Rong Hao

2.0k total citations · 1 hit paper
80 papers, 1.4k citations indexed

About

Rong Hao is a scholar working on Artificial Intelligence, Information Systems and Electrical and Electronic Engineering. According to data from OpenAlex, Rong Hao has authored 80 papers receiving a total of 1.4k indexed citations (citations by other indexed papers that have themselves been cited), including 65 papers in Artificial Intelligence, 51 papers in Information Systems and 12 papers in Electrical and Electronic Engineering. Recurrent topics in Rong Hao's work include Cryptography and Data Security (64 papers), Cloud Data Security Solutions (43 papers) and Privacy-Preserving Technologies in Data (26 papers). Rong Hao is often cited by papers focused on Cryptography and Data Security (64 papers), Cloud Data Security Solutions (43 papers) and Privacy-Preserving Technologies in Data (26 papers). Rong Hao collaborates with scholars based in China, United States and Australia. Rong Hao's co-authors include Jia Yu, Wenting Shen, Jiankun Hu, Jing Qin, Hanlin Zhang, Xinrui Ge, Fanyu Kong, Yue Zhang, Cong Wang and Kui Ren and has published in prestigious journals such as Angewandte Chemie International Edition, Nature Communications and SHILAP Revista de lepidopterología.

In The Last Decade

Rong Hao

74 papers receiving 1.3k citations

Hit Papers

Enabling Identity-Based Integrity Auditing and Data Shari... 2018 2026 2020 2023 2018 50 100 150 200 250

Peers

Rong Hao
Wenhai Sun United States
Hui Cui Australia
Tom Roeder United States
Xiangyao Yu United States
Wenhai Sun United States
Rong Hao
Citations per year, relative to Rong Hao Rong Hao (= 1×) peers Wenhai Sun

Countries citing papers authored by Rong Hao

Since Specialization
Citations

This map shows the geographic impact of Rong Hao's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Rong Hao with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Rong Hao more than expected).

Fields of papers citing papers by Rong Hao

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Rong Hao. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Rong Hao. The network helps show where Rong Hao may publish in the future.

Co-authorship network of co-authors of Rong Hao

This figure shows the co-authorship network connecting the top 25 collaborators of Rong Hao. A scholar is included among the top collaborators of Rong Hao based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Rong Hao. Rong Hao is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Hao, Rong, et al.. (2025). Enabling flexible multiple-replica cloud storage integrity auditing for cloud-based IoT data. Journal of Systems Architecture. 163. 103404–103404. 1 indexed citations
2.
Ma, Yu, Wenjing Li, Jianchao Sun, et al.. (2024). Unlocking Cage‐Confined Cations Molecular Dynamics toward High‐Tc Perovskite Ferroelectrics. Angewandte Chemie International Edition. 64(8). e202420512–e202420512. 5 indexed citations
3.
Tang, Liwei, Yi Liu, Tian Yang, et al.. (2024). Enhancing interlayer hydrogen bonds of 2D Ruddlesden-Popper perovskite toward stable polarization-sensitive photodetection. Chinese Chemical Letters. 36(7). 110092–110092. 2 indexed citations
4.
Hao, Rong, et al.. (2024). Popularity-based multiple-replica cloud storage integrity auditing for big data. Future Generation Computer Systems. 163. 107534–107534. 4 indexed citations
5.
Hao, Rong, et al.. (2024). Privacy-Preserving Naïve Bayesian Classification for Health Monitoring Systems. IEEE Transactions on Industrial Informatics. 20(10). 11622–11634. 2 indexed citations
6.
Ni, H. Q., Haojie Xu, Yi Liu, et al.. (2024). Controllable Regulation of Inorganic‐Layer Thickness of Polar 2D Homologue Perovskites toward Self‐Powered Polarization‐Sensitive Photodetection. Advanced Optical Materials. 12(24). 3 indexed citations
7.
Li, Wenjing, Yu Ma, Yi Liu, et al.. (2024). Zipper‐Like Dynamic Switching of Coordination Bonds Gives a Polar Bimetallic Halide Toward Self‐Driven X‐Ray Detection. Angewandte Chemie International Edition. 64(4). e202417036–e202417036. 6 indexed citations
8.
Ma, Yu, Wenjing Li, Jianchao Sun, et al.. (2024). Unlocking Cage‐Confined Cations Molecular Dynamics toward High‐Tc Perovskite Ferroelectrics. Angewandte Chemie. 137(8). 1 indexed citations
9.
Wang, Min, et al.. (2023). Secure auditing and deduplication with efficient ownership management for cloud storage. Journal of Systems Architecture. 142. 102953–102953. 19 indexed citations
10.
Yu, Jia, et al.. (2023). Privacy-Preserving Shortest Distance Query for Dynamic Large-Scale Road Network. IEEE Systems Journal. 17(2). 1729–1740. 4 indexed citations
11.
Wang, Zhiqiang, Wenjing Gao, Ming Yang, & Rong Hao. (2022). Enabling Secure Data sharing with data deduplication and sensitive information hiding in cloud-assisted Electronic Medical Systems. Cluster Computing. 26(6). 3839–3854. 12 indexed citations
12.
Hao, Rong, et al.. (2021). Secure deduplication for big data with efficient dynamic ownership updates. Computers & Electrical Engineering. 96. 107531–107531. 7 indexed citations
13.
Zhang, Hanlin, Jia Yu, Mohammad S. Obaidat, et al.. (2020). Secure Edge-Aided Computations for Social Internet-of-Things Systems. IEEE Transactions on Computational Social Systems. 9(1). 76–87. 22 indexed citations
14.
Yu, Jia & Rong Hao. (2019). Comments on “SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage”. IEEE Transactions on Services Computing. 14(6). 2090–2092. 24 indexed citations
15.
Yu, Jia, et al.. (2018). Provable Multiple-Replica Dynamic Data Possession for Big Data Storage in Cloud Computing.. Int. J. Netw. Secur.. 20. 575–584. 3 indexed citations
16.
Ge, Xinrui, et al.. (2017). An Efficient Symmetric Searchable Encryption Scheme for Cloud Storage. SHILAP Revista de lepidopterología. 13 indexed citations
17.
Yu, Jia, et al.. (2014). Key-insulated aggregate signature. Frontiers of Computer Science. 8(5). 837–846. 7 indexed citations
18.
Cheng, Xiangguo, et al.. (2013). Provably Secure Intrusion-Resilient Public-Key Encryption Scheme in the Standard Model. Journal of Software. 24(2). 266–278. 1 indexed citations
19.
Yu, Jia, et al.. (2012). Non-Interactive Forward-Secure Threshold Signature without Random Oracles. Journal of information science and engineering. 28(3). 571–586. 2 indexed citations
20.
Yu, Jia, Fanyu Kong, Rong Hao, & Daxing Li. (2010). A Note on a Forward Secure Threshold Signature Scheme from Bilinear Pairing. 47(4). 605. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026