Wen-Guey Tzeng

3.1k total citations
54 papers, 1.2k citations indexed

About

Wen-Guey Tzeng is a scholar working on Artificial Intelligence, Computer Networks and Communications and Information Systems. According to data from OpenAlex, Wen-Guey Tzeng has authored 54 papers receiving a total of 1.2k indexed citations (citations by other indexed papers that have themselves been cited), including 40 papers in Artificial Intelligence, 29 papers in Computer Networks and Communications and 10 papers in Information Systems. Recurrent topics in Wen-Guey Tzeng's work include Cryptography and Data Security (25 papers), Internet Traffic Analysis and Secure E-voting (9 papers) and Security in Wireless Sensor Networks (9 papers). Wen-Guey Tzeng is often cited by papers focused on Cryptography and Data Security (25 papers), Internet Traffic Analysis and Secure E-voting (9 papers) and Security in Wireless Sensor Networks (9 papers). Wen-Guey Tzeng collaborates with scholars based in Taiwan, United States and Norway. Wen-Guey Tzeng's co-authors include Hsiao-Ying Lin, Shi‐Chun Tsai, Yiren Chen, Torleiv Kløve, J. D. Tygar, Ker‐I Ko, Bao‐Shuh Paul Lin, Cheng‐Kang Chu, Hui Wu and Wei‐Pang Yang and has published in prestigious journals such as IEEE Transactions on Information Theory, IEEE Transactions on Image Processing and Information Sciences.

In The Last Decade

Wen-Guey Tzeng

51 papers receiving 1.1k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Wen-Guey Tzeng Taiwan 19 773 547 371 260 165 54 1.2k
Zhengan Huang China 13 863 1.1× 419 0.8× 541 1.5× 198 0.8× 120 0.7× 29 1.3k
Bo Yang China 19 1.0k 1.3× 471 0.9× 634 1.7× 171 0.7× 161 1.0× 169 1.4k
Baocang Wang China 20 899 1.2× 362 0.7× 584 1.6× 154 0.6× 111 0.7× 133 1.2k
Yupeng Zhang United States 14 1.4k 1.9× 243 0.4× 391 1.1× 254 1.0× 112 0.7× 41 1.7k
Xingliang Yuan Australia 27 1.6k 2.0× 415 0.8× 777 2.1× 310 1.2× 134 0.8× 102 1.9k
Xavier Boyen Australia 17 908 1.2× 280 0.5× 533 1.4× 199 0.8× 160 1.0× 40 1.3k
Devesh C. Jinwala India 14 363 0.5× 528 1.0× 265 0.7× 108 0.4× 175 1.1× 92 969
Sarvar Patel United States 10 1.9k 2.5× 322 0.6× 300 0.8× 123 0.5× 245 1.5× 17 2.2k
M. Dennis Mickunas United States 17 377 0.5× 531 1.0× 283 0.8× 345 1.3× 83 0.5× 38 901

Countries citing papers authored by Wen-Guey Tzeng

Since Specialization
Citations

This map shows the geographic impact of Wen-Guey Tzeng's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Wen-Guey Tzeng with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Wen-Guey Tzeng more than expected).

Fields of papers citing papers by Wen-Guey Tzeng

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Wen-Guey Tzeng. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Wen-Guey Tzeng. The network helps show where Wen-Guey Tzeng may publish in the future.

Co-authorship network of co-authors of Wen-Guey Tzeng

This figure shows the co-authorship network connecting the top 25 collaborators of Wen-Guey Tzeng. A scholar is included among the top collaborators of Wen-Guey Tzeng based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Wen-Guey Tzeng. Wen-Guey Tzeng is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Tzeng, Wen-Guey, et al.. (2020). Efficient k-out-of-n Oblivious Transfer Schemes. Zenodo (CERN European Organization for Nuclear Research). 9 indexed citations
2.
Tzeng, Wen-Guey, et al.. (2020). RL-PMAgg: Robust aggregation for PM2.5 using deep RL-based trust management system. Internet of Things. 13. 100347–100347. 2 indexed citations
3.
Tzeng, Wen-Guey, et al.. (2018). Effective Botnet Detection Through Neural Networks on Convolutional Features. 372–378. 33 indexed citations
4.
Tzeng, Wen-Guey, et al.. (2018). A light-weight bit commitment protocol based on unpredictable channel noise. Theoretical Computer Science. 755. 29–37.
5.
Tzeng, Wen-Guey, et al.. (2017). A light-weight oblivious transfer protocol based on channel noise. 2(1). 28–38.
6.
Tzeng, Wen-Guey, et al.. (2017). A secret key establishment protocol for wireless networks using noisy channels. Journal of Computer Security. 25(2). 139–151. 1 indexed citations
7.
Lin, Hsiao-Ying, et al.. (2015). An Effective Integrity Check Scheme for Secure Erasure Code-Based Storage Systems. IEEE Transactions on Reliability. 64(3). 840–851. 26 indexed citations
8.
Chen, Kefei, Qi Xie, Weidong Qiu, Ninghui Li, & Wen-Guey Tzeng. (2013). Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security. 9 indexed citations
9.
Tzeng, Wen-Guey, et al.. (2012). Efficient and Provably-Secure Group Key Management Scheme Using Key Derivation. 295–302. 17 indexed citations
10.
Lin, Hsiao-Ying & Wen-Guey Tzeng. (2010). A Secure Decentralized Erasure Code for Distributed Networked Storage. IEEE Transactions on Parallel and Distributed Systems. 21(11). 1586–1594. 43 indexed citations
11.
Kløve, Torleiv, et al.. (2010). Permutation Arrays Under the Chebyshev Distance. IEEE Transactions on Information Theory. 56(6). 2611–2617. 85 indexed citations
12.
Tzeng, Wen-Guey, et al.. (2005). On the Jensen–Shannon Divergence and Variational Distance. IEEE Transactions on Information Theory. 51(9). 3333–3336. 13 indexed citations
13.
Tzeng, Wen-Guey, et al.. (2005). A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. Designs Codes and Cryptography. 35(1). 47–61. 7 indexed citations
14.
Tsai, Wen‐Hsiang, et al.. (2003). A Framework of High-Confidence e-Healthcare Information System †. 493–500. 3 indexed citations
15.
Tzeng, Wen-Guey. (2002). A time-bound cryptographic key assignment scheme for access control in a hierarchy. IEEE Transactions on Knowledge and Data Engineering. 14(1). 182–188. 120 indexed citations
16.
Tzeng, Wen-Guey, et al.. (2001). Practical and efficient electronic voting schemes. Journal of information science and engineering. 17(6). 865–877. 1 indexed citations
17.
Tzeng, Wen-Guey, et al.. (1999). A new graph invariant for graph isomorphism: Probability propagation matrix. Journal of information science and engineering. 15(3). 337–352. 2 indexed citations
18.
Tzeng, Wen-Guey, et al.. (1997). On-line algorithms for the dominating set problem. Information Processing Letters. 61(1). 11–14. 4 indexed citations
19.
Tzeng, Wen-Guey, et al.. (1994). A Two-Key-Lock-Pair Access Control Method Using Prime Factorization and Time Stamp. IEICE Transactions on Information and Systems. 77(9). 1042–1046. 9 indexed citations
20.
Tzeng, Wen-Guey. (1992). A Polynomial-Time Algorithm for the Equivalence of Probabilistic Automata. SIAM Journal on Computing. 21(2). 216–227. 54 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026