Yuan Ping

2.0k total citations
134 papers, 1.4k citations indexed

About

Yuan Ping is a scholar working on Artificial Intelligence, Control and Systems Engineering and Computer Networks and Communications. According to data from OpenAlex, Yuan Ping has authored 134 papers receiving a total of 1.4k indexed citations (citations by other indexed papers that have themselves been cited), including 72 papers in Artificial Intelligence, 32 papers in Control and Systems Engineering and 27 papers in Computer Networks and Communications. Recurrent topics in Yuan Ping's work include Cryptography and Data Security (16 papers), Network Security and Intrusion Detection (14 papers) and Anomaly Detection Techniques and Applications (13 papers). Yuan Ping is often cited by papers focused on Cryptography and Data Security (16 papers), Network Security and Intrusion Detection (14 papers) and Anomaly Detection Techniques and Applications (13 papers). Yuan Ping collaborates with scholars based in China, United States and Hong Kong. Yuan Ping's co-authors include Zhizhong Mao, Chun Guo, Zhizhong Mao, Yingjie Tian, Baocang Wang, Yajian Zhou, Mingxing Jia, Shoushan Luo, Dong Yue and Chunxia Dou and has published in prestigious journals such as PLoS ONE, Expert Systems with Applications and IEEE Access.

In The Last Decade

Yuan Ping

123 papers receiving 1.4k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Yuan Ping China 20 672 420 420 197 184 134 1.4k
Walmir M. Caminhas Brazil 24 1.0k 1.5× 301 0.7× 646 1.5× 178 0.9× 229 1.2× 82 2.0k
Jun Wu China 23 302 0.4× 277 0.7× 770 1.8× 142 0.7× 122 0.7× 151 1.5k
Chunming Wu China 24 683 1.0× 881 2.1× 143 0.3× 209 1.1× 105 0.6× 209 1.8k
Ali Reza Mehrabian Canada 16 542 0.8× 283 0.7× 455 1.1× 120 0.6× 99 0.5× 48 1.7k
R. S. Ramakrishna South Korea 11 477 0.7× 379 0.9× 149 0.4× 209 1.1× 53 0.3× 37 1.5k
Xudong Zhang China 20 541 0.8× 230 0.5× 85 0.2× 463 2.4× 102 0.6× 106 1.6k
Shuo Han United States 18 304 0.5× 297 0.7× 261 0.6× 63 0.3× 61 0.3× 74 1.1k
Isao Ono Japan 19 850 1.3× 203 0.5× 273 0.7× 86 0.4× 65 0.4× 103 1.7k
Yogesh Singh India 28 497 0.7× 503 1.2× 308 0.7× 118 0.6× 191 1.0× 188 2.5k

Countries citing papers authored by Yuan Ping

Since Specialization
Citations

This map shows the geographic impact of Yuan Ping's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Yuan Ping with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Yuan Ping more than expected).

Fields of papers citing papers by Yuan Ping

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Yuan Ping. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Yuan Ping. The network helps show where Yuan Ping may publish in the future.

Co-authorship network of co-authors of Yuan Ping

This figure shows the co-authorship network connecting the top 25 collaborators of Yuan Ping. A scholar is included among the top collaborators of Yuan Ping based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Yuan Ping. Yuan Ping is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
2.
Ping, Yuan, et al.. (2024). Extreme summer drought increased soil detachment capacity of biocrusts in subtropical China. Soil and Tillage Research. 247. 106372–106372. 7 indexed citations
3.
Luo, Lijuan, et al.. (2024). A Lightweight Intrusion Detection System Using a Finite Dirichlet Mixture Model With Extended Stochastic Variational Inference. IEEE Transactions on Network and Service Management. 21(4). 4701–4712. 2 indexed citations
4.
Guo, Chun, et al.. (2024). SNDMI: Spyware network traffic detection method based on inducement operations. Computers & Security. 140. 103806–103806. 3 indexed citations
5.
Liu, Lei, Yuan Ping, Mohammed Atiquzzaman, et al.. (2024). A Privacy-Preserving Federated Learning Framework With Lightweight and Fair in IoT. IEEE Transactions on Network and Service Management. 21(5). 5843–5858. 9 indexed citations
6.
Guo, Chun, et al.. (2023). SDSIOT: An SQL Injection Attack Detection and Stage Identification Method Based on Outbound Traffic. Electronics. 12(11). 2472–2472. 3 indexed citations
7.
Guo, Chun, et al.. (2023). Remote access trojan traffic early detection method based on Markov matrices and deep learning. Computers & Security. 137. 103628–103628. 1 indexed citations
8.
Guo, Chun, et al.. (2023). MCTVD: A malware classification method based on three-channel visualization and deep learning. Computers & Security. 126. 103084–103084. 21 indexed citations
9.
Ping, Yuan, et al.. (2023). Precision positioning control of wind tunnel centrosome. IET Control Theory and Applications. 18(5). 659–678.
10.
Luo, Lijuan, et al.. (2021). Extended variational inference for Dirichlet process mixture of Beta‐Liouville distributions for proportional data modeling. International Journal of Intelligent Systems. 37(7). 4277–4306. 1 indexed citations
11.
Guo, Chun, et al.. (2021). 2-SPIFF: a 2-stage packer identification method based on function call graph and file attributes. Applied Intelligence. 51(12). 9038–9053. 4 indexed citations
12.
Wang, Wei, et al.. (2020). A Safe Charging Algorithm Based on Multiple Mobile Chargers. Sensors. 20(10). 2937–2937. 6 indexed citations
13.
Ping, Yuan, et al.. (2020). Maximized Privacy-Preserving Outsourcing on Support Vector Clustering. Electronics. 9(1). 178–178. 6 indexed citations
14.
Wang, Zheng, et al.. (2019). Attack and Improvement on a Symmetric Fully Homomorphic Encryption Scheme. IEEE Access. 7. 68373–68379. 3 indexed citations
15.
Ping, Yuan, et al.. (2017). Water rights systems in the United States: principles, evolution and their implications for China. 27(6). 101–109. 3 indexed citations
16.
Mao, Zhizhong, et al.. (2013). Pruned Bagging Aggregated Hybrid Prediction Models for Forecasting the Steel Temperature in Ladle Furnace. steel research international. 85(3). 405–414. 20 indexed citations
17.
Ping, Yuan, Yajian Zhou, & Yixian Yang. (2012). A NOVEL SCHEME FOR ACCELERATING SUPPORT VECTOR CLUSTERING. Computing and Informatics / Computers and Artificial Intelligence. 31(3). 613. 9 indexed citations
18.
Ping, Yuan. (2012). An improved multi-objective particle swarm optimization algorithm and its application. Kongzhi yu juece. 5 indexed citations
19.
Ping, Yuan, et al.. (2012). ID Control and Management Solution of Digital Rights Management in Tri-networks Integration Environment. Jisuanji gongcheng. 38(11). 136–138. 1 indexed citations
20.
Zhang, Yangyang, et al.. (2004). Particle swarm optimization for base station placement in mobile communication. 1. 428–432. 30 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026