Liran Ma

1.9k total citations
72 papers, 1.3k citations indexed

About

Liran Ma is a scholar working on Computer Networks and Communications, Electrical and Electronic Engineering and Artificial Intelligence. According to data from OpenAlex, Liran Ma has authored 72 papers receiving a total of 1.3k indexed citations (citations by other indexed papers that have themselves been cited), including 45 papers in Computer Networks and Communications, 35 papers in Electrical and Electronic Engineering and 20 papers in Artificial Intelligence. Recurrent topics in Liran Ma's work include Wireless Communication Security Techniques (12 papers), Wireless Networks and Protocols (12 papers) and Mobile Ad Hoc Networks (11 papers). Liran Ma is often cited by papers focused on Wireless Communication Security Techniques (12 papers), Wireless Networks and Protocols (12 papers) and Mobile Ad Hoc Networks (11 papers). Liran Ma collaborates with scholars based in United States, China and South Korea. Liran Ma's co-authors include Xiuzhen Cheng, Amin Y. Teymorian, Wei Cheng, Yan Huo, Xicheng Lu, Tao Jing, Kai Xing, Zhewen Lu, Qilian Liang and Min Song and has published in prestigious journals such as IEEE Access, Sensors and IEEE Transactions on Communications.

In The Last Decade

Liran Ma

67 papers receiving 1.3k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Liran Ma United States 17 828 778 315 245 106 72 1.3k
János Sallai United States 15 592 0.7× 596 0.8× 201 0.6× 128 0.5× 27 0.3× 67 1.1k
Quansheng Guan China 18 933 1.1× 734 0.9× 337 1.1× 102 0.4× 54 0.5× 115 1.3k
Helena Leppäkoski Finland 15 266 0.3× 715 0.9× 238 0.8× 171 0.7× 17 0.2× 33 941
Mahesh K. Banavar United States 18 438 0.5× 470 0.6× 62 0.2× 330 1.3× 19 0.2× 113 1.0k
Lei Xie China 16 475 0.6× 365 0.5× 213 0.7× 129 0.5× 43 0.4× 104 773
Lin Zhou China 14 219 0.3× 349 0.4× 93 0.3× 134 0.5× 26 0.2× 70 716
Dexin Zhao China 11 423 0.5× 289 0.4× 108 0.3× 156 0.6× 147 1.4× 62 953
Xiaohui Wei China 14 353 0.4× 251 0.3× 215 0.7× 116 0.5× 23 0.2× 82 914
D.H.C. Du United States 15 593 0.7× 427 0.5× 240 0.8× 56 0.2× 107 1.0× 48 934
Philipp Richter United States 17 413 0.5× 506 0.7× 141 0.4× 323 1.3× 7 0.1× 39 951

Countries citing papers authored by Liran Ma

Since Specialization
Citations

This map shows the geographic impact of Liran Ma's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Liran Ma with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Liran Ma more than expected).

Fields of papers citing papers by Liran Ma

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Liran Ma. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Liran Ma. The network helps show where Liran Ma may publish in the future.

Co-authorship network of co-authors of Liran Ma

This figure shows the co-authorship network connecting the top 25 collaborators of Liran Ma. A scholar is included among the top collaborators of Liran Ma based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Liran Ma. Liran Ma is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Lü, Wei, Bowen Zheng, Wang Zhang, et al.. (2025). Optimisation study of carbon dioxide geological storage sites based on GIS and machine learning algorithms. Geomechanics and Geophysics for Geo-Energy and Geo-Resources. 11(1). 3 indexed citations
3.
Chen, Zhiyu, et al.. (2025). Empirical Analysis of Remote Keystroke Inference Attacks and Defenses on Incremental Search. Tsinghua Science & Technology. 30(6). 2434–2451.
4.
Hu, Zhichao, et al.. (2025). TND: Two-stage non-invasive defense of intrusion detection system from adversarial attack. Computer Networks. 265. 111287–111287.
5.
Alexander, Richard, et al.. (2023). Integrity, Confidentiality, and Equity: Using Inquiry-Based Labs to help students understand AI and Cybersecurity. DigitalCommons - Kennesaw State University (Kennesaw State University). 2024(1).
6.
Huo, Yan, et al.. (2022). Quantitative models for friendly jammer trustworthiness evaluation in IoT networks. Ad Hoc Networks. 137. 102994–102994. 4 indexed citations
7.
Huo, Yan, Xin Fan, Liran Ma, et al.. (2019). Secure Communications in Tiered 5G Wireless Networks With Cooperative Jamming. IEEE Transactions on Wireless Communications. 18(6). 3265–3280. 55 indexed citations
8.
Huo, Yan, et al.. (2019). A Scheme for Trustworthy Friendly Jammer Selection in Cooperative Cognitive Radio Networks. IEEE Transactions on Vehicular Technology. 68(4). 3500–3512. 39 indexed citations
9.
Wang, Shengling, et al.. (2018). Big data analysis for evaluating bioinvasion risk. BMC Bioinformatics. 19(S9). 287–287. 13 indexed citations
10.
Hu, Chunqiang, Liran Ma, Yan Huo, et al.. (2018). A Secure and Scalable Data Communication Scheme in Smart Grids. Wireless Communications and Mobile Computing. 2018(1). 6 indexed citations
11.
Zhao, Zihan, et al.. (2018). A Context-Aware Budget-Constrained Targeted Advertising System for Vehicular Networks. IEEE Access. 6. 8704–8713. 12 indexed citations
12.
13.
Hu, Qin, Shengling Wang, Liran Ma, Xiuzhen Cheng, & Rongfang Bie. (2016). Solving the crowdsourcing dilemma using the zero-determinant strategy. 11. 373–374. 3 indexed citations
14.
Gao, Qinghe, Yan Huo, Liran Ma, et al.. (2016). Optimal Stopping Theory Based Jammer Selection for Securing Cooperative Cognitive Radio Networks. 1–6. 11 indexed citations
15.
Zhang, Fan, et al.. (2015). TORA: A Truthful Online Reverse Auction Scheme for Access Permission Transaction in Macro-Femtocell Networks.. Ad Hoc & Sensor Wireless Networks. 28. 347–362. 4 indexed citations
16.
Ma, Liran, et al.. (2013). A Time Fairness-Based MAC Algorithm for Throughput Maximization in 802.11 Networks. IEEE Transactions on Computers. 64(1). 19–31. 30 indexed citations
17.
Teymorian, Amin Y., et al.. (2009). A novel rate adaptation scheme for 802.11 networks. IEEE Transactions on Wireless Communications. 8(2). 862–870. 8 indexed citations
18.
Teymorian, Amin Y., et al.. (2008). Underwater Localization in Sparse 3D Acoustic Sensor Networks. 2008 Proceedings IEEE INFOCOM - The 27th Conference on Computer Communications. 12 indexed citations
19.
Liu, Fang, Xiuzhen Cheng, Liran Ma, & Kai Xing. (2008). SBK: A Self-Configuring Framework for Bootstrapping Keys in Sensor Networks. IEEE Transactions on Mobile Computing. 7(7). 858–868. 29 indexed citations
20.
Fu, Shaojian, Mohammed Atiquzzaman, Liran Ma, & Yongjin Lee. (2005). Signaling cost and performance of SIGMA: A seamless handover scheme for data networks: Research Articles. 5(7). 825–845. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026