Paul Yu

1.1k total citations
48 papers, 722 citations indexed

About

Paul Yu is a scholar working on Electrical and Electronic Engineering, Computer Networks and Communications and Artificial Intelligence. According to data from OpenAlex, Paul Yu has authored 48 papers receiving a total of 722 indexed citations (citations by other indexed papers that have themselves been cited), including 27 papers in Electrical and Electronic Engineering, 24 papers in Computer Networks and Communications and 22 papers in Artificial Intelligence. Recurrent topics in Paul Yu's work include Wireless Communication Security Techniques (17 papers), Chaos-based Image/Signal Encryption (8 papers) and Cryptographic Implementations and Security (6 papers). Paul Yu is often cited by papers focused on Wireless Communication Security Techniques (17 papers), Chaos-based Image/Signal Encryption (8 papers) and Cryptographic Implementations and Security (6 papers). Paul Yu collaborates with scholars based in United States, United Kingdom and Switzerland. Paul Yu's co-authors include Brian M. Sadler, John S. Baras, Gunjan Verma, Rick S. Blum, Jeffrey N. Twigg, Srikanth V. Krishnamurthy, Zhiyun Qian, Fikadu T. Dagefu, Kamal Sarabandi and Chengyu Song and has published in prestigious journals such as IEEE Transactions on Information Theory, IEEE Access and IEEE Communications Magazine.

In The Last Decade

Paul Yu

47 papers receiving 710 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Paul Yu United States 13 505 310 235 145 102 48 722
Kaizhi Huang China 14 700 1.4× 340 1.1× 173 0.7× 112 0.8× 118 1.2× 132 877
Fei Pan China 18 679 1.3× 414 1.3× 295 1.3× 130 0.9× 82 0.8× 39 992
Runfa Liao China 13 527 1.0× 292 0.9× 248 1.1× 98 0.7× 83 0.8× 26 764
Huanhuan Song China 18 565 1.1× 350 1.1× 323 1.4× 130 0.9× 114 1.1× 48 927
Alan J. Michaels United States 16 319 0.6× 173 0.6× 417 1.8× 124 0.9× 136 1.3× 81 743
Yogendra Shah United States 9 594 1.2× 332 1.1× 257 1.1× 347 2.4× 48 0.5× 20 763
Brahmjit Singh India 15 499 1.0× 548 1.8× 221 0.9× 174 1.2× 36 0.4× 113 914
Hideichi Sasaoka Japan 12 616 1.2× 331 1.1× 157 0.7× 273 1.9× 77 0.8× 91 720
Jean‐Yves Chouinard Canada 20 930 1.8× 527 1.7× 241 1.0× 284 2.0× 235 2.3× 122 1.3k

Countries citing papers authored by Paul Yu

Since Specialization
Citations

This map shows the geographic impact of Paul Yu's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Paul Yu with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Paul Yu more than expected).

Fields of papers citing papers by Paul Yu

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Paul Yu. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Paul Yu. The network helps show where Paul Yu may publish in the future.

Co-authorship network of co-authors of Paul Yu

This figure shows the co-authorship network connecting the top 25 collaborators of Paul Yu. A scholar is included among the top collaborators of Paul Yu based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Paul Yu. Paul Yu is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Qian, Zhiyun, Chengyu Song, Evangelos E. Papalexakis, et al.. (2024). DNS Exfiltration Guided by Generative Adversarial Networks. eScholarship (California Digital Library). 580–599. 3 indexed citations
2.
Miller, Benjamin A., et al.. (2023). TenGAN: adversarially generating multiplex tensor graphs. Data Mining and Knowledge Discovery. 38(1). 1–21.
3.
Corcoran, John, et al.. (2022). Adaptive Monitoring for Analytics Placement in Tactical Networks. 926–931. 2 indexed citations
4.
Kliewer, Jörg, et al.. (2022). Keyless Authentication for AWGN Channels. IEEE Transactions on Information Theory. 69(1). 496–519. 2 indexed citations
5.
Yu, Paul, et al.. (2021). Artificial Noise-Aided MIMO Physical Layer Authentication With Imperfect CSI. IEEE Transactions on Information Forensics and Security. 16. 2173–2185. 32 indexed citations
6.
Kliewer, Jörg, et al.. (2020). Authentication with Mildly Myopic Adversaries. 984–989. 4 indexed citations
7.
Jaeger, Trent, et al.. (2019). Employing attack graphs for intrusion detection. eScholarship (California Digital Library). 16–30. 11 indexed citations
8.
9.
Yu, Paul, et al.. (2019). Fingerprint Embedding Authentication with Artificial Noise: MISO Regime. 1–5. 2 indexed citations
11.
Krishnamurthy, Srikanth V., Paul Yu, Ananthram Swami, et al.. (2016). Automated cross layer feature selection for effective intrusion detection in networked systems. 270–278. 1 indexed citations
12.
Khalil, Karim, Zhiyun Qian, Paul Yu, Srikanth V. Krishnamurthy, & Ananthram Swami. (2016). Optimal Monitor Placement for Detection of Persistent Threats. 1–6. 2 indexed citations
13.
Verma, Gunjan, Paul Yu, & Brian M. Sadler. (2015). Physical Layer Authentication via Fingerprint Embedding Using Software-Defined Radios. IEEE Access. 3. 81–88. 49 indexed citations
14.
Liu, Chang, Ting He, Ananthram Swami, et al.. (2015). Multicast vs. unicast for loss tomography on tree topologies. 312–317. 2 indexed citations
15.
Twigg, Jeffrey N., et al.. (2013). Efficient base station connectivity area discovery. The International Journal of Robotics Research. 32(12). 1398–1410. 18 indexed citations
16.
Yu, Paul & Brian M. Sadler. (2011). MIMO Authentication via Deliberate Fingerprinting at the Physical Layer. IEEE Transactions on Information Forensics and Security. 6(3). 606–615. 47 indexed citations
17.
Yu, Paul, Jeffrey N. Twigg, & Brian M. Sadler. (2011). Radio signal strength tracking and control for robotic networks. Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE. 8031. 803116–803116. 6 indexed citations
18.
Yu, Paul, et al.. (2010). Securing the communication of medical information using local biometric authentication and commercial wireless links. Health Informatics Journal. 16(3). 211–223. 5 indexed citations
19.
Yu, Paul, John S. Baras, & Brian M. Sadler. (2008). Multicarrier authentication at the physical layer. 1–6. 28 indexed citations
20.
Yu, Paul, et al.. (2000). Confronting the OS Rivalry: Unix Vs. Nt. Journal of Computer Information Systems. 41(1). 94–98. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026