Junguo Liao

1.1k total citations
34 papers, 851 citations indexed

About

Junguo Liao is a scholar working on Computer Networks and Communications, Information Systems and Artificial Intelligence. According to data from OpenAlex, Junguo Liao has authored 34 papers receiving a total of 851 indexed citations (citations by other indexed papers that have themselves been cited), including 22 papers in Computer Networks and Communications, 19 papers in Information Systems and 14 papers in Artificial Intelligence. Recurrent topics in Junguo Liao's work include Advanced Authentication Protocols Security (16 papers), User Authentication and Security Systems (13 papers) and Cryptography and Data Security (8 papers). Junguo Liao is often cited by papers focused on Advanced Authentication Protocols Security (16 papers), User Authentication and Security Systems (13 papers) and Cryptography and Data Security (8 papers). Junguo Liao collaborates with scholars based in China, Saudi Arabia and India. Junguo Liao's co-authors include Xiong Li, Jianwei Niu, Muhammad Khurram Khan, Wei Liang, Saru Kumari, Fan Wu, Kim‐Kwang Raymond Choo, Xiaoke Zhao, Gengming Zhu and Hong Fan and has published in prestigious journals such as IEEE Internet of Things Journal, Nonlinear Dynamics and Journal of Network and Computer Applications.

In The Last Decade

Junguo Liao

30 papers receiving 816 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Junguo Liao China 11 692 632 273 203 94 34 851
Sangram Ray India 15 507 0.7× 475 0.8× 340 1.2× 76 0.4× 45 0.5× 45 765
Sanaz Rahimi Moosavi Finland 10 500 0.7× 358 0.6× 166 0.6× 73 0.4× 123 1.3× 22 727
Dariush Abbasinezhad‐Mood Iran 19 724 1.0× 617 1.0× 527 1.9× 99 0.5× 91 1.0× 33 1.1k
Hossein Shafagh Switzerland 12 691 1.0× 257 0.4× 209 0.8× 127 0.6× 66 0.7× 25 849
Muhammad Tanveer Pakistan 19 614 0.9× 481 0.8× 246 0.9× 105 0.5× 44 0.5× 47 912
Xin Qi United States 16 322 0.5× 416 0.7× 209 0.8× 175 0.9× 69 0.7× 56 899
Seo Yeon Moon South Korea 8 363 0.5× 285 0.5× 217 0.8× 253 1.2× 16 0.2× 10 633
Óscar García-Morchón Netherlands 10 439 0.6× 169 0.3× 145 0.5× 105 0.5× 51 0.5× 22 549
Nataliia Neshenko United States 7 450 0.7× 242 0.4× 237 0.9× 254 1.3× 16 0.2× 13 670
Hamid Mala Iran 10 290 0.4× 279 0.4× 213 0.8× 76 0.4× 37 0.4× 46 515

Countries citing papers authored by Junguo Liao

Since Specialization
Citations

This map shows the geographic impact of Junguo Liao's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Junguo Liao with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Junguo Liao more than expected).

Fields of papers citing papers by Junguo Liao

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Junguo Liao. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Junguo Liao. The network helps show where Junguo Liao may publish in the future.

Co-authorship network of co-authors of Junguo Liao

This figure shows the co-authorship network connecting the top 25 collaborators of Junguo Liao. A scholar is included among the top collaborators of Junguo Liao based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Junguo Liao. Junguo Liao is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Liao, Junguo, et al.. (2019). Vehicle Detection Based on Drone Images with the Improved Faster R-CNN. 466–471. 22 indexed citations
2.
Li, Xiong, et al.. (2019). A Novel Authentication Protocol with Strong Security for Roaming Service in Global Mobile Networks. Electronics. 8(9). 939–939. 2 indexed citations
3.
Li, Xiong, et al.. (2017). A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things. IEEE Internet of Things Journal. 5(3). 1606–1615. 177 indexed citations
4.
5.
Li, Xiong, Jianwei Niu, Saru Kumari, et al.. (2015). Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol. Nonlinear Dynamics. 80(3). 1209–1220. 35 indexed citations
6.
Li, Xiong, Junguo Liao, Saru Kumari, et al.. (2015). A New Dynamic ID-Based User Authentication Scheme Using Mobile Device: Cryptanalysis, the Principles and Design. Wireless Personal Communications. 85(1). 263–288. 3 indexed citations
7.
Wang, Hao & Junguo Liao. (2014). A CPK-based Privacy Enhanced Key Exchange Scheme for Vehicular Mesh Network. 3.097–3.097. 1 indexed citations
8.
Li, Xiong, Muhammad Khurram Khan, Saru Kumari, Junguo Liao, & Wei Liang. (2014). Cryptanalysis of a robust smart card authentication scheme for multi-server architecture. 120–123. 4 indexed citations
9.
Li, Xiong, Jianwei Niu, Saru Kumari, Junguo Liao, & Wei Liang. (2014). An Enhancement of a Smart Card Authentication Scheme for Multi-server Architecture. Wireless Personal Communications. 80(1). 175–192. 68 indexed citations
10.
Li, Xiong, Jianwei Niu, Yazhi Liu, Junguo Liao, & Wei Liang. (2014). Robust dynamic ID-based remote user authentication scheme using smart cards. International Journal of Ad Hoc and Ubiquitous Computing. 17(4). 254–254. 10 indexed citations
11.
Li, Xiong, Jianwei Niu, Junguo Liao, & Wei Liang. (2013). Cryptanalysis of a dynamic identity‐based remote user authentication scheme with verifiable password update. International Journal of Communication Systems. 28(2). 374–382. 84 indexed citations
12.
Li, Xiong, Jianwei Niu, Muhammad Khurram Khan, & Junguo Liao. (2013). An enhanced smart card based remote user password authentication scheme. Journal of Network and Computer Applications. 36(5). 1365–1371. 212 indexed citations
13.
Liao, Junguo, et al.. (2011). Anonymous electronic voting protocol with traceability. International Conference for Internet Technology and Secured Transactions. 59–66. 2 indexed citations
14.
Li, Shuhong, et al.. (2010). Study and Practice on the Course teaching of Information Security Introduction. Computer education.
15.
Liao, Junguo. (2009). Implementation and performance analysis of signcryption scheme in wireless sensor networks. Journal of Computer Applications. 1 indexed citations
16.
Liao, Junguo, et al.. (2009). Security Analysis of NSSK Protocol and its Improvement. 24. 115–118. 1 indexed citations
17.
Liao, Junguo. (2008). Intrusion Detection Based on a Fusion Classifier and SVM. Jisuanji fangzhen.
18.
Fan, Hong, et al.. (2007). Authorization management framework based on joint trust-risk evaluation. Wuhan University Journal of Natural Sciences. 12(1). 9–12. 2 indexed citations
19.
Fan, Hong, et al.. (2007). Intrusion Detection Using Ensemble of SVM Classifiers. 45–49. 2 indexed citations
20.
Liao, Junguo, Hong Fan, Zhaoli Zhang, & Ming Liu. (2006). Management of associations in the IRBAC 2000 model. Wuhan University Journal of Natural Sciences. 11(5). 1262–1266. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026