Ya‐Fen Chang

1.1k total citations
62 papers, 884 citations indexed

About

Ya‐Fen Chang is a scholar working on Computer Networks and Communications, Information Systems and Artificial Intelligence. According to data from OpenAlex, Ya‐Fen Chang has authored 62 papers receiving a total of 884 indexed citations (citations by other indexed papers that have themselves been cited), including 39 papers in Computer Networks and Communications, 38 papers in Information Systems and 32 papers in Artificial Intelligence. Recurrent topics in Ya‐Fen Chang's work include Advanced Authentication Protocols Security (37 papers), Cryptography and Data Security (26 papers) and User Authentication and Security Systems (26 papers). Ya‐Fen Chang is often cited by papers focused on Advanced Authentication Protocols Security (37 papers), Cryptography and Data Security (26 papers) and User Authentication and Security Systems (26 papers). Ya‐Fen Chang collaborates with scholars based in Taiwan and Japan. Ya‐Fen Chang's co-authors include Chin‐Chen Chang, Wei‐Liang Tai, Hui‐Feng Huang, Chwei‐Shyong Tsai, Yen‐Ping Chu, Hsien-Chu Wu, Chun‐Hung Liu, Weihan Li, Tzu-Chuen Lu and Jung-San Lee and has published in prestigious journals such as Sensors, Pattern Recognition and Sustainability.

In The Last Decade

Ya‐Fen Chang

59 papers receiving 805 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Ya‐Fen Chang Taiwan 16 535 507 370 269 129 62 884
Sourav Mukhopadhyay India 19 894 1.7× 820 1.6× 398 1.1× 145 0.5× 247 1.9× 59 1.1k
Shanqing Guo China 15 302 0.6× 234 0.5× 316 0.9× 144 0.5× 223 1.7× 101 741
Khuzaima Daudjee Canada 13 554 1.0× 399 0.8× 258 0.7× 353 1.3× 80 0.6× 56 810
Diego F. Aranha Brazil 13 319 0.6× 272 0.5× 508 1.4× 103 0.4× 85 0.7× 66 736
Tian‐Fu Lee Taiwan 17 605 1.1× 587 1.2× 295 0.8× 108 0.4× 155 1.2× 45 755
Serge Vaudenay Switzerland 18 296 0.6× 293 0.6× 600 1.6× 237 0.9× 70 0.5× 97 864
Glenn Durfee United States 10 342 0.6× 343 0.7× 518 1.4× 137 0.5× 78 0.6× 13 840
William E. Burr United States 12 197 0.4× 189 0.4× 372 1.0× 244 0.9× 107 0.8× 32 692
Yair Frankel United States 12 251 0.5× 360 0.7× 472 1.3× 256 1.0× 234 1.8× 24 813
Ricardo Dahab Brazil 13 419 0.8× 238 0.5× 377 1.0× 101 0.4× 107 0.8× 58 707

Countries citing papers authored by Ya‐Fen Chang

Since Specialization
Citations

This map shows the geographic impact of Ya‐Fen Chang's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Ya‐Fen Chang with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Ya‐Fen Chang more than expected).

Fields of papers citing papers by Ya‐Fen Chang

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Ya‐Fen Chang. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Ya‐Fen Chang. The network helps show where Ya‐Fen Chang may publish in the future.

