Peng Tang

438 total citations
23 papers, 220 citations indexed

About

Peng Tang is a scholar working on Artificial Intelligence, Computer Networks and Communications and Information Systems. According to data from OpenAlex, Peng Tang has authored 23 papers receiving a total of 220 indexed citations (citations by other indexed papers that have themselves been cited), including 16 papers in Artificial Intelligence, 5 papers in Computer Networks and Communications and 5 papers in Information Systems. Recurrent topics in Peng Tang's work include Privacy-Preserving Technologies in Data (14 papers), Cryptography and Data Security (12 papers) and Privacy, Security, and Data Protection (3 papers). Peng Tang is often cited by papers focused on Privacy-Preserving Technologies in Data (14 papers), Cryptography and Data Security (12 papers) and Privacy, Security, and Data Protection (3 papers). Peng Tang collaborates with scholars based in China, United States and Singapore. Peng Tang's co-authors include Rui Chen, Sen Su, Xiang Cheng, Jun Zhao, Haiyang Hu, Shangguang Wang, Binbin Huang, Wanqing Li, Zhongjin Li and Victor Chang and has published in prestigious journals such as SHILAP Revista de lepidopterología, Scientific Reports and Carbohydrate Polymers.

In The Last Decade

Peng Tang

17 papers receiving 215 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Peng Tang China 7 126 97 74 39 39 23 220
Ahmed El Ouadrhiri Morocco 5 201 1.6× 45 0.5× 45 0.6× 45 1.2× 18 0.5× 16 265
Zhida Jiang China 9 290 2.3× 105 1.1× 60 0.8× 10 0.3× 30 0.8× 13 329
Ana I. González–Tablas Spain 9 70 0.6× 70 0.7× 59 0.8× 31 0.8× 13 0.3× 29 182
Roman Kolcun United Kingdom 7 165 1.3× 183 1.9× 64 0.9× 49 1.3× 14 0.4× 10 299
Sheng Zhong China 5 291 2.3× 76 0.8× 239 3.2× 35 0.9× 37 0.9× 7 356
Gavin Zheng Australia 2 264 2.1× 90 0.9× 199 2.7× 28 0.7× 32 0.8× 2 322
Mehdi Salehi Heydar Abad Türkiye 5 236 1.9× 132 1.4× 26 0.4× 17 0.4× 37 0.9× 10 309
Syed Zawad United States 7 81 0.6× 67 0.7× 50 0.7× 10 0.3× 10 0.3× 13 158
Françoise Sailhan France 9 70 0.6× 306 3.2× 99 1.3× 18 0.5× 22 0.6× 22 392
Bai Li Australia 5 265 2.1× 126 1.3× 202 2.7× 28 0.7× 32 0.8× 8 358

Countries citing papers authored by Peng Tang

Since Specialization
Citations

This map shows the geographic impact of Peng Tang's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Peng Tang with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Peng Tang more than expected).

Fields of papers citing papers by Peng Tang

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Peng Tang. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Peng Tang. The network helps show where Peng Tang may publish in the future.

Co-authorship network of co-authors of Peng Tang

This figure shows the co-authorship network connecting the top 25 collaborators of Peng Tang. A scholar is included among the top collaborators of Peng Tang based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Peng Tang. Peng Tang is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
2.
Ling, Guowei, et al.. (2025). Ultra-Fast Private Set Intersection From Efficient Oblivious Key-Value Stores. IEEE Transactions on Dependable and Secure Computing. 22(5). 4998–5014. 1 indexed citations
3.
Tang, Peng, et al.. (2025). Mitigating privacy risks in Retrieval-Augmented Generation via locally private entity perturbation. Information Processing & Management. 62(4). 104150–104150.
4.
Zhao, Bin-Bin, et al.. (2025). Structural characterization and immunomodulatory activity of polysaccharides from the roots of Artemisia argyi. Carbohydrate Polymers. 368(Pt 2). 124169–124169. 1 indexed citations
5.
Hu, Chengyu, et al.. (2025). PFGRS: A Privacy-preserving Subgraph-level Federated Graph learning for Recommender System. Expert Systems with Applications. 282. 127615–127615.
6.
Tang, Peng, et al.. (2024). Enforcing group fairness in privacy-preserving Federated Learning. Future Generation Computer Systems. 160. 890–900. 1 indexed citations
7.
Tang, Peng, et al.. (2024). Design and test of reel speed control system for soybean combine harvester in the strip intercropping mode. Scientific Reports. 14(1). 25133–25133. 3 indexed citations
9.
Tang, Peng, Yunyun Dong, Weidong Qiu, & Huang Zheng. (2024). Bidirectional Anonymous Private Set Intersection Based on Obfuscation. 919–927.
10.
Hu, Chengyu, et al.. (2024). Subgraph-level federated graph neural network for privacy-preserving recommendation with meta-learning. Neural Networks. 179. 106574–106574. 4 indexed citations
11.
Tang, Peng, et al.. (2023). Multi-Party Sequential Data Publishing Under Differential Privacy. IEEE Transactions on Knowledge and Data Engineering. 35(9). 9562–9577. 4 indexed citations
12.
Tang, Peng, et al.. (2021). Differentially Private Publication of Multi-Party Sequential Data. 145–156. 6 indexed citations
13.
Qiu, Weidong, et al.. (2020). Privacy-preserving spatial query protocol based on the Moore curve for location-based service. Computers & Security. 96. 101845–101845. 6 indexed citations
14.
Cheng, Xiang, et al.. (2019). Multi-Party High-Dimensional Data Publishing Under Differential Privacy. IEEE Transactions on Knowledge and Data Engineering. 32(8). 1557–1571. 33 indexed citations
15.
Huang, Binbin, Zhongjin Li, Peng Tang, et al.. (2019). Security modeling and efficient computation offloading for service workflow in mobile edge computing. Future Generation Computer Systems. 97. 755–774. 83 indexed citations
16.
Tang, Peng, et al.. (2019). Differentially Private Publication of Vertically Partitioned Data. IEEE Transactions on Dependable and Secure Computing. 18(2). 780–795. 18 indexed citations
17.
Su, Sen, et al.. (2016). Differentially private multi-party high-dimensional data publishing. 205–216. 27 indexed citations
18.
Tang, Peng, et al.. (2011). VirtualRank: A Prediction Based Load Balancing Technique in Virtual Computing Environment. 247–256. 10 indexed citations
19.
20.
Zhang, Jin, et al.. (2010). The development of grain storage scientific and technical research in China and relevant theory exploration. SHILAP Revista de lepidopterología. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026