Kui Ren

35.4k total citations · 19 hit papers
370 papers, 22.5k citations indexed

About

Kui Ren is a scholar working on Artificial Intelligence, Computer Networks and Communications and Information Systems. According to data from OpenAlex, Kui Ren has authored 370 papers receiving a total of 22.5k indexed citations (citations by other indexed papers that have themselves been cited), including 220 papers in Artificial Intelligence, 113 papers in Computer Networks and Communications and 107 papers in Information Systems. Recurrent topics in Kui Ren's work include Cryptography and Data Security (109 papers), Privacy-Preserving Technologies in Data (84 papers) and Cloud Data Security Solutions (43 papers). Kui Ren is often cited by papers focused on Cryptography and Data Security (109 papers), Privacy-Preserving Technologies in Data (84 papers) and Cloud Data Security Solutions (43 papers). Kui Ren collaborates with scholars based in United States, China and Hong Kong. Kui Ren's co-authors include Wenjing Lou, Cong Wang, Qian Wang, Shucheng Yu, Ning Cao, Jin Li, Ming Li, Zhan Qin, Xingming Sun and Zhangjie Fu and has published in prestigious journals such as SHILAP Revista de lepidopterología, Proceedings of the IEEE and IEEE Transactions on Image Processing.

In The Last Decade

Kui Ren

347 papers receiving 20.8k citations

Hit Papers

Achieving Secure, Scalabl... 2009 2026 2014 2020 2010 2010 2010 2011 2013 250 500 750 1000

Author Peers

Peers are selected by citation overlap in the author's most active subfields. citations · hero ref

Author Last Decade Papers Cites
Kui Ren 14.5k 12.0k 6.2k 3.0k 2.9k 370 22.5k
Debiao He 8.3k 0.6× 11.6k 1.0× 9.6k 1.5× 1.6k 0.5× 3.1k 1.1× 431 17.3k
Wenjing Lou 12.6k 0.9× 10.7k 0.9× 8.0k 1.3× 1.6k 0.5× 3.2k 1.1× 331 20.3k
Jianfeng Ma 7.4k 0.5× 6.3k 0.5× 5.9k 1.0× 1.8k 0.6× 2.5k 0.9× 787 15.3k
Michael R. Lyu 9.9k 0.7× 14.1k 1.2× 9.3k 1.5× 5.2k 1.7× 1.1k 0.4× 626 26.6k
Jin Li 9.2k 0.6× 7.2k 0.6× 5.6k 0.9× 2.2k 0.7× 1.1k 0.4× 432 15.7k
Adi Shamir 14.9k 1.0× 6.3k 0.5× 5.7k 0.9× 6.0k 2.0× 2.1k 0.7× 93 20.5k
Rongxing Lu 10.3k 0.7× 6.6k 0.5× 10.1k 1.6× 1.6k 0.5× 7.0k 2.4× 633 20.9k
Xiaojiang Du 7.0k 0.5× 7.1k 0.6× 11.0k 1.8× 2.1k 0.7× 5.0k 1.8× 628 19.8k
Hai Jin 5.5k 0.4× 9.5k 0.8× 11.9k 1.9× 3.7k 1.2× 2.3k 0.8× 1.5k 20.4k
Adrian Perrig 11.7k 0.8× 6.6k 0.6× 23.3k 3.8× 2.0k 0.7× 5.5k 1.9× 314 31.0k

Countries citing papers authored by Kui Ren

Since Specialization
Citations

This map shows the geographic impact of Kui Ren's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Kui Ren with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Kui Ren more than expected).

Fields of papers citing papers by Kui Ren

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Kui Ren. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Kui Ren. The network helps show where Kui Ren may publish in the future.

Co-authorship network of co-authors of Kui Ren

This figure shows the co-authorship network connecting the top 25 collaborators of Kui Ren. A scholar is included among the top collaborators of Kui Ren based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Kui Ren. Kui Ren is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Mao, Xiaofeng, et al.. (2025). S-Eval: Towards Automated and Comprehensive Safety Evaluation for Large Language Models. Proceedings of the ACM on software engineering.. 2(ISSTA). 2136–2157.
2.
Liu, Jian, et al.. (2025). LookAhead: Preventing DeFi Attacks via Unveiling Adversarial Contracts. Proceedings of the ACM on software engineering.. 2(FSE). 1847–1869.
3.
Benedict, Lorin X., et al.. (2024). MM_Mix: An equation of state generation code for dense mixtures. AIP conference proceedings. 3066. 500002–500002.
5.
Chen, Wenqing, et al.. (2024). Self-Para-Consistency: Improving Reasoning Tasks at Low Cost for Large Language Models. CityU Scholars. 14162–14167.
6.
Liu, Jinfei, et al.. (2024). Share: Stackelberg-Nash based Data Markets. 3573–3586.
7.
Liu, Jinfei, et al.. (2024). When Data Pricing Meets Non-Cooperative Game Theory. 5548–5559. 1 indexed citations
8.
Chu, Zhixuan, et al.. (2024). A Causal Explainable Guardrails for Large Language Models. 1136–1150. 2 indexed citations
9.
Liu, Tiantian, Feng Lin, Chenhan Xu, et al.. (2023). WavoID: Robust and Secure Multi-modal User Identification via mmWave-voice Mechanism. 1–15. 8 indexed citations
10.
Ren, Kui, et al.. (2023). Privacy-Preserving Industrial Control System Anomaly Detection Platform. Security and Communication Networks. 2023. 1–12. 2 indexed citations
12.
Cui, Yong, Ningwei Dai, Zeqi Lai, et al.. (2019). TailCutter: Wisely Cutting Tail Latency in Cloud CDNs Under Cost Constraints. IEEE/ACM Transactions on Networking. 27(4). 1612–1628. 16 indexed citations
13.
Gu, Zhaoquan, Yuexuan Wang, Wei Shi, et al.. (2019). A Practical Neighbor Discovery Framework for Wireless Sensor Networks. Sensors. 19(8). 1887–1887. 4 indexed citations
14.
Zhu, Jie, Qi Li, Cong Wang, et al.. (2018). Enabling Generic, Verifiable, and Secure Data Search in Cloud Services. IEEE Transactions on Parallel and Distributed Systems. 29(8). 1721–1735. 78 indexed citations
15.
Mohaisen, Aziz, Zhongshu Gu, Kui Ren, et al.. (2018). Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation. IEEE Transactions on Dependable and Secure Computing. 17(4). 745–759. 2 indexed citations
16.
Zhang, Leo Yu, et al.. (2018). You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center. IEEE Transactions on Dependable and Secure Computing. 17(6). 1218–1231. 27 indexed citations
17.
Cui, Yong, Jian Song, Kui Ren, et al.. (2017). Software Defined Cooperative Offloading for Mobile Cloudlets. IEEE/ACM Transactions on Networking. 25(3). 1746–1760. 62 indexed citations
18.
Fan, Jingyuan, Chaowen Guan, Kui Ren, Yong Cui, & Chunming Qiao. (2017). SPABox: Safeguarding Privacy During Deep Packet Inspection at a MiddleBox. IEEE/ACM Transactions on Networking. 25(6). 3753–3766. 34 indexed citations
19.
Xia, Zhihua, et al.. (2016). A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing. IEEE Transactions on Information Forensics and Security. 11(11). 2594–2608. 524 indexed citations breakdown →
20.
Wang, Cong, Qian Wang, Kui Ren, & Wenjing Lou. (2009). Ensuring data storage security in Cloud Computing. 1–9. 472 indexed citations breakdown →

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026