Co-authorship network of co-authors of Ya‐Fen Chang

This figure shows the co-authorship network connecting the top 25 collaborators of Ya‐Fen Chang. A scholar is included among the top collaborators of Ya‐Fen Chang based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Ya‐Fen Chang. Ya‐Fen Chang is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Lin, Chia‐Chen, et al.. (2023). Fragile Watermarking for Tamper Localization and Self-Recovery Based on AMBTC and VQ. Electronics. 12(2). 415–415. 20 indexed citations
2.
Chang, Ya‐Fen, et al.. (2022). Privacy-Preserved Image Protection Supporting Different Access Rights. Applied Sciences. 12(23). 12335–12335. 1 indexed citations
3.
Tai, Wei‐Liang, Ya‐Fen Chang, & Wen‐Hsin Huang. (2020). Security Analyses of a Data Collaboration Scheme with Hierarchical Attribute-based Encryption in Cloud Computing.. Int. J. Netw. Secur.. 22. 212–217. 5 indexed citations
4.
Tai, Wei‐Liang, et al.. (2019). Security Analysis of a Three-factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things Environments.. Int. J. Netw. Secur.. 21. 1014–1020. 2 indexed citations
5.
Tai, Wei‐Liang, et al.. (2018). An Anonymity, Availability and Security-Ensured Authentication Model of the IoT Control System for Reliable and Anonymous eHealth Services. Journal of Medical and Biological Engineering. 39(4). 443–455. 5 indexed citations
6.
Lin, Chia‐Chen, et al.. (2018). A DCT-based Robust Watermarking Scheme Surviving JPEG Compression with Voting Strategy.. 3. 259–277. 1 indexed citations
7.
Tai, Wei‐Liang & Ya‐Fen Chang. (2017). Comments on a Secure Authentication Scheme for IoT and Cloud Servers.. Int. J. Netw. Secur.. 19. 648–651. 5 indexed citations
8.
Chang, Ya‐Fen, et al.. (2013). A Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care. Journal of Medical Systems. 37(2). 9902–9902. 73 indexed citations
9.
Chang, Ya‐Fen, et al.. (2013). A Robust and Novel Dynamic-ID-based Authentication Scheme for Care Team Collaboration with Smart Cards. Journal of Medical Systems. 37(2). 9909–9909. 2 indexed citations
10.
Chang, Ya‐Fen, et al.. (2013). An intelligent context-aware communication system for one single autonomic region to realize smart living. Information Fusion. 21. 57–67. 1 indexed citations
12.
Huang, Hui‐Feng, Ya‐Fen Chang, & Chun‐Hung Liu. (2010). Enhancement of Two-Factor User Authentication in Wireless Sensor Networks. 27–30. 61 indexed citations
13.
Chang, Ya‐Fen. (2010). REAL UNDERSTANDING OF LPN-PROBLEM-BASED LIGHTWEIGHT AUTHENTICATION PROTOCOLS. Information Technology And Control. 39(3). 2 indexed citations
14.
Lee, Cheng‐Chi & Ya‐Fen Chang. (2008). ON SECURITY OF A PRACTICAL THREE-PARTY KEY EXCHANGE PROTOCOL WITH ROUND EFfiCIENCY. Information Technology And Control. 37(4). 9 indexed citations
15.
Chang, Ya‐Fen, et al.. (2008). Comments on the Security Flaw of Hwang et al.'s Blind Signature Scheme. International journal of network security. 6(1). 185–189. 3 indexed citations
16.
Chang, Ya‐Fen & Chin‐Chen Chang. (2007). Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy. Fundamenta Informaticae. 76(1-2). 13–23. 3 indexed citations
17.
Chang, Ya‐Fen, Chin‐Chen Chang, & Pei-Yu Lin. (2007). A Concealed t-out-of-n Signer Ambiguous Signature Scheme with Variety of Keys. Informatica. 18(4). 535–546. 2 indexed citations
18.
Chang, Ya‐Fen & Chin‐Chen Chang. (2005). An efficient authentication protocol for mobile satellite communication systems. ACM SIGOPS Operating Systems Review. 39(1). 70–84. 54 indexed citations
19.
Chang, Ya‐Fen, Chin‐Chen Chang, & Yilong Liu. (2004). Password authentication without the server public key. IEICE Transactions on Communications. 87(10). 3088–3091. 18 indexed citations
20.
Chang, Chin‐Chen & Ya‐Fen Chang. (2004). Yet another attack on a qr-based password authentication system. 2. 170–173. 3 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026