Yang Lu

1.5k total citations
76 papers, 1.1k citations indexed

About

Yang Lu is a scholar working on Artificial Intelligence, Computational Theory and Mathematics and Information Systems. According to data from OpenAlex, Yang Lu has authored 76 papers receiving a total of 1.1k indexed citations (citations by other indexed papers that have themselves been cited), including 68 papers in Artificial Intelligence, 33 papers in Computational Theory and Mathematics and 22 papers in Information Systems. Recurrent topics in Yang Lu's work include Cryptography and Data Security (66 papers), Complexity and Algorithms in Graphs (33 papers) and Cryptographic Implementations and Security (22 papers). Yang Lu is often cited by papers focused on Cryptography and Data Security (66 papers), Complexity and Algorithms in Graphs (33 papers) and Cryptographic Implementations and Security (22 papers). Yang Lu collaborates with scholars based in China, Japan and United States. Yang Lu's co-authors include Jiguo Li, Yichen Zhang, Gang Wang, Yichen Zhang, Fen Wang, Yuyan Guo, Jinguang Han, Ruyuan Zhang, Qihong Yu and Jian Shen and has published in prestigious journals such as Journal of Geophysical Research Atmospheres, Soil Biology and Biochemistry and IEEE Access.

In The Last Decade

Yang Lu

75 papers receiving 1.0k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Yang Lu China 18 930 508 222 219 157 76 1.1k
Paulo S. L. M. Barreto Brazil 17 560 0.6× 339 0.7× 61 0.3× 329 1.5× 271 1.7× 51 962
Susana Ladra Spain 12 251 0.3× 48 0.1× 27 0.1× 131 0.6× 120 0.8× 48 485
Kyoohyung Han South Korea 11 290 0.3× 79 0.2× 62 0.3× 103 0.5× 75 0.5× 22 548
Francisco Rodríguez‐Henríquez Mexico 17 641 0.7× 449 0.9× 83 0.4× 70 0.3× 186 1.2× 60 762
Jukka Teuhola Finland 10 167 0.2× 33 0.1× 51 0.2× 117 0.5× 117 0.7× 34 348
Lambert Meertens Netherlands 12 394 0.4× 78 0.2× 243 1.1× 156 0.7× 22 0.1× 48 612
Xu Yang China 10 112 0.1× 161 0.3× 17 0.1× 200 0.9× 26 0.2× 72 370

Countries citing papers authored by Yang Lu

Since Specialization
Citations

This map shows the geographic impact of Yang Lu's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Yang Lu with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Yang Lu more than expected).

Fields of papers citing papers by Yang Lu

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Yang Lu. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Yang Lu. The network helps show where Yang Lu may publish in the future.

Co-authorship network of co-authors of Yang Lu

This figure shows the co-authorship network connecting the top 25 collaborators of Yang Lu. A scholar is included among the top collaborators of Yang Lu based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Yang Lu. Yang Lu is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Li, Jiguo, et al.. (2025). Revocable Registered Attribute-Based Encryption With User Deregistration. IEEE Internet of Things Journal. 12(15). 31526–31535. 2 indexed citations
2.
Lu, Yang, et al.. (2025). User-Friendly and Expressive Forward-Secure Attribute-Based Signature With Server-Aided Signature and Outsourced Verification. IEEE Transactions on Knowledge and Data Engineering. 37(6). 3794–3809.
3.
Li, Jiguo, et al.. (2025). Efficient Registered Attribute Based Access Control With Same Sub-Policies in Mobile Cloud Computing. IEEE Transactions on Mobile Computing. 24(9). 8441–8453. 3 indexed citations
4.
Li, Jiguo, Ji Lin, Yichen Zhang, Yang Lu, & Jianting Ning. (2024). Response-Hiding and Volume-Hiding Verifiable Searchable Encryption With Conjunctive Keyword Search. IEEE Transactions on Computers. 74(2). 455–467. 7 indexed citations
5.
Sun, Yinxia, et al.. (2024). Revocable identity-based designated verifier proxy re-signature with signature evolution. Computer Standards & Interfaces. 92. 103894–103894. 2 indexed citations
6.
Sun, Yinxia, et al.. (2024). Revocable certificateless proxy re-signature with signature evolution for EHR sharing systems. Journal of Information Security and Applications. 87. 103892–103892. 2 indexed citations
7.
Ding, Jing, et al.. (2024). Efficient Revocable Attribute-Based Keyword Search Against Keyword Guessing Attack. 155–162. 1 indexed citations
8.
Lu, Yang, et al.. (2022). Numerical simulation of fine particle liquid–solid flow in porous media based on LBM‐IBM‐DEM. The Canadian Journal of Chemical Engineering. 101(6). 3576–3591. 9 indexed citations
9.
Li, Jiguo, et al.. (2020). Constant Ciphertext Size Multi-Authority Attribute-based Scheme without Key Escrow. 網際網路技術學刊. 21(6). 1647–1657. 3 indexed citations
10.
Lu, Yang, et al.. (2019). A certificate-based AKA protocol secure against public key replacement attacks.. The International Arab Journal of Information Technology. 16. 754–765. 4 indexed citations
11.
Lu, Yang & Jiguo Li. (2019). Constructing certificateless encryption with keyword search against outside and inside keyword guessing attacks. China Communications. 16(7). 156–173. 7 indexed citations
12.
Guo, Yuyan, Jiguo Li, Yang Lu, Yichen Zhang, & Futai Zhang. (2017). Provably secure certificate-based encryption with leakage resilience. Theoretical Computer Science. 711. 1–10. 28 indexed citations
13.
Lu, Yang, et al.. (2017). An Efficient Certificate-Based Authenticated Key Agreement Protocol without Bilinear Pairing. Information Technology And Control. 46(3). 345–359. 1 indexed citations
14.
Lu, Yang & Jiguo Li. (2016). Provably secure certificateless proxy signature scheme in the standard model. Theoretical Computer Science. 639. 42–59. 16 indexed citations
15.
Lu, Yang & Jiguo Li. (2014). Efficient Certificate-Based Encryption Scheme Secure Against Key Replacement Attacks in the Standard Model *. Journal of information science and engineering. 30. 1553–1568. 10 indexed citations
16.
Lu, Yang. (2013). Community Characteristics of Alpine Shrub Salix oritrepha. Zhiwu yanjiu. 2 indexed citations
17.
Lu, Yang & Jiguo Li. (2012). CONSTRUCTING CERTIFICATE-BASED ENCRYPTION SECURE AGAINST KEY REPLACEMENT ATTACKS. 3(1). 195–200. 4 indexed citations
18.
Lu, Yang & Jiguo Li. (2012). Generic Construction of Forward-Secure Identity-Based Encryption. Journal of Computers. 7(12). 2 indexed citations
19.
Lu, Yang. (2011). Analysis and improvement of signature-masked authentication scheme. Jisuanji yingyong yanjiu. 1 indexed citations
20.
Lu, Yang. (2004). APPLICATION OF MACHINE VISION IN AUTOSORT SYSTEM OF SHEET. Mechanical Engineering & Automation. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026