Runfa Liao

1.0k total citations
26 papers, 764 citations indexed

About

Runfa Liao is a scholar working on Electrical and Electronic Engineering, Computer Networks and Communications and Artificial Intelligence. According to data from OpenAlex, Runfa Liao has authored 26 papers receiving a total of 764 indexed citations (citations by other indexed papers that have themselves been cited), including 18 papers in Electrical and Electronic Engineering, 12 papers in Computer Networks and Communications and 11 papers in Artificial Intelligence. Recurrent topics in Runfa Liao's work include Wireless Communication Security Techniques (12 papers), Wireless Signal Modulation Classification (7 papers) and Energy Harvesting in Wireless Networks (4 papers). Runfa Liao is often cited by papers focused on Wireless Communication Security Techniques (12 papers), Wireless Signal Modulation Classification (7 papers) and Energy Harvesting in Wireless Networks (4 papers). Runfa Liao collaborates with scholars based in China, Chile and Sweden. Runfa Liao's co-authors include Fei Pan, Hong Wen, Huanhuan Song, Jie Tang, Lin Hu, Hong Wen, Bin Wu, Yixin Jiang, Xiumin Wang and Jinsong Wu and has published in prestigious journals such as IEEE Access, Sensors and IEEE Transactions on Vehicular Technology.

In The Last Decade

Runfa Liao

26 papers receiving 751 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Runfa Liao China 13 527 292 248 111 98 26 764
Huanhuan Song China 18 565 1.1× 350 1.2× 323 1.3× 154 1.4× 130 1.3× 48 927
Lin Hu China 13 451 0.9× 270 0.9× 173 0.7× 85 0.8× 90 0.9× 27 644
Fei Pan China 18 679 1.3× 414 1.4× 295 1.2× 154 1.4× 130 1.3× 39 992
Paul Yu United States 13 505 1.0× 310 1.1× 235 0.9× 70 0.6× 145 1.5× 48 722
Brahmjit Singh India 15 499 0.9× 548 1.9× 221 0.9× 79 0.7× 174 1.8× 113 914
Peng Hao China 10 334 0.6× 266 0.9× 200 0.8× 81 0.7× 74 0.8× 43 579
Feiyi Xie China 10 219 0.4× 141 0.5× 239 1.0× 91 0.8× 82 0.8× 17 444
Bo‐Chao Cheng Taiwan 11 246 0.5× 304 1.0× 124 0.5× 73 0.7× 54 0.6× 41 557
Aanjhan Ranganathan United States 13 268 0.5× 209 0.7× 183 0.7× 58 0.5× 53 0.5× 35 552
Xiaojie Fang China 14 362 0.7× 246 0.8× 121 0.5× 63 0.6× 125 1.3× 63 595

Countries citing papers authored by Runfa Liao

Since Specialization
Citations

This map shows the geographic impact of Runfa Liao's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Runfa Liao with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Runfa Liao more than expected).

Fields of papers citing papers by Runfa Liao

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Runfa Liao. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Runfa Liao. The network helps show where Runfa Liao may publish in the future.

