Peng Tang

557 total citations
64 papers, 270 citations indexed

About

Peng Tang is a scholar working on Artificial Intelligence, Information Systems and Computer Vision and Pattern Recognition. According to data from OpenAlex, Peng Tang has authored 64 papers receiving a total of 270 indexed citations (citations by other indexed papers that have themselves been cited), including 27 papers in Artificial Intelligence, 13 papers in Information Systems and 9 papers in Computer Vision and Pattern Recognition. Recurrent topics in Peng Tang's work include Privacy-Preserving Technologies in Data (11 papers), Cryptography and Data Security (7 papers) and High-Temperature Coating Behaviors (5 papers). Peng Tang is often cited by papers focused on Privacy-Preserving Technologies in Data (11 papers), Cryptography and Data Security (7 papers) and High-Temperature Coating Behaviors (5 papers). Peng Tang collaborates with scholars based in China, Hong Kong and United Kingdom. Peng Tang's co-authors include Weidong Qiu, Zheng Huang, Guozhen Liu, Yang Yang, Ning Shen, Taohong Ye, Chao Yue, Taotao Zhou, Yitao Xu and R. Manmatha and has published in prestigious journals such as Electrochimica Acta, Energy and Information Sciences.

In The Last Decade

Peng Tang

47 papers receiving 260 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Peng Tang China 8 117 88 72 53 24 64 270
Chaozheng Wang China 11 172 1.5× 146 1.7× 68 0.9× 49 0.9× 29 1.2× 28 343
Jingxuan He China 9 142 1.2× 251 2.9× 40 0.6× 148 2.8× 20 0.8× 20 389
Ryôichi Sasaki Japan 8 56 0.5× 141 1.6× 122 1.7× 51 1.0× 26 1.1× 74 305
R. Saravanan India 6 74 0.6× 34 0.4× 89 1.2× 23 0.4× 20 0.8× 17 279
Shaojie Yang China 9 151 1.3× 30 0.3× 58 0.8× 55 1.0× 45 1.9× 19 346
Bogdan Księżopolski Poland 9 64 0.5× 75 0.9× 117 1.6× 32 0.6× 26 1.1× 36 244

Countries citing papers authored by Peng Tang

Since Specialization
Citations

This map shows the geographic impact of Peng Tang's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Peng Tang with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Peng Tang more than expected).

Fields of papers citing papers by Peng Tang

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Peng Tang. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Peng Tang. The network helps show where Peng Tang may publish in the future.

Co-authorship network of co-authors of Peng Tang

This figure shows the co-authorship network connecting the top 25 collaborators of Peng Tang. A scholar is included among the top collaborators of Peng Tang based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Peng Tang. Peng Tang is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Qiu, Weidong, et al.. (2025). SE#PCFG: Semantically Enhanced PCFG for Password Analysis and Cracking. IEEE Transactions on Dependable and Secure Computing. 22(4). 4428–4441. 1 indexed citations
2.
Ling, Guowei, et al.. (2025). Privacy-Preserving Authorized Set Matching via Dishonest Majority Multiparty Computation. IEEE Transactions on Dependable and Secure Computing. 22(6). 7614–7631.
3.
Ling, Guowei, et al.. (2025). More Efficient, Privacy-Enhanced, and Powerful Privacy-Preserving Feature Retrieval Private Set Intersection. IEEE Transactions on Information Forensics and Security. 20. 4815–4827.
4.
Tang, Peng, et al.. (2025). LiteFlex-YOLO:A lightweight small target detection network for maritime unmanned aerial vehicles. Pervasive and Mobile Computing. 111. 102064–102064. 3 indexed citations
5.
Qiu, Weidong, et al.. (2025). Everyone's Privacy Matters! An Analysis of Privacy Leakage from Real-World Facial Images on Twitter and Associated User Behaviors. Proceedings of the ACM on Human-Computer Interaction. 9(2). 1–38.
6.
Zhao, Tianyang, et al.. (2024). No Head Left Behind – Multi-Head Alignment Distillation for Transformers. Proceedings of the AAAI Conference on Artificial Intelligence. 38(7). 7514–7524. 1 indexed citations
7.
Chen, Yanjun, et al.. (2024). Effect of C2H2 flow rate on microstructure, properties, and application in micro-drilling of a-C:H films deposited by PECVD. Journal of Materials Research and Technology. 29. 1194–1205. 2 indexed citations
8.
Liao, Haofu, Srikar Appalaraju, Peng Tang, et al.. (2024). DocKD: Knowledge Distillation from LLMs for Open-World Document Understanding Models. 3167–3193.
9.
Tang, Peng, et al.. (2024). Multiple-Question Multiple-Answer Text-VQA. 73–88. 2 indexed citations
10.
Li, Dong, et al.. (2024). Experimental study on dynamic behavior and removal characteristics of condensate droplets under ultrasonic vibration. International Communications in Heat and Mass Transfer. 156. 107652–107652. 4 indexed citations
11.
Shang, Yuhe, et al.. (2024). Dynamic behavior of droplet impacting on superhydrophobic cylinder with different macro-ridge orientations. Colloids and Surfaces A Physicochemical and Engineering Aspects. 702. 134996–134996. 3 indexed citations
12.
Qiu, Weidong, et al.. (2023). Correction of whitespace and word segmentation in noisy Pashto text using CRF. Speech Communication. 153. 102970–102970. 2 indexed citations
13.
Tang, Peng, et al.. (2023). Simulation of Electric Vehicle Regenerative Braking Control Strategy Based on Brake Intention Recognition. Journal of Physics Conference Series. 2492(1). 12018–12018. 1 indexed citations
14.
Ling, Guowei, Fei Tang, Chaochao Cai, et al.. (2023). P²FRPSI: Privacy-Preserving Feature Retrieved Private Set Intersection. IEEE Transactions on Information Forensics and Security. 19. 2201–2216. 2 indexed citations
15.
Zhou, Taotao, Peng Tang, & Taohong Ye. (2022). Machine learning based heat release rate indicator of premixed methane/air flame under wide range of equivalence ratio. Energy. 263. 126103–126103. 12 indexed citations
16.
Li, Biao, et al.. (2022). A Web-based Interactive Tool for Urban Fabric Generation: A Case Study of Chinese Rural Context. Proceedings of the International Conference on Computer-Aided Architectural Design Research in Asia. 1. 625–634. 4 indexed citations
17.
Tang, Peng, Kaixiang Peng, Jie Dong, Kai Zhang, & Rui‐Hua Jiao. (2021). A variational autoencoders approach for process monitoring and fault diagnosis. 3(3). 229–229. 4 indexed citations
18.
Tang, Peng, et al.. (2020). Anomaly detection in electronic invoice systems based on machine learning. Information Sciences. 535. 172–186. 14 indexed citations
19.
Tang, Peng, et al.. (2010). Study of agricultural search engine based on FAO agrovoc ontology and google API. World Automation Congress. 439–444. 6 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026