Liyong Lin

560 total citations
42 papers, 326 citations indexed

About

Liyong Lin is a scholar working on Computational Theory and Mathematics, Artificial Intelligence and Computer Networks and Communications. According to data from OpenAlex, Liyong Lin has authored 42 papers receiving a total of 326 indexed citations (citations by other indexed papers that have themselves been cited), including 32 papers in Computational Theory and Mathematics, 21 papers in Artificial Intelligence and 13 papers in Computer Networks and Communications. Recurrent topics in Liyong Lin's work include Petri Nets in System Modeling (29 papers), Formal Methods in Verification (19 papers) and Security and Verification in Computing (14 papers). Liyong Lin is often cited by papers focused on Petri Nets in System Modeling (29 papers), Formal Methods in Verification (19 papers) and Security and Verification in Computing (14 papers). Liyong Lin collaborates with scholars based in Singapore, Canada and Romania. Liyong Lin's co-authors include Rong Su, Yuting Zhu, Michel Reniers, Alin Ştefănescu, Weilin Wang, B.A. Brandin, Zhiwu Li, W. M. Wonham, Deguang Wang and W.M. Wonham and has published in prestigious journals such as IEEE Transactions on Automatic Control, Automatica and IEEE Access.

In The Last Decade

Liyong Lin

39 papers receiving 316 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Liyong Lin Singapore 11 229 139 99 88 79 42 326
Gregor Gößler France 7 187 0.8× 111 0.8× 96 1.0× 58 0.7× 127 1.6× 13 347
Yi-Chin Wu United States 8 326 1.4× 211 1.5× 208 2.1× 104 1.2× 42 0.5× 11 452
Laurent Fribourg France 13 374 1.6× 209 1.5× 58 0.6× 78 0.9× 84 1.1× 69 518
R.R.H. Schiffelers Netherlands 11 210 0.9× 89 0.6× 90 0.9× 22 0.3× 108 1.4× 58 388
Simon Bliudze Switzerland 9 141 0.6× 115 0.8× 71 0.7× 19 0.2× 72 0.9× 30 271
Sven Burmester Germany 11 157 0.7× 211 1.5× 52 0.5× 30 0.3× 106 1.3× 24 396
Anne E. Haxthausen Denmark 11 205 0.9× 163 1.2× 94 0.9× 18 0.2× 128 1.6× 35 422
Jozef Hooman Netherlands 11 285 1.2× 228 1.6× 104 1.1× 23 0.3× 154 1.9× 77 479
Bastian Schlich Germany 13 193 0.8× 98 0.7× 82 0.8× 34 0.4× 84 1.1× 37 376
Borzoo Bonakdarpour United States 11 175 0.8× 161 1.2× 156 1.6× 29 0.3× 85 1.1× 57 352

Countries citing papers authored by Liyong Lin

Since Specialization
Citations

This map shows the geographic impact of Liyong Lin's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Liyong Lin with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Liyong Lin more than expected).

Fields of papers citing papers by Liyong Lin

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Liyong Lin. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Liyong Lin. The network helps show where Liyong Lin may publish in the future.

Co-authorship network of co-authors of Liyong Lin

This figure shows the co-authorship network connecting the top 25 collaborators of Liyong Lin. A scholar is included among the top collaborators of Liyong Lin based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Liyong Lin. Liyong Lin is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Lin, Liyong, et al.. (2025). Security verification against covert learning attackers. Automatica. 177. 112344–112344.
3.
Lin, Liyong, et al.. (2023). On Decidability of Existence of Fortified Supervisors Against Covert Actuator Attackers. IEEE Transactions on Automatic Control. 69(3). 1898–1905. 6 indexed citations
4.
Lin, Liyong, et al.. (2023). Synthesis of Distributed Covert Sensor–Actuator Attackers. IEEE Transactions on Automatic Control. 69(8). 4942–4957. 1 indexed citations
5.
Lin, Liyong, et al.. (2023). Supervisor Fortification Against Covert Actuator Attacks. 7917–7922. 1 indexed citations
6.
Brandin, B.A., Rong Su, & Liyong Lin. (2023). Supervisory Control of Time-Interval Discrete Event Systems. IEEE Transactions on Automatic Control. 69(5). 3080–3095. 1 indexed citations
7.
Zhu, Yuting, et al.. (2022). Overview of networked supervisory control with imperfect communication channels. Discrete Event Dynamic Systems. 33(1). 25–61. 1 indexed citations
8.
Lin, Liyong, et al.. (2022). Observation-assisted heuristic synthesis of covert attackers against unknown supervisors. Discrete Event Dynamic Systems. 32(3). 495–520. 4 indexed citations
9.
Lin, Liyong, et al.. (2022). Identification of System Vulnerability Under a Smart Sensor Attack via Attack Model Reduction. IEEE Control Systems Letters. 6. 2948–2953. 3 indexed citations
10.
Lin, Liyong, et al.. (2022). Networked supervisor synthesis against lossy channels with bounded network delays as non-networked synthesis. Automatica. 142. 110279–110279. 6 indexed citations
11.
Zhu, Yuting, et al.. (2022). Distributed Control of Timed Networked System against Communication Delays. 2 indexed citations
12.
Lin, Liyong, Yuting Zhu, & Rong Su. (2020). Synthesis of covert actuator attackers for free. Discrete Event Dynamic Systems. 30(4). 561–577. 47 indexed citations
13.
Lin, Liyong & Rong Su. (2020). Synthesis of Covert Actuator and Sensor Attackers as Supervisor Synthesis. IFAC-PapersOnLine. 53(4). 1–6. 12 indexed citations
14.
Lin, Liyong, et al.. (2019). Synchronous Composition of Finite Interval Automata. DR-NTU (Nanyang Technological University). 578–583. 4 indexed citations
15.
Lin, Liyong, Tomáš Masopust, W.M. Wonham, & Rong Su. (2018). Automatic Generation of Optimal Reductions of Distributions. IEEE Transactions on Automatic Control. 64(3). 896–911. 4 indexed citations
16.
Lin, Liyong, et al.. (2017). Reduction of Distributions: Definitions, Properties, and Applications. IEEE Transactions on Automatic Control. 62(11). 5755–5768. 1 indexed citations
17.
Lin, Liyong, Alin Ştefănescu, Weilin Wang, Rong Su, & W.M. Wonham. (2017). Symbolic reachability analysis and maximally permissive entrance control for globally synchronized templates. Automatica. 87. 290–300. 1 indexed citations
18.
Lin, Liyong, et al.. (2017). Reduction of distributions and its applications. 3848–3853. 2 indexed citations
19.
Lin, Liyong, et al.. (2014). Supervisory Control for a Class of Discrete Event Systems for Optimal Throughput. IFAC Proceedings Volumes. 47(2). 201–207. 2 indexed citations
20.
Phee, Soo Jay, et al.. (2009). Modular “Plug-and-Play” capsules for multi-capsule environment in the gastrointestinal tract. PubMed. 2009. 6846–6849. 2 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026