniques (23 papers). Jiwu Jing is often cited by papers focused on Security and Verification in Computing (26 papers), Cryptography and Data Security (24 papers) and Advanced Malware Detection Techniques (23 papers). Jiwu Jing collaborates with scholars based in China, United States and Singapore. Jiwu Jing's co-authors include Jun Tao, Renjian Zhang, Jinwei Cao, Zexiang Shen, S. C. Hsu, Z. Chen, C LEE, Gehui Wang, Yibing Zhao and Lailai Zhu and has published in prestigious journals such as SHILAP Revista de lepidopterología, Atmospheric chemistry and physics and IEEE Transactions on Computers.

In The Last Decade

Jiwu Jing

94 papers receiving 2.3k citations

Hit Papers

Chemical characterization and source apportionment of PM ... 2013 2026 2017 2021 2013 250 500 750 1000

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Jiwu Jing China 18 1.1k 1.0k 647 472 461 104 2.4k
Shih Yu Chang Taiwan 27 750 0.7× 888 0.8× 264 0.4× 59 0.1× 269 0.6× 170 2.8k
Feng Cao China 16 340 0.3× 299 0.3× 258 0.4× 128 0.3× 160 0.3× 101 1.4k
Tianhe Chi China 17 739 0.7× 239 0.2× 141 0.2× 122 0.3× 1.1k 2.3× 91 1.9k
Hamdy K. Elminir Egypt 19 337 0.3× 277 0.3× 716 1.1× 72 0.2× 437 0.9× 51 2.2k
Ling Peng China 17 710 0.7× 226 0.2× 120 0.2× 98 0.2× 1.1k 2.3× 48 1.8k
Pengfei Li China 20 276 0.3× 240 0.2× 167 0.3× 175 0.4× 130 0.3× 76 1.1k
Xiaojing Yao China 14 589 0.5× 184 0.2× 89 0.1× 102 0.2× 818 1.8× 38 1.4k
Lifei Wei China 27 81 0.1× 305 0.3× 1.1k 1.7× 760 1.6× 387 0.8× 110 2.6k
Can Liu China 19 331 0.3× 378 0.4× 96 0.1× 89 0.2× 211 0.5× 140 995

Countries citing papers authored by Jiwu Jing

Since Specialization
Citations

This map shows the geographic impact of Jiwu Jing's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Jiwu Jing with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Jiwu Jing more than expected).

Fields of papers citing papers by Jiwu Jing

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Jiwu Jing. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Jiwu Jing. The network helps show where Jiwu Jing may publish in the future.

Co-authorship network of co-authors of Jiwu Jing

This figure shows the co-authorship network connecting the top 25 collaborators of Jiwu Jing. A scholar is included among the top collaborators of Jiwu Jing based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Jiwu Jing. Jiwu Jing is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Zheng, Fangyu, et al.. (2025). GIF-FHE: A Comprehensive Implementation and Evaluation of GPU-Accelerated FHE With Integer and Floating-Point Computing Power. IEEE Transactions on Parallel and Distributed Systems. 36(8). 1524–1541. 1 indexed citations
2.
Shi, Wen‐Juan, Yüjie Guo, Lin Zhang, et al.. (2025). Study of crystal structure and selective gas adsorption of one Zn-MOF based on bifunctional azole-carboxylic ligands. Journal of Molecular Structure. 1343. 142786–142786. 1 indexed citations
3.
Wang, Yuewu, et al.. (2024). Condo: Enhancing Container Isolation Through Kernel Permission Data Protection. IEEE Transactions on Information Forensics and Security. 19. 6168–6183. 3 indexed citations
4.
Zheng, Fangyu, et al.. (2024). AsyncGBP+: Bridging SSL/TLS and Heterogeneous Computing Power With GPU-Based Providers. IEEE Transactions on Computers. 74(2). 356–370. 1 indexed citations
5.
Qiao, Wenxiao, et al.. (2023). New cryptanalysis of LowMC with algebraic techniques. Designs Codes and Cryptography. 91(5). 2057–2075.
6.
Liu, Limin, et al.. (2022). You Are Revoked and Out: Towards Directly Revocable Ciphertext-Policy Attribute-Based Encryption. Security and Communication Networks. 2022. 1–17. 1 indexed citations
7.
Ma, Yuan, et al.. (2021). A Lightweight Full Entropy TRNG With On-Chip Entropy Assurance. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 40(12). 2431–2444. 17 indexed citations
8.
Lv, Na, et al.. (2020). High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators. Security and Communication Networks. 2020. 1–18. 5 indexed citations
9.
Ma, Yuan, et al.. (2019). Entropy Estimation for ADC Sampling-Based True Random Number Generators. IEEE Transactions on Information Forensics and Security. 14(11). 2887–2900. 23 indexed citations
10.
Jing, Jiwu, et al.. (2016). FPGA design and system optimizations with new technologies. 2.1.1–2.1.4. 1 indexed citations
11.
Zheng, Fangyu, et al.. (2016). An Efficient Elliptic Curve Cryptography Signature Server With GPU Acceleration. IEEE Transactions on Information Forensics and Security. 12(1). 111–122. 63 indexed citations
12.
Guan, Le, Jingqiang Lin, Bo Luo, Jiwu Jing, & Jing Wang. (2015). Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory. 3–19. 68 indexed citations
13.
Tao, Jun, Jian Gao, Leiming Zhang, et al.. (2014). PM 2.5 pollution in a megacity of southwest China: source apportionment and implication. Atmospheric chemistry and physics. 14(16). 8679–8699. 348 indexed citations
14.
Ma, Yuan, et al.. (2014). A High-Speed Elliptic Curve Cryptographic Processor for Generic Curves over GF(p). 6 indexed citations
15.
Zhang, Renjian, Jiwu Jing, Jun Tao, et al.. (2013). Chemical characterization and source apportionment of PM 2.5 in Beijing: seasonal perspective. Atmospheric chemistry and physics. 13(14). 7053–7074. 1043 indexed citations breakdown →
16.
Jing, Jiwu, et al.. (2009). SA-DBSCAN:A self-adaptive density-based clustering algorithm. 26(4). 530. 2 indexed citations
17.
Jing, Jiwu. (2009). Efficient CAPTCHA Recognition Technology and CAPTCHA Classification Idea. Jisuanji gongcheng. 2 indexed citations
18.
Jhi, Yoon‐Chan, et al.. (2009). PWC: a proactive worm containment solution for enterprise networks. Security and Communication Networks. 3(4). 334–354. 2 indexed citations
19.
Jing, Jiwu, et al.. (2006). An Administrative Model for Role-Based Access Control Using Hierarchical Namespace.. Journal of the Association for Information Systems. 30. 1 indexed citations
20.
Jing, Jiwu. (2001). New Field of Information Security-Information Hiding. Jisuanji yingyong yanjiu. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026