Liming Fang

3.4k total citations
113 papers, 2.2k citations indexed

About

Liming Fang is a scholar working on Artificial Intelligence, Information Systems and Computer Networks and Communications. According to data from OpenAlex, Liming Fang has authored 113 papers receiving a total of 2.2k indexed citations (citations by other indexed papers that have themselves been cited), including 77 papers in Artificial Intelligence, 45 papers in Information Systems and 20 papers in Computer Networks and Communications. Recurrent topics in Liming Fang's work include Cryptography and Data Security (50 papers), Privacy-Preserving Technologies in Data (32 papers) and Cloud Data Security Solutions (25 papers). Liming Fang is often cited by papers focused on Cryptography and Data Security (50 papers), Privacy-Preserving Technologies in Data (32 papers) and Cloud Data Security Solutions (25 papers). Liming Fang collaborates with scholars based in China, Australia and United States. Liming Fang's co-authors include Chunpeng Ge, Willy Susilo, Jinyue Xia, Zhe Liu, Jiandong Wang, Zhe Liu, Duncan S. Wong, Joonsang Baek, Kaitai Liang and Yongjun Ren and has published in prestigious journals such as Small, Optics Letters and Optics Express.

In The Last Decade

Liming Fang

109 papers receiving 2.1k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Liming Fang China 25 1.4k 1.1k 560 293 189 113 2.2k
Carl K. Chang United States 21 614 0.4× 1.1k 1.0× 454 0.8× 192 0.7× 83 0.4× 161 1.9k
Guojun Wang China 21 540 0.4× 492 0.5× 398 0.7× 118 0.4× 77 0.4× 93 1.5k
Mohamed Jmaïel Tunisia 20 553 0.4× 668 0.6× 653 1.2× 119 0.4× 81 0.4× 205 1.5k
Pascal Poupart Canada 26 1.5k 1.1× 127 0.1× 382 0.7× 484 1.7× 243 1.3× 117 2.4k
Patricia Bradley United States 16 971 0.7× 295 0.3× 198 0.4× 557 1.9× 129 0.7× 45 2.5k
Hafiz Farooq Ahmad Pakistan 20 836 0.6× 826 0.8× 704 1.3× 124 0.4× 23 0.1× 146 2.0k
Jiawei Yuan United States 18 788 0.6× 730 0.7× 354 0.6× 218 0.7× 18 0.1× 48 1.4k
Heli Sun China 21 733 0.5× 236 0.2× 214 0.4× 127 0.4× 59 0.3× 88 1.6k
Zaher Al Aghbari United Arab Emirates 21 608 0.4× 236 0.2× 568 1.0× 394 1.3× 43 0.2× 139 1.7k
Kuai Xu United States 24 774 0.6× 421 0.4× 1.3k 2.3× 79 0.3× 45 0.2× 80 1.9k

Countries citing papers authored by Liming Fang

Since Specialization
Citations

This map shows the geographic impact of Liming Fang's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Liming Fang with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Liming Fang more than expected).

Fields of papers citing papers by Liming Fang

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Liming Fang. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Liming Fang. The network helps show where Liming Fang may publish in the future.

