Ruhui Ma

625 total citations
16 papers, 434 citations indexed

About

Ruhui Ma is a scholar working on Computer Networks and Communications, Information Systems and Electrical and Electronic Engineering. According to data from OpenAlex, Ruhui Ma has authored 16 papers receiving a total of 434 indexed citations (citations by other indexed papers that have themselves been cited), including 14 papers in Computer Networks and Communications, 9 papers in Information Systems and 6 papers in Electrical and Electronic Engineering. Recurrent topics in Ruhui Ma's work include Advanced Authentication Protocols Security (11 papers), User Authentication and Security Systems (6 papers) and Cryptography and Data Security (3 papers). Ruhui Ma is often cited by papers focused on Advanced Authentication Protocols Security (11 papers), User Authentication and Security Systems (6 papers) and Cryptography and Data Security (3 papers). Ruhui Ma collaborates with scholars based in China, Singapore and Finland. Ruhui Ma's co-authors include Hui Li, Jin Cao, Maode Ma, Yu Pu, Yinghui Zhang, Dengguo Feng, Zheng Yan, Xixiang Lv, Jian Guan and Xu Yang and has published in prestigious journals such as IEEE Communications Surveys & Tutorials, IEEE Transactions on Vehicular Technology and IEEE Transactions on Intelligent Transportation Systems.

In The Last Decade

Ruhui Ma

16 papers receiving 423 citations

Peers

Ruhui Ma
Ashutosh Dutta United States
Neco Ventura South Africa
Hyoung-Kee Choi South Korea
N.J. Davis United States
Il-Gu Lee South Korea
Ruhui Ma
Citations per year, relative to Ruhui Ma Ruhui Ma (= 1×) peers Mingping Qi

Countries citing papers authored by Ruhui Ma

Since Specialization
Citations

This map shows the geographic impact of Ruhui Ma's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Ruhui Ma with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Ruhui Ma more than expected).

Fields of papers citing papers by Ruhui Ma

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Ruhui Ma. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Ruhui Ma. The network helps show where Ruhui Ma may publish in the future.

Co-authorship network of co-authors of Ruhui Ma

This figure shows the co-authorship network connecting the top 25 collaborators of Ruhui Ma. A scholar is included among the top collaborators of Ruhui Ma based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Ruhui Ma. Ruhui Ma is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

16 of 16 papers shown
1.
Cao, Jin, et al.. (2024). NSAA: A Network Slice Access Authentication and Service Authorization Scheme for Integrated Satellite-Terrestrial Network. IEEE Internet of Things Journal. 12(6). 7636–7651. 1 indexed citations
2.
Cao, Jin, et al.. (2023). A Novel Access and Handover Authentication Scheme in UAV-Aided Satellite-Terrestrial Integration Networks Enabling 5G. IEEE Transactions on Network and Service Management. 20(3). 3880–3899. 22 indexed citations
3.
Ma, Ruhui, et al.. (2023). A UAV-Assisted UE Access Authentication Scheme for 5G/6G Network. IEEE Transactions on Network and Service Management. 21(2). 2426–2444. 9 indexed citations
4.
Cao, Jin, et al.. (2023). FHAP: Fast Handover Authentication Protocol for High-Speed Mobile Terminals in 5G Satellite–Terrestrial-Integrated Networks. IEEE Internet of Things Journal. 10(15). 13959–13973. 16 indexed citations
5.
Li, Sheng, et al.. (2022). An Efficient Authentication and Key Distribution Protocol for Multicast Service in Space-Ground Integration Network. Security and Communication Networks. 2022. 1–14. 1 indexed citations
6.
Cao, Jin, et al.. (2022). A Software-Based Remote Attestation Scheme for Internet of Things Devices. IEEE Transactions on Dependable and Secure Computing. 20(2). 1422–1434. 16 indexed citations
7.
Ma, Ruhui, et al.. (2022). A Group-Based Multicast Service Authentication and Data Transmission Scheme for 5G-V2X. IEEE Transactions on Intelligent Transportation Systems. 23(12). 23976–23992. 10 indexed citations
8.
Cao, Jin, et al.. (2022). RPRIA: Reputation and PUF-Based Remote Identity Attestation Protocol for Massive IoT Devices. IEEE Internet of Things Journal. 9(19). 19174–19187. 10 indexed citations
9.
Li, Hui, et al.. (2021). A Composable Multifactor Identity Authentication and Authorization Scheme for 5G Services. Security and Communication Networks. 2021. 1–18. 5 indexed citations
10.
Ma, Ruhui, et al.. (2021). A robust authentication scheme for remote diagnosis and maintenance in 5G V2N. Journal of Network and Computer Applications. 198. 103281–103281. 18 indexed citations
11.
Ma, Ruhui, Jin Cao, Dengguo Feng, et al.. (2020). A Secure Authentication Scheme for Remote Diagnosis and Maintenance in Internet of Vehicles. 1–7. 6 indexed citations
12.
Cao, Jin, et al.. (2020). LSAA: A Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks. IEEE Internet of Things Journal. 7(6). 5329–5344. 52 indexed citations
13.
Ma, Ruhui, et al.. (2019). FTGPHA: Fixed-Trajectory Group Pre-Handover Authentication Mechanism for Mobile Relays in 5G High-Speed Rail Networks. IEEE Transactions on Vehicular Technology. 69(2). 2126–2140. 39 indexed citations
14.
Ma, Ruhui, Jin Cao, Dengguo Feng, & Hui Li. (2019). LAA: Lattice-Based Access Authentication Scheme for IoT in Space Information Networks. IEEE Internet of Things Journal. 7(4). 2791–2805. 26 indexed citations
15.
Cao, Jin, et al.. (2019). A Survey on Security Aspects for 3GPP 5G Networks. IEEE Communications Surveys & Tutorials. 22(1). 170–195. 185 indexed citations
16.
Ma, Ruhui, Jin Cao, Dengguo Feng, et al.. (2018). PPSHA: Privacy preserving secure handover authentication scheme for all application scenarios in LTE-A networks. Ad Hoc Networks. 87. 49–60. 18 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026