Min Long

2.6k total citations
105 papers, 1.8k citations indexed

About

Min Long is a scholar working on Computer Vision and Pattern Recognition, Signal Processing and Media Technology. According to data from OpenAlex, Min Long has authored 105 papers receiving a total of 1.8k indexed citations (citations by other indexed papers that have themselves been cited), including 93 papers in Computer Vision and Pattern Recognition, 33 papers in Signal Processing and 9 papers in Media Technology. Recurrent topics in Min Long's work include Advanced Steganography and Watermarking Techniques (49 papers), Digital Media Forensic Detection (41 papers) and Chaos-based Image/Signal Encryption (39 papers). Min Long is often cited by papers focused on Advanced Steganography and Watermarking Techniques (49 papers), Digital Media Forensic Detection (41 papers) and Chaos-based Image/Signal Encryption (39 papers). Min Long collaborates with scholars based in China, United Kingdom and United States. Min Long's co-authors include Fei Peng, Xiang Zhang, Xingming Sun, Yan Zeng, Xiaowen Zhu, Yunfei Chen, Guan-Fu Chen, Yin Zhu, Xiong Xiao and Yu Zhao and has published in prestigious journals such as SHILAP Revista de lepidopterología, IEEE Access and Sensors.

In The Last Decade

Min Long

100 papers receiving 1.7k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Min Long China 25 1.4k 389 254 122 119 105 1.8k
Fei Peng China 28 1.9k 1.3× 464 1.2× 313 1.2× 131 1.1× 161 1.4× 160 2.4k
Shabir A. Parah India 27 2.0k 1.4× 206 0.5× 362 1.4× 175 1.4× 260 2.2× 123 2.5k
Slava Voloshynovskiy Switzerland 20 1.5k 1.0× 247 0.6× 281 1.1× 103 0.8× 174 1.5× 178 1.9k
Geng Zhao China 19 653 0.5× 289 0.7× 233 0.9× 27 0.2× 81 0.7× 87 1.2k
Yuewei Dai China 21 1.0k 0.7× 165 0.4× 668 2.6× 242 2.0× 128 1.1× 134 1.9k
Xiangwei Kong China 21 1.2k 0.8× 263 0.7× 406 1.6× 211 1.7× 111 0.9× 135 1.8k
Lide Wu China 19 602 0.4× 171 0.4× 703 2.8× 69 0.6× 146 1.2× 85 1.3k
Jiangqun Ni China 26 3.0k 2.1× 142 0.4× 346 1.4× 386 3.2× 70 0.6× 91 3.1k
John R. Kender United States 20 1.1k 0.8× 299 0.8× 248 1.0× 71 0.6× 74 0.6× 116 1.4k
Guorui Feng China 26 1.9k 1.3× 198 0.5× 1.0k 4.1× 166 1.4× 127 1.1× 169 2.8k

Countries citing papers authored by Min Long

Since Specialization
Citations

This map shows the geographic impact of Min Long's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Min Long with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Min Long more than expected).

Fields of papers citing papers by Min Long

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Min Long. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Min Long. The network helps show where Min Long may publish in the future.

Co-authorship network of co-authors of Min Long

This figure shows the co-authorship network connecting the top 25 collaborators of Min Long. A scholar is included among the top collaborators of Min Long based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Min Long. Min Long is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Chen, Song, et al.. (2025). Face de‐morphing based on identity feature transfer. IET Image Processing. 19(1). 1 indexed citations
2.
Yang, Yongliang, Guangyong Li, Ning Xi, et al.. (2024). Applying the intrinsic principle of cell collectives to program robot swarms. Cell Reports Physical Science. 5(8). 102122–102122. 1 indexed citations
3.
Liu, Jianbo, et al.. (2024). FLDATN: Black‐Box Attack for Face Liveness Detection Based on Adversarial Transformation Network. International Journal of Intelligent Systems. 2024(1). 1 indexed citations
4.
Peng, Fei, et al.. (2024). Detection of Adversarial Facial Accessory Presentation Attacks Using Local Face Differential. ACM Transactions on Multimedia Computing Communications and Applications. 20(7). 1–28. 2 indexed citations
5.
Peng, Fei, et al.. (2024). Category-Conditional Gradient Alignment for Domain Adaptive Face Anti-Spoofing. IEEE Transactions on Information Forensics and Security. 19. 10071–10085.
6.
Long, Min, et al.. (2023). ADFF: Adaptive de‐morphing factor framework for restoring accomplice's facial image. IET Image Processing. 18(2). 470–480. 2 indexed citations
7.
Peng, Fei, et al.. (2022). A Low Distortion and Steganalysis-resistant Reversible Data Hiding for 2D Engineering Graphics. ACM Transactions on Multimedia Computing Communications and Applications. 19(2). 1–20. 6 indexed citations
8.
Long, Min, et al.. (2021). S-Box Design Based on Discrete Chaotic Map and Improved Artificial Bee Colony Algorithm. IEEE Access. 9. 86144–86154. 35 indexed citations
9.
Hu, Xiaohua, et al.. (2021). Identifying natural images and computer-generated graphics based on Convolutional Neural Network. International Journal of Autonomous and Adaptive Communications Systems. 14(1/2). 1–1. 2 indexed citations
10.
Zhang, Xiang, et al.. (2020). A Coverless Image Information Hiding Algorithm Based on Fractal Theory. International Journal of Bifurcation and Chaos. 30(4). 2050062–2050062. 7 indexed citations
11.
Peng, Fei, et al.. (2018). Face Morphing Detection Using Fourier Spectrum of Sensor Pattern Noise. 1–6. 40 indexed citations
12.
Peng, Fei, et al.. (2018). 3-D Printed Object Authentication Based on Printing Noise and Digital Signature. IEEE Transactions on Reliability. 68(1). 342–353. 11 indexed citations
13.
Long, Min & Yunfei Chen. (2018). Performance analysis of energy harvesting communications using multiple time slots. IET Communications. 13(3). 289–296. 6 indexed citations
14.
Peng, Fei, et al.. (2018). A Low-Distortion Reversible Watermarking for 2D Engineering Graphics Based on Region Nesting. IEEE Transactions on Information Forensics and Security. 13(9). 2372–2382. 30 indexed citations
15.
Peng, Fei, et al.. (2018). Face spoofing detection based on color texture Markov feature and support vector machine recursive feature elimination. Journal of Visual Communication and Image Representation. 51. 56–69. 60 indexed citations
16.
Peng, Fei, Chen Li, & Min Long. (2012). A reversible watermark scheme for 2D vector map based on reversible contrast mapping. Security and Communication Networks. 6(9). 1117–1125. 11 indexed citations
17.
Peng, Fei, et al.. (2011). A complete passive blind image copy-move forensics scheme based on compound statistics features. Forensic Science International. 212(1-3). e21–e25. 30 indexed citations
18.
Peng, Fei, et al.. (2010). A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation. Computer-Aided Design. 42(12). 1207–1216. 30 indexed citations
19.
Long, Min & Li Tan. (2010). A Chaos-Based Data Encryption Algorithm for Image/Video. 18 indexed citations
20.
Long, Min, Fei Peng, & Guanrong Chen. (2008). Constructing a one-way hash function based on the unified chaotic system. Chinese Physics B. 17(10). 3588–3595. 4 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026