Li Ji

691 total citations · 1 hit paper
19 papers, 471 citations indexed

About

Li Ji is a scholar working on Artificial Intelligence, Computer Networks and Communications and Information Systems. According to data from OpenAlex, Li Ji has authored 19 papers receiving a total of 471 indexed citations (citations by other indexed papers that have themselves been cited), including 11 papers in Artificial Intelligence, 3 papers in Computer Networks and Communications and 3 papers in Information Systems. Recurrent topics in Li Ji's work include Cryptography and Data Security (4 papers), Privacy-Preserving Technologies in Data (4 papers) and Geomechanics and Mining Engineering (2 papers). Li Ji is often cited by papers focused on Cryptography and Data Security (4 papers), Privacy-Preserving Technologies in Data (4 papers) and Geomechanics and Mining Engineering (2 papers). Li Ji collaborates with scholars based in China, Brazil and United States. Li Ji's co-authors include Hui Gao, Tiejun Lv, Yueming Lu, Wenfen Liu, Xuexian Hu, Jianghong Wei, Kaiyang Li, Zaobo He, Yi Liang and Yingshu Li and has published in prestigious journals such as Computer Networks, Tsinghua Science & Technology and Chinese Physics B.

In The Last Decade

Li Ji

16 papers receiving 459 citations

Hit Papers

Deep reinforcement learning based computation offloading ... 2018 2026 2020 2023 2018 100 200 300 400

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Li Ji China 5 363 184 120 106 60 19 471
Zoubeir Mlika Canada 14 380 1.0× 337 1.8× 123 1.0× 64 0.6× 27 0.5× 33 567
Mohammed Zaki Hasan United States 12 494 1.4× 243 1.3× 50 0.4× 99 0.9× 40 0.7× 22 579
Vasaka Visoottiviseth Thailand 12 345 1.0× 108 0.6× 163 1.4× 107 1.0× 51 0.8× 57 468
Yanli Qi China 8 276 0.8× 248 1.3× 80 0.7× 54 0.5× 50 0.8× 16 474
Canhuang Dai China 7 300 0.8× 381 2.1× 123 1.0× 87 0.8× 42 0.7× 8 608
Ziling Wei China 10 239 0.7× 141 0.8× 109 0.9× 60 0.6× 67 1.1× 42 370
Weifeng Lu China 10 264 0.7× 136 0.7× 75 0.6× 122 1.2× 42 0.7× 41 375
Nishat I Mowla South Korea 9 275 0.8× 202 1.1× 166 1.4× 43 0.4× 29 0.5× 16 486
Huangxun Chen China 9 142 0.4× 90 0.5× 91 0.8× 186 1.8× 46 0.8× 26 371
Richeng Jin China 13 379 1.0× 229 1.2× 298 2.5× 104 1.0× 64 1.1× 61 640

Countries citing papers authored by Li Ji

Since Specialization
Citations

This map shows the geographic impact of Li Ji's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Li Ji with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Li Ji more than expected).

Fields of papers citing papers by Li Ji

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Li Ji. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Li Ji. The network helps show where Li Ji may publish in the future.

Co-authorship network of co-authors of Li Ji

This figure shows the co-authorship network connecting the top 25 collaborators of Li Ji. A scholar is included among the top collaborators of Li Ji based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Li Ji. Li Ji is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

19 of 19 papers shown
1.
Gu, Chunxiang, et al.. (2024). Stateful black-box fuzzing for encryption protocols and its application in IPsec. Computer Networks. 251. 110605–110605.
2.
Yang, Chao, et al.. (2023). Research on fusion model of BERT and CNN-BiLSTM for short text classification. 47. 525–529. 3 indexed citations
3.
Ji, Li, et al.. (2021). LightSEEN: Real-Time Unknown Traffic Discovery via Lightweight Siamese Networks. Security and Communication Networks. 2021. 1–12. 2 indexed citations
4.
Ji, Li, Jianghong Wei, Mao Ye, Wenfen Liu, & Xuexian Hu. (2019). Privacy‐preserving constrained spectral clustering algorithm for large‐scale data sets. IET Information Security. 14(3). 321–331. 5 indexed citations
5.
Zhang, Yuxuan, et al.. (2019). Graph Degree Histogram Publication Method with Node-Differential Privacy. 56(3). 508. 2 indexed citations
6.
Ji, Li, Hui Gao, Tiejun Lv, & Yueming Lu. (2018). Deep reinforcement learning based computation offloading and resource allocation for MEC. 1–6. 402 indexed citations breakdown →
7.
He, Zaobo, Yingshu Li, Li Ji, et al.. (2018). Achieving differential privacy of genomic data releasing via belief propagation. Tsinghua Science & Technology. 23(4). 389–395. 10 indexed citations
8.
Ji, Li, Jianghong Wei, Wenfen Liu, & Xuexian Hu. (2017). PMDP: A Framework for Preserving Multiparty Data Privacy in Cloud Computing. Security and Communication Networks. 2017. 1–14. 17 indexed citations
9.
Ji, Li. (2013). Topological and Isotopic Equivalence with Applications to Visualization. OpenCommons - UConn (University of Connecticut). 1 indexed citations
10.
Ye, Conghuan, Li Ji, & Zenggang Xiong. (2012). A Secure Content Distribution Based on Chaotic Desynchronization. 906–909. 1 indexed citations
11.
Hu, Ming‐Liang, et al.. (2011). Using Josephson charge qubits system to realize the transfer of a special kind of quantum state. Acta Physica Sinica. 60(1). 10302–10302. 2 indexed citations
12.
Ji, Li, et al.. (2011). Using a quantum dot system to realize perfect state transfer. Chinese Physics B. 20(10). 100308–100308. 3 indexed citations
14.
Ji, Li. (2009). An Efficient and Provably Secure Identity-Based Signature Scheme in the Standard Model. 1 indexed citations
15.
Xiao, Fang, et al.. (2006). Liupanshan Loess Since Last 1.8Ma B.P.on Longxi Basin of Western China and Its Response to Tectonic Movement and Climate. 2 indexed citations
16.
Ji, Li. (2005). Design on ferroconcrete shear wall of high-rise building in 8 angle area. Shanxi Architecture.
17.
Ji, Li, et al.. (2003). A Nonrepudiable Threshold Proxy Signcryption Scheme with Known Proxy Agent. 3 indexed citations
18.
Ji, Li. (2002). IMPROVEMENT OF A THRESHOLD PROXY SIGNATURE SCHEME. 14 indexed citations
19.
Ji, Li. (2000). Engineering materials constitutive modeling and its parameters' back analysis. 2 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026