Yizhi Ren

1.2k total citations
79 papers, 842 citations indexed

About

Yizhi Ren is a scholar working on Artificial Intelligence, Information Systems and Computer Networks and Communications. According to data from OpenAlex, Yizhi Ren has authored 79 papers receiving a total of 842 indexed citations (citations by other indexed papers that have themselves been cited), including 30 papers in Artificial Intelligence, 27 papers in Information Systems and 23 papers in Computer Networks and Communications. Recurrent topics in Yizhi Ren's work include Cryptography and Data Security (15 papers), Privacy-Preserving Technologies in Data (12 papers) and Access Control and Trust (11 papers). Yizhi Ren is often cited by papers focused on Cryptography and Data Security (15 papers), Privacy-Preserving Technologies in Data (12 papers) and Access Control and Trust (11 papers). Yizhi Ren collaborates with scholars based in China, United States and Japan. Yizhi Ren's co-authors include Kouichi Sakurai, Laiping Zhao, Kim‐Kwang Raymond Choo, Mingchu Li, Ting Wu, Cheng Guo, Yang Xiang, Benyun Shi, Xiaohong Huang and Guanhua Qiao and has published in prestigious journals such as SHILAP Revista de lepidopterología, PLoS ONE and Scientific Reports.

In The Last Decade

Yizhi Ren

74 papers receiving 810 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Yizhi Ren China 16 349 342 270 144 84 79 842
Mengjun Xie United States 15 372 1.1× 368 1.1× 247 0.9× 119 0.8× 83 1.0× 60 899
Euijong Lee South Korea 13 238 0.7× 307 0.9× 237 0.9× 70 0.5× 80 1.0× 48 655
Lianhai Wang China 18 427 1.2× 465 1.4× 394 1.5× 90 0.6× 117 1.4× 107 1.1k
Vladimir Vlassov Sweden 15 591 1.7× 406 1.2× 366 1.4× 81 0.6× 181 2.2× 96 1.1k
Shishir Kumar India 14 213 0.6× 172 0.5× 275 1.0× 88 0.6× 145 1.7× 83 787
Jiaojiao Jiang Australia 14 193 0.6× 231 0.7× 260 1.0× 210 1.5× 81 1.0× 55 974
Jordi Herrera‐Joancomartí Spain 19 272 0.8× 425 1.2× 432 1.6× 184 1.3× 121 1.4× 61 913
Young-Duk Seo South Korea 11 221 0.6× 305 0.9× 211 0.8× 55 0.4× 76 0.9× 37 594
Teng-Sheng Moh United States 16 350 1.0× 302 0.9× 396 1.5× 68 0.5× 132 1.6× 95 905
Ken Barker Canada 18 444 1.3× 327 1.0× 502 1.9× 131 0.9× 43 0.5× 91 990

Countries citing papers authored by Yizhi Ren

Since Specialization
Citations

This map shows the geographic impact of Yizhi Ren's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Yizhi Ren with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Yizhi Ren more than expected).

Fields of papers citing papers by Yizhi Ren

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Yizhi Ren. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Yizhi Ren. The network helps show where Yizhi Ren may publish in the future.

