Qihong Yu

559 total citations
19 papers, 457 citations indexed

About

Qihong Yu is a scholar working on Artificial Intelligence, Computer Vision and Pattern Recognition and Information Systems. According to data from OpenAlex, Qihong Yu has authored 19 papers receiving a total of 457 indexed citations (citations by other indexed papers that have themselves been cited), including 16 papers in Artificial Intelligence, 5 papers in Computer Vision and Pattern Recognition and 4 papers in Information Systems. Recurrent topics in Qihong Yu's work include Cryptography and Data Security (15 papers), Cryptographic Implementations and Security (13 papers) and Chaos-based Image/Signal Encryption (5 papers). Qihong Yu is often cited by papers focused on Cryptography and Data Security (15 papers), Cryptographic Implementations and Security (13 papers) and Chaos-based Image/Signal Encryption (5 papers). Qihong Yu collaborates with scholars based in China and Australia. Qihong Yu's co-authors include Jiguo Li, Yichen Zhang, Jian Shen, Yuyan Guo, Yang Lu, Wei Wu, Yang Xiang, Xinyi Huang, Futai Zhang and Sai Ji and has published in prestigious journals such as Information Sciences, Applied Sciences and Journal of Systems and Software.

In The Last Decade

Qihong Yu

17 papers receiving 452 citations

Peers

Qihong Yu
Joseph Jaeger United States
Jason Perry United States
Ik Rae Jeong South Korea
John Malone-Lee United Kingdom
Yuyan Guo China
Xinrui Ge China
Brice Minaud United Kingdom
Yarkın Doröz United States
Sriram Keelveedhi United States
Joseph Jaeger United States
Qihong Yu
Citations per year, relative to Qihong Yu Qihong Yu (= 1×) peers Joseph Jaeger

Countries citing papers authored by Qihong Yu

Since Specialization
Citations

This map shows the geographic impact of Qihong Yu's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Qihong Yu with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Qihong Yu more than expected).

Fields of papers citing papers by Qihong Yu

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Qihong Yu. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Qihong Yu. The network helps show where Qihong Yu may publish in the future.

Co-authorship network of co-authors of Qihong Yu

This figure shows the co-authorship network connecting the top 25 collaborators of Qihong Yu. A scholar is included among the top collaborators of Qihong Yu based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Qihong Yu. Qihong Yu is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

19 of 19 papers shown
1.
Jiang, Lei, et al.. (2025). An Integrated Stacking Ensemble Model for Natural Gas Purchase Prediction Incorporating Multiple Features. Applied Sciences. 15(2). 778–778. 1 indexed citations
2.
Yu, Qihong, Jiguo Li, & Jian Shen. (2023). ID-Based Ring Signature against Continual Side Channel Attack. Symmetry. 15(1). 179–179. 1 indexed citations
3.
Yu, Qihong, Jian Shen, Jiguo Li, & Sai Ji. (2023). Hierarchical and Efficient Identity-bsed Encryption Against Side Channel Attacks. International Journal of Advanced Computer Science and Applications. 14(6).
4.
Yu, Qihong, Jiguo Li, & Sai Ji. (2022). Hierarchical Identity-Based Online/Offline Encryption Scheme with Leakage Resilience. Security and Communication Networks. 2022. 1–11. 2 indexed citations
5.
Yu, Qihong, Jiguo Li, & Sai Ji. (2022). Fully Secure ID-Based Signature Scheme with Continuous Leakage Resilience. Security and Communication Networks. 2022. 1–12. 7 indexed citations
6.
Yu, Qihong, Jiguo Li, & Sai Ji. (2022). Anonymous Identity Based Broadcast Encryption against Continual Side Channel Attacks in the State Partition Model. Applied Sciences. 12(18). 9395–9395. 1 indexed citations
7.
Yu, Qihong, Jiguo Li, & Sai Ji. (2022). Identity-Based and Leakage-Resilient Broadcast Encryption Scheme for Cloud Storage Service. Applied Sciences. 12(22). 11495–11495. 2 indexed citations
8.
Huang, Jiewen, et al.. (2021). A Multiplayer Virtual Intelligent System Based on Distributed Virtual Reality. International Journal of Pattern Recognition and Artificial Intelligence. 35(14). 4 indexed citations
9.
Li, Jiguo, Qihong Yu, & Yichen Zhang. (2019). Hierarchical attribute based encryption with continuous leakage-resilience. Information Sciences. 484. 113–134. 83 indexed citations
10.
Li, Jiguo, Qihong Yu, Yichen Zhang, & Jian Shen. (2018). Key-policy attribute-based encryption against continual auxiliary input leakage. Information Sciences. 470. 175–188. 95 indexed citations
11.
Li, Jiguo, Qihong Yu, & Yichen Zhang. (2017). Identity-based broadcast encryption with continuous leakage resilience. Information Sciences. 429. 177–193. 51 indexed citations
12.
Li, Jiguo, et al.. (2016). A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme. The Computer Journal. 59(7). 1066–1075. 52 indexed citations
13.
Li, Jiguo, Yuyan Guo, Qihong Yu, et al.. (2016). Continuous leakage-resilient certificate-based encryption. Information Sciences. 355-356. 1–14. 35 indexed citations
14.
Yu, Qihong, Jiguo Li, & Yichen Zhang. (2015). Leakage‐resilient certificate‐based encryption. Security and Communication Networks. 8(18). 3346–3355. 33 indexed citations
15.
Li, Jiguo, Yuyan Guo, Qihong Yu, Yang Lu, & Yichen Zhang. (2015). Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage. Security and Communication Networks. 9(10). 1016–1024. 42 indexed citations
16.
Yu, Qihong, Jiguo Li, Yichen Zhang, et al.. (2015). Certificate-based encryption resilient to key leakage. Journal of Systems and Software. 116. 101–112. 46 indexed citations
17.
Yu, Qihong, et al.. (2014). An improved approach of data integration based on differential privacy. 13. 395–399. 1 indexed citations
18.
Yu, Qihong. (2010). Using Reflection Technology to Implement the Design of Dynamic Menu.
19.
Zhang, Hongtao, Qihong Yu, & Bo Wang. (2009). A Novel Energy Fairness Mechanism Based on Relay Selection for Cooperative MAC Protocol. 1–4. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026