Co-authorship network of co-authors of Runfa Liao

This figure shows the co-authorship network connecting the top 25 collaborators of Runfa Liao. A scholar is included among the top collaborators of Runfa Liao based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Runfa Liao. Runfa Liao is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Xu, Aidong, Qianru Wang, Yixin Jiang, et al.. (2019). Quantitative selection of secure access policies for edge computing side terminals. 3 indexed citations
2.
Liao, Runfa, Hong Wen, Jinsong Wu, et al.. (2019). Security Enhancement for Mobile Edge Computing Through Physical Layer Authentication. IEEE Access. 7. 116390–116401. 62 indexed citations
3.
Pan, Fei, Zhibo Pang, Hong Wen, et al.. (2019). Threshold-Free Physical Layer Authentication Based on Machine Learning for Industrial Wireless CPS. IEEE Transactions on Industrial Informatics. 15(12). 6481–6491. 78 indexed citations
4.
Zhang, Tengyue, Hong Wen, Jie Tang, et al.. (2019). Analysis of the physical layer security enhancing of wireless communication system under the random mobile. IET Communications. 13(9). 1164–1170. 8 indexed citations
5.
Xie, Feiyi, Hong Wen, Jinsong Wu, et al.. (2019). Data Augmentation for Radio Frequency Fingerprinting via Pseudo-Random Integration. IEEE Transactions on Emerging Topics in Computational Intelligence. 4(3). 276–286. 27 indexed citations
6.
Liao, Runfa, Hong Wen, Songlin Chen, et al.. (2019). Multiuser Physical Layer Authentication in Internet of Things With Data Augmentation. IEEE Internet of Things Journal. 7(3). 2077–2088. 66 indexed citations
7.
Tang, Jie, Hong Wen, Kai Zeng, et al.. (2019). Light-Weight Physical Layer Enhanced Security Schemes for 5G Wireless Networks. IEEE Network. 33(5). 126–133. 46 indexed citations
8.
Liao, Runfa, et al.. (2018). The Rayleigh Fading Channel Prediction via Deep Learning. Wireless Communications and Mobile Computing. 2018(1). 68 indexed citations
9.
Song, Huanhuan, et al.. (2018). Secure Cooperative Transmission With Imperfect Channel State Information Based on BPNN. IEEE Transactions on Vehicular Technology. 67(11). 10482–10491. 30 indexed citations
10.
Song, Huanhuan, Hong Wen, Runfa Liao, Yi Chen, & Songlin Chen. (2018). Outage Constrained Secrecy Rate Maximization for MIMOME Multicast Wiretap Channels. IEEE Wireless Communications Letters. 8(3). 657–660. 6 indexed citations
11.
Pan, Fei, Zhibo Pang, Ming Xiao, Hong Wen, & Runfa Liao. (2018). Clone Detection Based on Physical Layer Reputation for Proximity Service. IEEE Access. 7. 3948–3957. 19 indexed citations
12.
Song, Huanhuan, Hong Wen, Lin Hu, Yi Chen, & Runfa Liao. (2018). Optimal Power Allocation for Secrecy Rate Maximization in Broadcast Wiretap Channels. IEEE Wireless Communications Letters. 7(4). 514–517. 17 indexed citations
13.
Zhang, Gaoyuan, et al.. (2018). Simple and robust near‐optimal single differential detection scheme for IEEE 802.15.4 BPSK receivers. IET Communications. 13(2). 186–197. 9 indexed citations
14.
Pan, Fei, Hong Wen, Runfa Liao, et al.. (2017). Physical layer authentication based on channel information and machine learning. 364–365. 29 indexed citations
15.
Hu, Lin, Hong Wen, Bin Wu, et al.. (2017). Cooperative-Jamming-Aided Secrecy Enhancement in Wireless Networks With Passive Eavesdroppers. IEEE Transactions on Vehicular Technology. 67(3). 2108–2117. 51 indexed citations
16.
Zhang, Gaoyuan, Hong Wen, Ping Xie, et al.. (2017). Simple Adaptive Single Differential Coherence Detection of BPSK Signals in IEEE 802.15.4 Wireless Sensor Networks. Sensors. 18(1). 52–52. 10 indexed citations
17.
Pan, Fei, Yixin Jiang, Hong Wen, Runfa Liao, & Aidong Xu. (2017). Physical Layer Security Assisted 5G Network Security. 1–5. 12 indexed citations
18.
Hu, Lin, Hong Wen, Bin Wu, et al.. (2017). Cooperative Jamming for Physical Layer Security Enhancement in Internet of Things. IEEE Internet of Things Journal. 5(1). 219–228. 172 indexed citations
19.
Jiang, Yixin, et al.. (2015). User privacy protection for cloud computing based smart grid. 7–11. 3 indexed citations
20.
Jiang, Yixin, et al.. (2015). A hierarchical key management system applied in cloud-based smart grid. 2. 22–26. 2 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026