Co-authorship network of co-authors of Yizhi Ren

This figure shows the co-authorship network connecting the top 25 collaborators of Yizhi Ren. A scholar is included among the top collaborators of Yizhi Ren based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Yizhi Ren. Yizhi Ren is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Ren, Yizhi, et al.. (2026). EPO: Diverse and Realistic Protein Ensemble Generation via Energy Preference Optimization. Proceedings of the AAAI Conference on Artificial Intelligence. 40(2). 1060–1068.
2.
Ren, Yizhi, et al.. (2024). Differential Cryptanalysis of Bloom Filters for Privacy-Preserving Record Linkage. IEEE Transactions on Information Forensics and Security. 19. 6665–6678.
3.
Wang, Qiuhua, et al.. (2024). IGXSS: XSS payload detection model based on inductive GCN. International Journal of Network Management. 34(6). 2 indexed citations
4.
Ren, Yizhi, et al.. (2024). Unstoppable Attack: Label-Only Model Inversion Via Conditional Diffusion Model. IEEE Transactions on Information Forensics and Security. 19. 3958–3973. 7 indexed citations
5.
Yao, Ye, et al.. (2024). High invisibility image steganography with wavelet transform and generative adversarial network. Expert Systems with Applications. 249. 123540–123540. 19 indexed citations
6.
Yao, Ye, et al.. (2024). Deep video inpainting detection and localization based on ConvNeXt dual-stream network. Expert Systems with Applications. 247. 123331–123331. 2 indexed citations
7.
Ren, Yizhi, et al.. (2023). EABERT: An Event Annotation Enhanced BERT Framework for Event Extraction. Mobile Networks and Applications. 28(5). 1818–1830. 2 indexed citations
8.
Ren, Yizhi, et al.. (2023). SNN-PPRL: A secure record matching scheme based on siamese neural network. Journal of Information Security and Applications. 76. 103529–103529. 3 indexed citations
9.
Wang, Qiuhua, Rui Zhang, Chuang‐Chuang Li, et al.. (2023). S-DeepTrust: A deep trust prediction method based on sentiment polarity perception. Information Sciences. 633. 104–121. 3 indexed citations
10.
Wang, Qiuhua, et al.. (2022). SDoS: Selfish Mining-Based Denial-of-Service Attack. IEEE Transactions on Information Forensics and Security. 17. 3335–3349. 11 indexed citations
11.
Tang, Xinyu, Cheng Guo, Yizhi Ren, Cong Wang, & Kim‐Kwang Raymond Choo. (2022). A Global Secure Ranked Multikeyword Search Based on the Multiowner Model for Cloud-Based Systems. IEEE Systems Journal. 16(2). 1717–1728. 8 indexed citations
12.
Jin, Xing, et al.. (2021). TruthTrust: Truth Inference-Based Trust Management Mechanism on a Crowdsourcing Platform. Sensors. 21(8). 2578–2578. 6 indexed citations
13.
Wang, Gaoli, et al.. (2020). Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things. IEEE Access. 8. 20920–20930. 5 indexed citations
14.
Wu, Guohua, et al.. (2020). Cyberbullying detection in social media text based on character‐level convolutional neural network with shortcuts. Concurrency and Computation Practice and Experience. 32(23). 50 indexed citations
15.
Ren, Yizhi, et al.. (2020). An eigenvalue-based immunization scheme for node attacks in networks with uncertainty. Science China Information Sciences. 63(3). 1 indexed citations
16.
Ren, Yizhi, Laiping Zhao, & Haiyang Hu. (2014). ARES: Aggressive Replication Enabled Scheduler for Hadoop Systems. 網際網路技術學刊. 15(3). 453–462. 2 indexed citations
17.
Li, Mingchu, et al.. (2012). A Finite Equivalence of Verifiable Multi-secret Sharing. International Journal of Communication Systems. 5(1). 1. 2 indexed citations
18.
Fan, Xinxin, Mingchu Li, Jianhua Ma, et al.. (2011). Behavior-based reputation management in P2P file-sharing networks. Journal of Computer and System Sciences. 78(6). 1737–1750. 22 indexed citations
19.
Ruan, Na, Yizhi Ren, Yoshiaki Hori, & Kouichi Sakurai. (2011). Performance Analysis of Key Management Schemes in Wireless Sensor Network Using Analytic Hierarchy Process. 1739–1744. 3 indexed citations
20.
Ren, Yizhi, Mingchu Li, & Kouichi Sakurai. (2009). FineTrust: a fine‐grained trust model for peer‐to‐peer networks. Security and Communication Networks. 4(1). 61–69. 16 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026