Yu Long

414 total citations
41 papers, 293 citations indexed

About

Yu Long is a scholar working on Artificial Intelligence, Computer Vision and Pattern Recognition and Computational Theory and Mathematics. According to data from OpenAlex, Yu Long has authored 41 papers receiving a total of 293 indexed citations (citations by other indexed papers that have themselves been cited), including 34 papers in Artificial Intelligence, 16 papers in Computer Vision and Pattern Recognition and 14 papers in Computational Theory and Mathematics. Recurrent topics in Yu Long's work include Cryptography and Data Security (34 papers), Chaos-based Image/Signal Encryption (13 papers) and Complexity and Algorithms in Graphs (12 papers). Yu Long is often cited by papers focused on Cryptography and Data Security (34 papers), Chaos-based Image/Signal Encryption (13 papers) and Complexity and Algorithms in Graphs (12 papers). Yu Long collaborates with scholars based in China, Australia and Singapore. Yu Long's co-authors include Kefei Chen, Xuan Hong, Zheng Gong, Liangliang Wang, Shengli Liu, Xianping Mao, Xuehu Yan, Jianhong Chen, Huige Wang and Yuliang Lu and has published in prestigious journals such as Sensors, Information Sciences and Applied Mathematics and Computation.

In The Last Decade

Yu Long

33 papers receiving 268 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Yu Long China 9 258 116 106 95 45 41 293
Yinxia Sun China 11 280 1.1× 144 1.2× 90 0.8× 60 0.6× 37 0.8× 30 324
Nikola Samardzic United States 6 251 1.0× 102 0.9× 109 1.0× 39 0.4× 65 1.4× 9 374
Noel McCullagh Ireland 2 245 0.9× 107 0.9× 115 1.1× 80 0.8× 38 0.8× 2 271
Axel Feldmann United States 4 225 0.9× 108 0.9× 80 0.8× 34 0.4× 43 1.0× 7 313
Damien Vergnaud France 8 243 0.9× 124 1.1× 65 0.6× 46 0.5× 31 0.7× 26 280
Pooya Farshim United Kingdom 3 229 0.9× 90 0.8× 80 0.8× 79 0.8× 25 0.6× 7 246
Hongzhen Du China 10 268 1.0× 143 1.2× 122 1.2× 94 1.0× 56 1.2× 17 308
Xianping Mao China 5 227 0.9× 144 1.2× 96 0.9× 40 0.4× 26 0.6× 14 292
Jack Doerner United States 7 341 1.3× 122 1.1× 63 0.6× 62 0.7× 21 0.5× 9 377

Countries citing papers authored by Yu Long

Since Specialization
Citations

This map shows the geographic impact of Yu Long's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Yu Long with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Yu Long more than expected).

Fields of papers citing papers by Yu Long

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Yu Long. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Yu Long. The network helps show where Yu Long may publish in the future.

Co-authorship network of co-authors of Yu Long

This figure shows the co-authorship network connecting the top 25 collaborators of Yu Long. A scholar is included among the top collaborators of Yu Long based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Yu Long. Yu Long is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Yang, Qing, Jie Xu, Yubin Ren, et al.. (2025). Key mechanical properties of hydrate bearing sediment: state of the art and prospects. Geoenergy Science and Engineering. 255. 214079–214079.
2.
Long, Yu, et al.. (2022). Generative Text Secret Sharing with Topic-Controlled Shadows. Security and Communication Networks. 2022. 1–14.
3.
Long, Yu, et al.. (2020). Validating GCSE in the scheduling of high-level synthesis. 1–6. 1 indexed citations
4.
Wang, Liangliang, et al.. (2016). An efficient pairing-free certificateless signature scheme for resource-limited systems. Science China Information Sciences. 60(11). 22 indexed citations
5.
Wang, Liangliang, Kefei Chen, Yu Long, & Huige Wang. (2016). Cryptanalysis of a certificateless aggregate signature scheme. Security and Communication Networks. 9(11). 1353–1358. 4 indexed citations
6.
Wang, Liangliang, et al.. (2015). A Modified Efficient Certificateless Signature Scheme without Bilinear Pairings. 82–85. 19 indexed citations
7.
Mao, Xianping, Kefei Chen, Liangliang Wang, & Yu Long. (2014). On the Security of a Lattice-Based Multi-party Concurrent Signature Scheme. 181. 91–95. 1 indexed citations
8.
Mao, Xianping, Kefei Chen, Yu Long, & Liangliang Wang. (2014). Attribute-based signature on lattices. Journal of Shanghai Jiaotong University (Science). 19(4). 406–411. 9 indexed citations
9.
Chen, Jianhong, et al.. (2012). Identity-Based Key-Insulated Signcryption. Informatica. 23(1). 27–45. 10 indexed citations
10.
Chen, Jianhong, Yu Long, Kefei Chen, & Yongtao Wang. (2011). Identity-based key-insulated proxy signature without random oracles. Journal of Shanghai Jiaotong University (Science). 16(5). 557–566. 1 indexed citations
11.
Long, Yu, Zheng Gong, Kefei Chen, & Shengli Liu. (2009). Provably Secure Identity-based Threshold Key Escrow from Pairing. International journal of network security. 8. 227–234.
12.
Long, Yu & Kefei Chen. (2009). Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism. Information Sciences. 180(7). 1167–1181. 7 indexed citations
13.
Long, Yu, Xiangxue Li, Kefei Chen, & Xuan Hong. (2009). Distributed certificateless key encapsulation mechanism secure against the adaptive adversary. Journal of Shanghai Jiaotong University (Science). 14(1). 102–106.
14.
Gong, Zheng, Yu Long, Xuan Hong, & Kefei Chen. (2008). Practical Certificateless Aggregate Signatures From Bilinear Maps. Journal of information science and engineering. 26(6). 2093–2106. 2 indexed citations
15.
Lai, Xuejia, et al.. (2008). On constructing certificateless proxy signature from certificateless signature. Journal of Shanghai Jiaotong University (Science). 13(6). 692–694. 1 indexed citations
16.
Hong, Xuan, Kefei Chen, & Yu Long. (2008). Universally composable proactive threshold RSA signature. Journal of Shanghai Jiaotong University (Science). 13(6). 659–663.
17.
Long, Yu & Kefei Chen. (2007). Certificateless threshold cryptosystem secure against chosen-ciphertext attack. Information Sciences. 177(24). 5620–5637. 15 indexed citations
18.
Long, Yu, Kefei Chen, & Shengli Liu. (2007). ID-based threshold decryption secure against adaptive chosen-ciphertext attack. Computers & Electrical Engineering. 33(3). 166–176. 6 indexed citations
19.
Long, Yu & Kefei Chen. (2006). Construction of Dynamic Threshold Decryption Scheme from Pairing. International journal of network security. 2. 111–113. 2 indexed citations
20.
Long, Yu, et al.. (2006). ID-Based Threshold Decryption Secure against Chosen Plaintext Attack. Journal of Shanghai Jiaotong University (Science). 11(2). 127–133. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026