Co-authorship network of co-authors of Liming Fang

This figure shows the co-authorship network connecting the top 25 collaborators of Liming Fang. A scholar is included among the top collaborators of Liming Fang based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Liming Fang. Liming Fang is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Fang, Liming, et al.. (2025). MACO: Model Anti-Extraction via Compiler Obfuscation. IEEE Transactions on Dependable and Secure Computing. 22(6). 7862–7876.
2.
Wang, Eric, et al.. (2024). Efficient Blockchain-Assisted Distributed Identity-Based Signature Scheme for Integrating Consumer Electronics in Metaverse. IEEE Transactions on Consumer Electronics. 70(1). 3770–3780. 26 indexed citations
3.
Zhou, Lu, et al.. (2024). ORR-CP-ABE: A secure and efficient outsourced attribute-based encryption scheme with decryption results reuse. Future Generation Computer Systems. 161. 559–571. 3 indexed citations
4.
Liang, Ke, Sihang Zhou, Meng Liu, et al.. (2024). Hawkes-Enhanced Spatial-Temporal Hypergraph Contrastive Learning Based on Criminal Correlations. Proceedings of the AAAI Conference on Artificial Intelligence. 38(8). 8733–8741. 5 indexed citations
5.
Ma, Chuan, et al.. (2023). Efficient and Low Overhead Website Fingerprinting Attacks and Defenses based on TCP/IP Traffic. 1991–1999. 10 indexed citations
6.
Yang, Xihong, Yue Liu, Sihang Zhou, et al.. (2023). Cluster-Guided Contrastive Graph Clustering Network. Proceedings of the AAAI Conference on Artificial Intelligence. 37(9). 10834–10842. 68 indexed citations
7.
Fang, Liming, Zhe Liu, Changting Lin, et al.. (2021). A Secure and Authenticated Mobile Payment Protocol Against Off-Site Attack Strategy. IEEE Transactions on Dependable and Secure Computing. 19(5). 3564–3578. 25 indexed citations
8.
Zhang, Hanyi, et al.. (2021). A Secure Revocable Fine-Grained Access Control and Data Sharing Scheme for SCADA in IIoT Systems. IEEE Internet of Things Journal. 9(3). 1976–1984. 15 indexed citations
9.
Wang, Dongyan, et al.. (2021). Code Synthesis for Dataflow-Based Embedded Software Design. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 41(1). 49–61. 10 indexed citations
10.
Wang, Xinyu, Yuefeng Du, Cong Wang, Qian Wang, & Liming Fang. (2021). WebEnclave: Protect Web Secrets From Browser Extensions With Software Enclave. IEEE Transactions on Dependable and Secure Computing. 19(5). 3055–3070. 1 indexed citations
11.
Zhao, Binbin, Shouling Ji, Wei‐Han Lee, et al.. (2020). A Large-Scale Empirical Study on the Vulnerability of Deployed IoT Devices. IEEE Transactions on Dependable and Secure Computing. 19(3). 1826–1840. 37 indexed citations
12.
Fang, Liming, et al.. (2020). ANCS: Automatic NXDomain Classification System Based on Incremental Fuzzy Rough Sets Machine Learning. IEEE Transactions on Fuzzy Systems. 29(4). 742–756. 8 indexed citations
13.
Guo, Jing, et al.. (2020). The Relationship Between Being Bullied and Addictive Internet Use Among Chinese Rural Adolescents: The Mediating Effect of Adult Attachment. Journal of Interpersonal Violence. 37(9-10). NP6466–NP6486. 23 indexed citations
14.
Fang, Liming, et al.. (2019). A Fine-Grained User-Divided Privacy-Preserving Access Control Protocol in Smart Watch. Sensors. 19(9). 2109–2109. 3 indexed citations
15.
Fang, Liming, Li Yang, Zhenyu Wen, et al.. (2019). THP: A Novel Authentication Scheme to Prevent Multiple Attacks in SDN-Based IoT Network. IEEE Internet of Things Journal. 7(7). 5745–5759. 38 indexed citations
17.
Guo, Jing, et al.. (2019). Husband’s smoking behaviors associated with women’s depression in China: the importance of a smoke-free household. Journal of Substance Use. 25(2). 194–200. 2 indexed citations
18.
Ren, Yongjun, et al.. (2014). Security Data Auditing based on Multifunction Digital Watermark for Multimedia File in Cloud Storage. International Journal of Multimedia and Ubiquitous Engineering. 9(9). 231–240. 5 indexed citations
19.
Fang, Liming. (2009). Thirty Years of Reforms and Opening-up:China’s Social Security System in Rapid Social Changes. Journal of Beijing Normal University. 1 indexed citations
20.
Zhang, Youdong, et al.. (2007). Network Forensic Computing Based on ANN-PCA. 942–945. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026