Shaojing Fu

525 total citations
45 papers, 297 citations indexed

About

Shaojing Fu is a scholar working on Artificial Intelligence, Information Systems and Computer Networks and Communications. According to data from OpenAlex, Shaojing Fu has authored 45 papers receiving a total of 297 indexed citations (citations by other indexed papers that have themselves been cited), including 39 papers in Artificial Intelligence, 20 papers in Information Systems and 8 papers in Computer Networks and Communications. Recurrent topics in Shaojing Fu's work include Cryptography and Data Security (20 papers), Privacy-Preserving Technologies in Data (16 papers) and Blockchain Technology Applications and Security (7 papers). Shaojing Fu is often cited by papers focused on Cryptography and Data Security (20 papers), Privacy-Preserving Technologies in Data (16 papers) and Blockchain Technology Applications and Security (7 papers). Shaojing Fu collaborates with scholars based in China, Hong Kong and Australia. Shaojing Fu's co-authors include Yuchuan Luo, Ming Xu, Jianchao Tang, Ming Xu, Ximeng Liu, Longjiang Qu, Chao Li, Kangquan Li, Lin Liu and Tao Xie and has published in prestigious journals such as Information Sciences, IEEE Transactions on Knowledge and Data Engineering and IEEE Transactions on Information Forensics and Security.

In The Last Decade

Shaojing Fu

43 papers receiving 289 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Shaojing Fu China 10 218 125 75 60 48 45 297
Huayi Duan Hong Kong 12 390 1.8× 233 1.9× 168 2.2× 118 2.0× 43 0.9× 26 532
Georgios Kellaris United States 6 372 1.7× 58 0.5× 81 1.1× 83 1.4× 52 1.1× 7 447
Chengjun Cai Hong Kong 12 387 1.8× 478 3.8× 96 1.3× 130 2.2× 30 0.6× 27 585
Arthur Sandor Voundi Koe China 11 190 0.9× 179 1.4× 16 0.2× 83 1.4× 31 0.6× 26 330
Moming Duan China 8 429 2.0× 75 0.6× 64 0.9× 122 2.0× 74 1.5× 17 498
Briland Hitaj United States 3 751 3.4× 94 0.8× 70 0.9× 69 1.1× 60 1.3× 5 809
Thanh T. L. Tran United States 7 168 0.8× 70 0.6× 37 0.5× 141 2.4× 50 1.0× 8 329
Shengnan Zhao China 5 221 1.0× 96 0.8× 15 0.2× 54 0.9× 29 0.6× 15 308
Helei Cui China 9 147 0.7× 110 0.9× 37 0.5× 42 0.7× 8 0.2× 42 266
Qiang Tang Australia 10 183 0.8× 279 2.2× 82 1.1× 144 2.4× 36 0.8× 26 379

Countries citing papers authored by Shaojing Fu

Since Specialization
Citations

This map shows the geographic impact of Shaojing Fu's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Shaojing Fu with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Shaojing Fu more than expected).

Fields of papers citing papers by Shaojing Fu

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Shaojing Fu. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Shaojing Fu. The network helps show where Shaojing Fu may publish in the future.

Co-authorship network of co-authors of Shaojing Fu

This figure shows the co-authorship network connecting the top 25 collaborators of Shaojing Fu. A scholar is included among the top collaborators of Shaojing Fu based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Shaojing Fu. Shaojing Fu is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Wang, Yongjun, et al.. (2025). unFlowS: An Unsupervised Construction Scheme of Flow Spectrum for Network Traffic Detection. IEEE Transactions on Information Forensics and Security. 20. 3330–3345. 2 indexed citations
2.
Wang, Yongjun, et al.. (2024). Fuzzing JavaScript Engines with a Graph-based IR. Infoscience (Ecole Polytechnique Fédérale de Lausanne). 3734–3748.
3.
Fu, Shaojing, et al.. (2024). Fuzzing JavaScript engines with a syntax-aware neural program model. Computers & Security. 144. 103947–103947. 2 indexed citations
4.
Fu, Shaojing, et al.. (2024). The Analysis of Encrypted Video Stream Based on Low-Dimensional Embedding Method. IEEE Transactions on Information Forensics and Security. 20. 8280–8295. 1 indexed citations
5.
Yang, Luming, et al.. (2024). ExpMD: an Explainable Framework for Traffic Identification Based on Multi-Domain Features. 1–10. 1 indexed citations
6.
Liu, Lin, Jinshu Su, Ximeng Liu, et al.. (2023). Towards Strong Privacy Protection for Association Rule Mining and Query in the Cloud. IEEE Transactions on Cloud Computing. 11(3). 3211–3225. 2 indexed citations
7.
Tang, Jianchao, Shaojing Fu, Ximeng Liu, Yuchuan Luo, & Ming Xu. (2023). Achieving Privacy-preserving and Lightweight Truth Discovery in Mobile Crowdsensing (Extended abstract). 3797–3798. 2 indexed citations
8.
Fu, Shaojing, et al.. (2023). HCV: Practical Multi-Keyword Conjunctive Query with Little Result Pattern Leakage. Security and Communication Networks. 2023. 1–15.
9.
Yang, Luming, Yongjun Wang, Shaojing Fu, Lin Liu, & Yuchuan Luo. (2023). EVS2vec: A Low-dimensional Embedding Method for Encrypted Video Stream Analysis. 537–545. 3 indexed citations
10.
Luo, Yuchuan, et al.. (2022). Accelerating Privacy-Preserving Image Retrieval with Multi-Index Hashing. 4 indexed citations
11.
Luo, Yuchuan, et al.. (2022). DPMF: Decentralized Probabilistic Matrix Factorization for Privacy-Preserving Recommendation. Applied Sciences. 12(21). 11118–11118. 7 indexed citations
12.
Liu, Yunwen, Wenying Zhang, Bing Sun, et al.. (2020). The phantom of differential characteristics. Designs Codes and Cryptography. 88(11). 2289–2311. 1 indexed citations
14.
Luo, Yuchuan, Xiaohua Jia, Huayi Duan, et al.. (2019). pRide. 1–10. 9 indexed citations
15.
Fu, Shaojing, et al.. (2019). A Secure Identity Authentication Scheme Based on Blockchain and Identity-based Cryptography. 90–95. 15 indexed citations
16.
Li, Kangquan, Longjiang Qu, Chao Li, & Shaojing Fu. (2018). New permutation trinomials constructed from fractional polynomials. Acta Arithmetica. 183(2). 101–116. 22 indexed citations
17.
Yang, Zhichao, Shaojing Fu, Longjiang Qu, & Chao Li. (2017). A lower dimension lattice attack on NTRU. Science China Information Sciences. 61(5). 4 indexed citations
18.
Jia, Xiaohua, et al.. (2016). Structured queries with generalized pattern matching on encrypted cloud data. 463. 1–7. 2 indexed citations
19.
Luo, Yuchuan, et al.. (2015). Efficient Integrity Auditing for Shared Data in the Cloud with Secure User Revocation. 1. 434–442. 13 indexed citations
20.
Qu, Longjiang, et al.. (2013). Linear complexity of binary sequences with interleaved structure. IET Communications. 7(15). 1688–1696. 7 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026