Yangyang Li

1.4k total citations
47 papers, 838 citations indexed

About

Yangyang Li is a scholar working on Artificial Intelligence, Computer Networks and Communications and Information Systems. According to data from OpenAlex, Yangyang Li has authored 47 papers receiving a total of 838 indexed citations (citations by other indexed papers that have themselves been cited), including 31 papers in Artificial Intelligence, 19 papers in Computer Networks and Communications and 13 papers in Information Systems. Recurrent topics in Yangyang Li's work include Network Security and Intrusion Detection (7 papers), Topic Modeling (6 papers) and IoT and Edge/Fog Computing (6 papers). Yangyang Li is often cited by papers focused on Network Security and Intrusion Detection (7 papers), Topic Modeling (6 papers) and IoT and Edge/Fog Computing (6 papers). Yangyang Li collaborates with scholars based in China, United States and Australia. Yangyang Li's co-authors include Zhiping Cai, Fang Liu, Wencheng Sun, Guoyan Wang, Anfeng Liu, Weiwei Fang, Qingjun Xiao, Qiang Liu, Heng Zhang and Jiao Zhang and has published in prestigious journals such as IEEE Communications Magazine, IEEE Transactions on Knowledge and Data Engineering and IEEE Internet of Things Journal.

In The Last Decade

Yangyang Li

42 papers receiving 809 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Yangyang Li China 15 395 335 245 107 103 47 838
Xiaochun Yin China 12 411 1.0× 271 0.8× 214 0.9× 121 1.1× 123 1.2× 29 718
Ali Miri Canada 20 448 1.1× 570 1.7× 540 2.2× 101 0.9× 149 1.4× 113 1.2k
Yuqing Li China 12 339 0.9× 300 0.9× 235 1.0× 122 1.1× 94 0.9× 46 759
Chandra Thapa Australia 11 241 0.6× 622 1.9× 177 0.7× 126 1.2× 84 0.8× 25 942
Doo-Soon Park South Korea 15 238 0.6× 186 0.6× 195 0.8× 90 0.8× 98 1.0× 70 656
Pinki Roy India 17 114 0.3× 412 1.2× 190 0.8× 32 0.3× 115 1.1× 43 756
Cong Wang China 18 227 0.6× 420 1.3× 180 0.7× 163 1.5× 159 1.5× 99 894
K. Umamaheswari India 12 426 1.1× 233 0.7× 324 1.3× 125 1.2× 59 0.6× 63 785
Johan Lilius Finland 17 316 0.8× 277 0.8× 216 0.9× 76 0.7× 289 2.8× 110 1.1k
Jimmy Singla India 14 103 0.3× 274 0.8× 227 0.9× 45 0.4× 84 0.8× 63 809

Countries citing papers authored by Yangyang Li

Since Specialization
Citations

This map shows the geographic impact of Yangyang Li's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Yangyang Li with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Yangyang Li more than expected).

Fields of papers citing papers by Yangyang Li

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Yangyang Li. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Yangyang Li. The network helps show where Yangyang Li may publish in the future.

Co-authorship network of co-authors of Yangyang Li

This figure shows the co-authorship network connecting the top 25 collaborators of Yangyang Li. A scholar is included among the top collaborators of Yangyang Li based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Yangyang Li. Yangyang Li is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Li, Yangyang, et al.. (2024). Mobile application-based phonetic training facilitates Chinese-English learners’ learning of L2. Learning and Instruction. 93. 101967–101967. 2 indexed citations
2.
Gao, Yuan, et al.. (2024). Graph Anomaly Detection with Bi-level Optimization. 4383–4394. 4 indexed citations
3.
Li, Yangyang, et al.. (2024). GNNRI: detecting anomalous social network users through heterogeneous information networks and user relevance exploration. International Journal of Machine Learning and Cybernetics. 16(4). 2297–2314.
4.
Li, Yangyang, et al.. (2024). Data-driven Analysis and Evaluation of Pedagogical Innovation. 527–531.
5.
Zhang, Bowen, Yangyang Li, Baoquan Zhang, et al.. (2023). Knowledge-enhanced Prompt-tuning for Stance Detection. ACM Transactions on Asian and Low-Resource Language Information Processing. 22(6). 1–20. 15 indexed citations
6.
Yang, Renyu, et al.. (2023). FedACK: Federated Adversarial Contrastive Knowledge Distillation for Cross-Lingual and Cross-Model Social Bot Detection. arXiv (Cornell University). 1314–1323. 17 indexed citations
7.
Gong, Jibing, Jinye Zhao, Chenlong Wang, et al.. (2022). MORE: Toward Improving Author Name Disambiguation in Academic Knowledge Graphs. International Journal of Machine Learning and Cybernetics. 15(1). 37–50. 5 indexed citations
8.
Yang, Renyu, Yangyang Li, Zhiqin Yang, et al.. (2022). RoSGAS : Adaptive Social Bot Detection with Reinforced Self-supervised GNN Architecture Search. ACM Transactions on the Web. 17(3). 1–31. 35 indexed citations
9.
Zhang, Bowen, et al.. (2022). Multi-Modal Sarcasm Detection with Prompt-Tuning. 1–8. 1 indexed citations
10.
Li, Yangyang, et al.. (2021). Relevance-Aware Anomalous Users Detection in Social Network via Graph Neural Network. 1–8. 15 indexed citations
11.
Li, Yangyang, et al.. (2021). SSL Stripping Technique (DHCP Snooping and ARP Spoofing Inspection). 187–193. 6 indexed citations
12.
Zhang, Jiao, et al.. (2020). Toward Energy-Aware Caching for Intelligent Connected Vehicles. IEEE Internet of Things Journal. 7(9). 8157–8166. 39 indexed citations
13.
Huang, Binbin, et al.. (2019). Security and Cost-Aware Computation Offloading via Deep Reinforcement Learning in Mobile Edge Computing. Wireless Communications and Mobile Computing. 2019. 1–20. 34 indexed citations
14.
Gao, Yangyang, et al.. (2019). Video computing across trust domains based on blockchain. 2783658. 1–9. 1 indexed citations
15.
Zhang, Heng, et al.. (2018). A Survey on Security-Aware Measurement in SDN. Security and Communication Networks. 2018. 1–14. 59 indexed citations
16.
Sun, Wencheng, et al.. (2018). Data Processing and Text Mining Technologies on Electronic Medical Records: A Review. Journal of Healthcare Engineering. 2018. 1–9. 191 indexed citations
17.
Sun, Wencheng, et al.. (2018). Security and Privacy in the Medical Internet of Things: A Review. Security and Communication Networks. 2018. 1–9. 184 indexed citations
18.
Zhang, Yuanyuan, et al.. (2018). Securing display path for security-sensitive applications on mobile devices. Cmc-computers Materials & Continua. 55(1). 17–17. 30 indexed citations
19.
Wang, Ke, et al.. (2018). Adopting data interpretation on mining fine-grained near-repeat patterns in crimes. Journal of Forensic and Legal Medicine. 55. 76–86. 2 indexed citations
20.
Liu, Xin, et al.. (2018). A heterogeneous information fusion deep reinforcement learning for intelligent frequency selection of HF communication. China Communications. 15(9). 73–84. 25 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026