Tu Peng

766 total citations
27 papers, 503 citations indexed

About

Tu Peng is a scholar working on Artificial Intelligence, Information Systems and Computer Networks and Communications. According to data from OpenAlex, Tu Peng has authored 27 papers receiving a total of 503 indexed citations (citations by other indexed papers that have themselves been cited), including 17 papers in Artificial Intelligence, 14 papers in Information Systems and 11 papers in Computer Networks and Communications. Recurrent topics in Tu Peng's work include Advanced Software Engineering Methodologies (8 papers), Advanced Authentication Protocols Security (7 papers) and Cryptography and Data Security (4 papers). Tu Peng is often cited by papers focused on Advanced Software Engineering Methodologies (8 papers), Advanced Authentication Protocols Security (7 papers) and Cryptography and Data Security (4 papers). Tu Peng collaborates with scholars based in China and United States. Tu Peng's co-authors include Jing Dong, Yajing Zhao, Ling Xiong, Zhicai Liu, Daiyuan Peng, Hongbin Liang, Fagen Li, Xu Yang, Mingxing He and Yajing Zhao and has published in prestigious journals such as IEEE Access, Sensors and International Journal of Environmental Research and Public Health.

In The Last Decade

Tu Peng

26 papers receiving 475 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Tu Peng China 14 366 240 188 65 57 27 503
Fathy Eassa Saudi Arabia 13 301 0.8× 169 0.7× 279 1.5× 50 0.8× 50 0.9× 85 554
Lotfi Ben Othmane United States 13 386 1.1× 199 0.8× 169 0.9× 44 0.7× 56 1.0× 31 582
Wentao Wang China 14 232 0.6× 113 0.5× 172 0.9× 94 1.4× 51 0.9× 61 483
James Bret Michael United States 13 195 0.5× 143 0.6× 147 0.8× 126 1.9× 32 0.6× 85 535
Eda Marchetti Italy 14 369 1.0× 184 0.8× 312 1.7× 377 5.8× 54 0.9× 91 690
Ludger Fiege Germany 16 199 0.5× 165 0.7× 644 3.4× 41 0.6× 44 0.8× 39 815
Daniel Díaz Spain 15 177 0.5× 261 1.1× 207 1.1× 51 0.8× 305 5.4× 50 701
Mónica Pinto Spain 14 453 1.2× 496 2.1× 263 1.4× 101 1.6× 59 1.0× 75 649
Ilaria Matteucci Italy 12 140 0.4× 169 0.7× 139 0.7× 33 0.5× 98 1.7× 67 405
Qingshan Li China 9 240 0.7× 231 1.0× 172 0.9× 29 0.4× 23 0.4× 84 429

Countries citing papers authored by Tu Peng

Since Specialization
Citations

This map shows the geographic impact of Tu Peng's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Tu Peng with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Tu Peng more than expected).

Fields of papers citing papers by Tu Peng

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Tu Peng. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Tu Peng. The network helps show where Tu Peng may publish in the future.

Co-authorship network of co-authors of Tu Peng

This figure shows the co-authorship network connecting the top 25 collaborators of Tu Peng. A scholar is included among the top collaborators of Tu Peng based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Tu Peng. Tu Peng is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Peng, Tu, et al.. (2022). AI‐Based Equipment Optimization of the Design on Intelligent Education Curriculum System. Wireless Communications and Mobile Computing. 2022(1). 14 indexed citations
2.
Xiong, Ling, Fagen Li, Mingxing He, Zhicai Liu, & Tu Peng. (2020). An Efficient Privacy-Aware Authentication Scheme With Hierarchical Access Control for Mobile Cloud Computing Services. IEEE Transactions on Cloud Computing. 10(4). 2309–2323. 25 indexed citations
3.
Xiong, Ling, et al.. (2019). An Efficient Privacy-aware Authentication Scheme for Distributed Mobile Cloud Computing Services without Bilinear Pairings.. Journal of information science and engineering. 35. 341–360. 3 indexed citations
4.
Xiong, Ling, et al.. (2019). A Blockchain-Based Privacy-Awareness Authentication Scheme With Efficient Revocation for Multi-Server Architectures. IEEE Access. 7. 125840–125853. 33 indexed citations
5.
Liu, Zhicai, Ling Xiong, Tu Peng, Daiyuan Peng, & Hongbin Liang. (2018). A Realistic Distributed Conditional Privacy- Preserving Authentication Scheme for Vehicular Ad Hoc Networks. IEEE Access. 6. 26307–26317. 30 indexed citations
6.
Peng, Tu, et al.. (2017). Fault Localization Using Function Call Sequences. Procedia Computer Science. 107. 871–877. 1 indexed citations
7.
Xiong, Ling, et al.. (2017). An Enhanced Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services. KSII Transactions on Internet and Information Systems. 11(12). 31 indexed citations
8.
Xiong, Ling, Daiyuan Peng, Tu Peng, Hongbin Liang, & Zhicai Liu. (2017). A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks. Sensors. 17(11). 2681–2681. 40 indexed citations
9.
Peng, Tu, et al.. (2012). Formal specification and automated verification of UML2.0 sequence diagrams. 370–375. 3 indexed citations
10.
Dong, Jing, et al.. (2010). Modeling enterprise service-oriented architectural styles. Service Oriented Computing and Applications. 4(2). 81–107. 13 indexed citations
11.
Zhao, Yajing, Jing Dong, & Tu Peng. (2009). Ontology Classification for Semantic-Web-Based Software Engineering. IEEE Transactions on Services Computing. 2(4). 303–317. 69 indexed citations
12.
Dong, Jing, Tu Peng, & Yajing Zhao. (2009). Automated verification of security pattern compositions. Information and Software Technology. 52(3). 274–295. 27 indexed citations
13.
Dong, Jing, Yajing Zhao, & Tu Peng. (2009). A REVIEW OF DESIGN PATTERN MINING TECHNIQUES. International Journal of Software Engineering and Knowledge Engineering. 19(6). 823–855. 65 indexed citations
14.
Peng, Tu, Jing Dong, & Yajing Zhao. (2008). Verifying Behavioral Correctness of Design Pattern Implementation.. Software Engineering and Knowledge Engineering. 454–459. 8 indexed citations
15.
Dong, Jing, et al.. (2008). A Generic Model of Enterprise Service-Oriented Architecture. 2444. 1–7. 5 indexed citations
16.
Yen, I‐Ling, et al.. (2008). An Adaptive User Interface Generation Framework for Web Services. 175–182. 9 indexed citations
17.
Dong, Jing, Yajing Zhao, & Tu Peng. (2007). Architecture and Design Pattern Discovery Techniques - A Review.. Software Engineering Research and Practice. 621–627. 27 indexed citations
18.
Dong, Jing, Tu Peng, & Zongyan Qiu. (2007). Commutability of Design Pattern Instantiation and Integration. 49. 283–292. 5 indexed citations
19.
Dong, Jing, Tu Peng, & Yajing Zhao. (2007). Model Checking Security Pattern Compositions. 3. 80–89. 7 indexed citations
20.
Peng, Tu, et al.. (2005). Generalised class of cubic frequency-hopping sequences with large family size. IEE Proceedings - Communications. 152(6). 897–897. 13 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026