Shi-Feng Sun

1.3k total citations
41 papers, 669 citations indexed

About

Shi-Feng Sun is a scholar working on Artificial Intelligence, Information Systems and Computer Vision and Pattern Recognition. According to data from OpenAlex, Shi-Feng Sun has authored 41 papers receiving a total of 669 indexed citations (citations by other indexed papers that have themselves been cited), including 34 papers in Artificial Intelligence, 14 papers in Information Systems and 14 papers in Computer Vision and Pattern Recognition. Recurrent topics in Shi-Feng Sun's work include Cryptography and Data Security (31 papers), Privacy-Preserving Technologies in Data (14 papers) and Chaos-based Image/Signal Encryption (12 papers). Shi-Feng Sun is often cited by papers focused on Cryptography and Data Security (31 papers), Privacy-Preserving Technologies in Data (14 papers) and Chaos-based Image/Signal Encryption (12 papers). Shi-Feng Sun collaborates with scholars based in China, Australia and Hong Kong. Shi-Feng Sun's co-authors include Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Xingliang Yuan, Dawu Gu, ‪Surya Nepal‬, Cong Zuo, Shangqi Lai, Jianfeng Wang and Dongxi Liu and has published in prestigious journals such as SHILAP Revista de lepidopterología, Scientific Reports and IEEE Access.

In The Last Decade

Shi-Feng Sun

35 papers receiving 657 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Shi-Feng Sun China 13 528 259 147 127 117 41 669
Massimo Ancona Italy 10 148 0.3× 91 0.4× 66 0.4× 27 0.2× 96 0.8× 67 373
Chenxi Wang China 10 452 0.9× 188 0.7× 149 1.0× 137 1.1× 72 0.6× 28 560
Dragos D. Margineantu United States 6 404 0.8× 72 0.3× 136 0.9× 22 0.2× 26 0.2× 12 510
Ayaz Isazadeh Iran 12 204 0.4× 162 0.6× 28 0.2× 54 0.4× 108 0.9× 46 384
N. Ramaraj India 9 188 0.4× 79 0.3× 102 0.7× 24 0.2× 80 0.7× 28 390
Mostefa Golea Canada 8 406 0.8× 53 0.2× 88 0.6× 104 0.8× 17 0.1× 20 502
Alva Couch United States 12 153 0.3× 166 0.6× 57 0.4× 11 0.1× 190 1.6× 56 432

Countries citing papers authored by Shi-Feng Sun

Since Specialization
Citations

This map shows the geographic impact of Shi-Feng Sun's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Shi-Feng Sun with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Shi-Feng Sun more than expected).

Fields of papers citing papers by Shi-Feng Sun

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Shi-Feng Sun. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Shi-Feng Sun. The network helps show where Shi-Feng Sun may publish in the future.

Co-authorship network of co-authors of Shi-Feng Sun

This figure shows the co-authorship network connecting the top 25 collaborators of Shi-Feng Sun. A scholar is included among the top collaborators of Shi-Feng Sun based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Shi-Feng Sun. Shi-Feng Sun is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Ling, Guowei, et al.. (2025). Privacy-Preserving Authorized Set Matching via Dishonest Majority Multiparty Computation. IEEE Transactions on Dependable and Secure Computing. 22(6). 7614–7631.
2.
Wang, Jianfeng, et al.. (2025). Practical Equi-Join Over Encrypted Database With Reduced Leakage. IEEE Transactions on Knowledge and Data Engineering. 37(5). 2846–2860.
3.
Wang, Jianfeng, et al.. (2025). Violin: Powerful Volumetric Injection Attack Against Searchable Encryption With Optimal Injection Size. IEEE Transactions on Dependable and Secure Computing. 22(4). 4103–4115.
4.
Qi, Yu, et al.. (2024). Predicting Effects of Non-Point Source Pollution Emission Control Schemes Based on VMD-BiLSTM and MIKE21. Environmental Modeling & Assessment. 29(4). 797–812. 3 indexed citations
5.
Qi, Saiyu, Wei Wei, Jianfeng Wang, et al.. (2023). Secure Data Deduplication With Dynamic Access Control for Mobile Cloud Storage. IEEE Transactions on Mobile Computing. 23(4). 2566–2582. 7 indexed citations
6.
Wang, Jianfeng, et al.. (2023). Towards Practical Multi-Client Order-Revealing Encryption: Improvement and Application. IEEE Transactions on Dependable and Secure Computing. 21(3). 1111–1126. 4 indexed citations
7.
Li, Haiyang, et al.. (2023). Daily flow prediction of the Huayuankou hydrometeorological station based on the coupled CEEMDAN–SE–BiLSTM model. Scientific Reports. 13(1). 18915–18915. 6 indexed citations
8.
Zhang, Xianqi, et al.. (2023). A runoff prediction method based on hyperparameter optimisation of a kernel extreme learning machine with multi-step decomposition. Scientific Reports. 13(1). 19341–19341. 10 indexed citations
9.
Zhang, Xianqi, Xin Wang, Haiyang Li, Shi-Feng Sun, & Fang Liu. (2023). Monthly runoff prediction based on a coupled VMD-SSA-BiLSTM model. Scientific Reports. 13(1). 13149–13149. 33 indexed citations
10.
Zhang, Ren, et al.. (2022). VOProof. Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. 3195–3208. 1 indexed citations
11.
Sun, Shi-Feng, et al.. (2022). Outsourcing LDA-Based Face Recognition to an Untrusted Cloud. IEEE Transactions on Dependable and Secure Computing. 1–1. 14 indexed citations
12.
Wang, Jianfeng, et al.. (2022). Practical Volume-Hiding Encrypted Multi-Maps with Optimal Overhead and Beyond. Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. 2825–2839. 18 indexed citations
13.
Sun, Shi-Feng, et al.. (2022). Shorter Linkable Ring Signature Based on Middle-Product Learning with Errors Problem. The Computer Journal. 66(12). 2974–2989. 1 indexed citations
14.
Gan, Qingqing, Joseph K. Liu, Xiaoming Wang, et al.. (2022). Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage. Frontiers of Computer Science. 16(6). 12 indexed citations
15.
Yuan, Xingliang, et al.. (2021). ShieldDB: An Encrypted Document Database With Padding Countermeasures. IEEE Transactions on Knowledge and Data Engineering. 35(4). 4236–4252. 7 indexed citations
16.
Sun, Shi-Feng, et al.. (2020). Geometric Range Search on Encrypted Data With Forward/Backward Security. IEEE Transactions on Dependable and Secure Computing. 19(1). 698–716. 26 indexed citations
17.
Xu, Lei, Shi-Feng Sun, Xingliang Yuan, et al.. (2019). Enabling Authorized Encrypted Search for Multi-Authority Medical Databases. IEEE Transactions on Emerging Topics in Computing. 9(1). 534–546. 19 indexed citations
18.
Lai, Shangqi, Sikhar Patranabis, Amin Sakzad, et al.. (2018). Result Pattern Hiding Searchable Encryption for Conjunctive Queries. 745–762. 130 indexed citations
19.
Sun, Shi-Feng, Qiaoyan Wen, Zhengping Jin, & Hua Zhang. (2010). A New Efficient ID-Based Strong Designated Verifier Signature Scheme. 137–141. 3 indexed citations
20.
Sun, Shi-Feng & Qiaoyan Wen. (2009). Novel Efficient Certificateless Blind Signature Schemes. 950. 1–5. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026