Shengshan Hu

1.9k total citations
61 papers, 1.2k citations indexed

About

Shengshan Hu is a scholar working on Artificial Intelligence, Computer Vision and Pattern Recognition and Signal Processing. According to data from OpenAlex, Shengshan Hu has authored 61 papers receiving a total of 1.2k indexed citations (citations by other indexed papers that have themselves been cited), including 50 papers in Artificial Intelligence, 17 papers in Computer Vision and Pattern Recognition and 10 papers in Signal Processing. Recurrent topics in Shengshan Hu's work include Adversarial Robustness in Machine Learning (30 papers), Privacy-Preserving Technologies in Data (18 papers) and Cryptography and Data Security (16 papers). Shengshan Hu is often cited by papers focused on Adversarial Robustness in Machine Learning (30 papers), Privacy-Preserving Technologies in Data (18 papers) and Cryptography and Data Security (16 papers). Shengshan Hu collaborates with scholars based in China, Australia and Hong Kong. Shengshan Hu's co-authors include Qian Wang, Leo Yu Zhang, Cong Wang, Kui Ren, Minghui Li, Zhan Qin, Chengjun Cai, Hai Jin, Kui Ren and Xiangyang Luo and has published in prestigious journals such as Bioinformatics, IEEE Transactions on Image Processing and IEEE Communications Magazine.

In The Last Decade

Shengshan Hu

53 papers receiving 1.1k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Shengshan Hu China 19 878 367 305 155 146 61 1.2k
Xiangyang Luo China 18 652 0.7× 392 1.1× 683 2.2× 140 0.9× 157 1.1× 91 1.3k
Kim Laine United States 13 1.5k 1.7× 366 1.0× 268 0.9× 181 1.2× 66 0.5× 21 1.7k
Abbas Acar United States 11 667 0.8× 327 0.9× 161 0.5× 253 1.6× 160 1.1× 26 1.0k
Nicola Tonellotto Italy 17 579 0.7× 458 1.2× 278 0.9× 334 2.2× 180 1.2× 88 990
Sheng Shen United States 15 701 0.8× 112 0.3× 249 0.8× 79 0.5× 84 0.6× 33 944
Xin Xin China 19 593 0.7× 625 1.7× 169 0.6× 135 0.9× 41 0.3× 82 1.0k
Yuanshun Yao United States 8 927 1.1× 126 0.3× 238 0.8× 190 1.2× 317 2.2× 11 1.1k
Zekeriya Erkin Netherlands 17 666 0.8× 320 0.9× 256 0.8× 160 1.0× 59 0.4× 77 1.0k

Countries citing papers authored by Shengshan Hu

Since Specialization
Citations

This map shows the geographic impact of Shengshan Hu's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Shengshan Hu with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Shengshan Hu more than expected).

Fields of papers citing papers by Shengshan Hu

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Shengshan Hu. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Shengshan Hu. The network helps show where Shengshan Hu may publish in the future.

Co-authorship network of co-authors of Shengshan Hu

This figure shows the co-authorship network connecting the top 25 collaborators of Shengshan Hu. A scholar is included among the top collaborators of Shengshan Hu based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Shengshan Hu. Shengshan Hu is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Zhou, Ziqi, Minghui Li, Xianlong Wang, et al.. (2025). PB-UAP: Hybride Universal Adversarial Attack for Image Segmentation. 1–5. 1 indexed citations
2.
Zhou, Ziqi, et al.. (2025). Test-Time Backdoor Detection for Object Detection Models. 24377–24386.
4.
Wang, Yichen, et al.. (2025). Breaking Barriers in Physical-World Adversarial Examples: Improving Robustness and Transferability via Robust Feature. Proceedings of the AAAI Conference on Artificial Intelligence. 39(8). 8069–8077.
5.
Zhang, Yanjun, et al.. (2024). Towards Model Extraction Attacks in GAN-Based Image Translation via Domain Shift Mitigation. Proceedings of the AAAI Conference on Artificial Intelligence. 38(18). 19902–19910. 1 indexed citations
6.
Zhang, Leo Yu, et al.. (2024). Towards Threshold Anonymous Announcement With Batch Verification for Cooperative Intelligent Transport Systems. IEEE Transactions on Vehicular Technology. 73(12). 18173–18185. 1 indexed citations
7.
Hu, Shengshan, Leo Yu Zhang, Junyu Shi, et al.. (2024). Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability. 3365–3384. 8 indexed citations
8.
Wan, Wei, Shengshan Hu, Lu‐Lu Xue, et al.. (2024). MISA: Unveiling the Vulnerabilities in Split Federated Learning. 6435–6439. 2 indexed citations
10.
Hu, Shengshan, Wei Liu, Junhui Hou, et al.. (2023). PointCA: Evaluating the Robustness of 3D Point Cloud Completion Models against Adversarial Examples. Proceedings of the AAAI Conference on Artificial Intelligence. 37(1). 872–880. 8 indexed citations
11.
Hu, Shengshan, et al.. (2023). PointCRT: Detecting Backdoor in 3D Point Cloud via Corruption Robustness. Griffith Research Online (Griffith University, Queensland, Australia). 666–675. 6 indexed citations
12.
Wang, Lin, et al.. (2023). Benchmarking and Analyzing Robust Point Cloud Recognition: Bag of Tricks for Defending Adversarial Examples. Rare & Special e-Zone (The Hong Kong University of Science and Technology). 4272–4281. 3 indexed citations
13.
Zhang, Leo Yu, et al.. (2023). Denial-of-Service or Fine-Grained Control: Towards Flexible Model Poisoning Attacks on Federated Learning. Griffith Research Online (Griffith University, Queensland, Australia). 4567–4575. 8 indexed citations
15.
Zhou, Ziqi, Shengshan Hu, Ruizhi Zhao, et al.. (2023). Downstream-agnostic Adversarial Examples. 4322–4332. 9 indexed citations
16.
Wan, Wei, et al.. (2022). Shielding Federated Learning: Robust Aggregation with Adaptive Client Selection. Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence. 753–760. 24 indexed citations
17.
Chen, Dian, Haobo Yuan, Shengshan Hu, Qian Wang, & Cong Wang. (2020). BOSSA: A Decentralized System for Proofs of Data Retrievability and Replication. IEEE Transactions on Parallel and Distributed Systems. 32(4). 786–798. 34 indexed citations
18.
Li, Minghui, et al.. (2020). Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions. IEEE Transactions on Dependable and Secure Computing. 19(3). 1592–1604. 43 indexed citations
19.
Hu, Shengshan, Leo Yu Zhang, Qian Wang, Zhan Qin, & Cong Wang. (2019). Towards Private and Scalable Cross-Media Retrieval. IEEE Transactions on Dependable and Secure Computing. 1–1. 16 indexed citations
20.
Hu, Shengshan, et al.. (2017). Privacy-Preserving Outsourced Feature Extractions in the Cloud: A Survey. IEEE Network. 31(5). 36–41. 14 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026