Tianjie Cao

624 total citations
45 papers, 440 citations indexed

About

Tianjie Cao is a scholar working on Information Systems, Artificial Intelligence and Computer Networks and Communications. According to data from OpenAlex, Tianjie Cao has authored 45 papers receiving a total of 440 indexed citations (citations by other indexed papers that have themselves been cited), including 31 papers in Information Systems, 24 papers in Artificial Intelligence and 23 papers in Computer Networks and Communications. Recurrent topics in Tianjie Cao's work include User Authentication and Security Systems (19 papers), Advanced Authentication Protocols Security (17 papers) and Cryptography and Data Security (16 papers). Tianjie Cao is often cited by papers focused on User Authentication and Security Systems (19 papers), Advanced Authentication Protocols Security (17 papers) and Cryptography and Data Security (16 papers). Tianjie Cao collaborates with scholars based in China, Australia and United States. Tianjie Cao's co-authors include Elisa Bertino, Hong Lei, Dongdai Lin, Rui Xue, Peng Shen, Xiuqing Chen, Qian Zhao, Fengrong Zhang, Lili Liu and Yupu Hu and has published in prestigious journals such as Information Sciences, Journal of Theoretical Biology and IEEE Communications Letters.

In The Last Decade

Tianjie Cao

42 papers receiving 398 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Tianjie Cao China 12 275 263 194 153 74 45 440
Alberto Peinado Spain 10 214 0.8× 133 0.5× 151 0.8× 141 0.9× 32 0.4× 33 373
Gongliang Chen China 11 250 0.9× 175 0.7× 203 1.0× 118 0.8× 20 0.3× 40 388
Martin Feldhofer Austria 13 201 0.7× 208 0.8× 360 1.9× 281 1.8× 56 0.8× 35 627
Shuming Qiu China 6 245 0.9× 235 0.9× 161 0.8× 17 0.1× 67 0.9× 10 386
Johannes Wolkerstorfer Austria 9 107 0.4× 128 0.5× 300 1.5× 139 0.9× 28 0.4× 18 428
Lucca Hirschi France 7 293 1.1× 190 0.7× 135 0.7× 47 0.3× 61 0.8× 9 384
Jannik Dreier France 6 242 0.9× 152 0.6× 136 0.7× 32 0.2× 49 0.7× 12 328
Hervé Sibert France 6 109 0.4× 82 0.3× 90 0.5× 112 0.7× 27 0.4× 9 247
Mostafa Belkasmi Morocco 11 257 0.9× 91 0.3× 258 1.3× 22 0.1× 51 0.7× 104 478
Anish Mathuria India 5 339 1.2× 231 0.9× 246 1.3× 13 0.1× 41 0.6× 16 450

Countries citing papers authored by Tianjie Cao

Since Specialization
Citations

This map shows the geographic impact of Tianjie Cao's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Tianjie Cao with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Tianjie Cao more than expected).

Fields of papers citing papers by Tianjie Cao

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Tianjie Cao. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Tianjie Cao. The network helps show where Tianjie Cao may publish in the future.

Co-authorship network of co-authors of Tianjie Cao

This figure shows the co-authorship network connecting the top 25 collaborators of Tianjie Cao. A scholar is included among the top collaborators of Tianjie Cao based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Tianjie Cao. Tianjie Cao is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Cao, Tianjie, et al.. (2018). Malware detection approach based on non-user operating sequence. 38(1). 56–60. 1 indexed citations
2.
Cao, Tianjie, et al.. (2017). Highly accurate prediction of protein self-interactions by incorporating the average block and PSSM information into the general PseAAC. Journal of Theoretical Biology. 432. 80–86. 10 indexed citations
3.
Chen, Xiuqing, et al.. (2017). Attacks on and Countermeasures for Two RFID Protocols. Wireless Personal Communications. 96(4). 5825–5848. 2 indexed citations
4.
Cao, Tianjie, et al.. (2015). Security on Dynamic ID-based Authentication Schemes. International Journal of Security and Its Applications. 9(1). 387–396. 2 indexed citations
5.
Chen, Xiuqing, Tianjie Cao, & Yu Guo. (2014). A New Scalable RFID Delegation Protocol. Applied Mathematics & Information Sciences. 8(4). 1917–1924. 2 indexed citations
6.
Cao, Tianjie. (2013). UDX: Reliable transfer protocol based on UDP. Jisuanji gongcheng yu sheji.
7.
Cao, Tianjie, et al.. (2013). Improved Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems. Journal of Medical Systems. 37(2). 9912–9912. 55 indexed citations
8.
Ding, Fang & Tianjie Cao. (2011). Application of Daubechies Wavelet Transform in the Estimation of Standard Deviation of White Noise. 19. 212–215. 3 indexed citations
9.
Cao, Tianjie. (2010). Enhanced privacy preserving K-anonymity model:(α,L)-diversity K-anonymity. Computer Engineering and Applications Journal. 2 indexed citations
10.
Cao, Tianjie & Peng Shen. (2009). Cryptanalysis of Two RFID Authentication Protocols. International journal of network security. 9(1). 95–100. 14 indexed citations
11.
Cao, Tianjie, et al.. (2009). Cryptanalysis of Some Client-to-Client Password-Authenticated Key Exchange Protocols. Journal of Networks. 4(4). 2 indexed citations
13.
Cao, Tianjie, Peng Shen, & Elisa Bertino. (2008). Cryptanalysis of the LCSS RFID Authentication Protocol. 3450. 305–309. 2 indexed citations
14.
Cao, Tianjie, Peng Shen, & Elisa Bertino. (2008). Cryptanalysis of Some RFID Authentication Protocols. Journal of Communications. 3(7). 25 indexed citations
15.
Cao, Tianjie & Xianping Mao. (2007). Original Signer's Forgery Attacks on Discrete Logarithm Based Proxy Signature Schemes. International journal of network security. 4. 355–360. 2 indexed citations
16.
Cao, Tianjie, et al.. (2007). Controlled Secret Leakage. 2501. 868–872. 1 indexed citations
17.
Cao, Tianjie & Dongdai Lin. (2006). Security analysis of a signature scheme with message recovery. Journal of Zhejiang University(Science Edition). 1 indexed citations
18.
Cao, Tianjie. (2006). Security Analysis of Some Proxy Multi-Signature Schemes Based on Elliptic Curve Cryptosystem. Journal of Chinese Computer Systems. 2 indexed citations
19.
Cao, Tianjie, Dongdai Lin, & Rui Xue. (2006). Security Analysis of Some Batch Verifying Signatures from Pairings. International journal of network security. 3(2). 138–143. 12 indexed citations
20.
Cao, Tianjie, Dongdai Lin, & Rui Xue. (2004). A randomized RSA-based partially blind signature scheme for electronic cash. Computers & Security. 24(1). 44–49. 27 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026