Yucheng Chen

518 total citations
13 papers, 345 citations indexed

About

Yucheng Chen is a scholar working on Computer Vision and Pattern Recognition, Artificial Intelligence and Computer Networks and Communications. According to data from OpenAlex, Yucheng Chen has authored 13 papers receiving a total of 345 indexed citations (citations by other indexed papers that have themselves been cited), including 9 papers in Computer Vision and Pattern Recognition, 7 papers in Artificial Intelligence and 4 papers in Computer Networks and Communications. Recurrent topics in Yucheng Chen's work include Chaos-based Image/Signal Encryption (6 papers), Cryptographic Implementations and Security (3 papers) and Distributed Control Multi-Agent Systems (3 papers). Yucheng Chen is often cited by papers focused on Chaos-based Image/Signal Encryption (6 papers), Cryptographic Implementations and Security (3 papers) and Distributed Control Multi-Agent Systems (3 papers). Yucheng Chen collaborates with scholars based in China, Taiwan and Denmark. Yucheng Chen's co-authors include Hao Yin, Sizhe Chen, Anbo Meng, Majid Roohi, Chongqi Zhang, Chunming Tang, Yin-Tien Wang, Huiqing Huang, Wei‐Chia Su and Ching‐Cherng Sun and has published in prestigious journals such as Journal of the Franklin Institute, Knowledge-Based Systems and Nonlinear Dynamics.

In The Last Decade

Yucheng Chen

13 papers receiving 337 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Yucheng Chen China 7 138 85 85 72 65 13 345
Marjan Abdechiri Iran 10 155 1.1× 55 0.6× 52 0.6× 39 0.5× 17 0.3× 16 312
Seyed Mehdi Abedi Pahnehkolaei Iran 13 179 1.3× 18 0.2× 145 1.7× 188 2.6× 100 1.5× 19 468
Ayan Acharya United States 9 181 1.3× 87 1.0× 52 0.6× 13 0.2× 30 0.5× 20 359
Wenxin Yu China 12 47 0.3× 84 1.0× 122 1.4× 69 1.0× 148 2.3× 46 377
Gangquan Si China 12 87 0.6× 29 0.3× 99 1.2× 201 2.8× 179 2.8× 47 421
Guo Huang China 9 69 0.5× 86 1.0× 41 0.5× 65 0.9× 21 0.3× 27 281
Jason Sheng‐Hong Tsai Taiwan 10 137 1.0× 22 0.3× 40 0.5× 79 1.1× 25 0.4× 39 349
Raffaele Mascella Italy 8 206 1.5× 36 0.4× 42 0.5× 32 0.4× 10 0.2× 18 303
Gyan Ranjan United States 10 83 0.6× 17 0.2× 44 0.5× 140 1.9× 74 1.1× 30 372

Countries citing papers authored by Yucheng Chen

Since Specialization
Citations

This map shows the geographic impact of Yucheng Chen's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Yucheng Chen with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Yucheng Chen more than expected).

Fields of papers citing papers by Yucheng Chen

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Yucheng Chen. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Yucheng Chen. The network helps show where Yucheng Chen may publish in the future.

Co-authorship network of co-authors of Yucheng Chen

This figure shows the co-authorship network connecting the top 25 collaborators of Yucheng Chen. A scholar is included among the top collaborators of Yucheng Chen based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Yucheng Chen. Yucheng Chen is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

13 of 13 papers shown
1.
Chen, Yucheng, et al.. (2024). A selective chaos-driven encryption technique for protecting medical images. Physica Scripta. 100(1). 0152a3–0152a3. 4 indexed citations
2.
Chen, Yucheng, et al.. (2024). A novel adaptive image privacy protection method based on Latin square. Nonlinear Dynamics. 112(12). 10485–10508. 11 indexed citations
3.
Tang, Chunming, et al.. (2023). Round-Efficient Secure Inference Based on Masked Secret Sharing for Quantized Neural Network. Entropy. 25(2). 389–389. 1 indexed citations
4.
Tang, Chunming, et al.. (2022). Efficient Privacy-Preserving K-Means Clustering from Secret-Sharing-Based Secure Three-Party Computation. Entropy. 24(8). 1145–1145. 6 indexed citations
5.
Chen, Yucheng, Chunming Tang, & Majid Roohi. (2021). Design of a model-free adaptive sliding mode control to synchronize chaotic fractional-order systems with input saturation: An application in secure communications. Journal of the Franklin Institute. 358(16). 8109–8137. 36 indexed citations
6.
Roohi, Majid, Chongqi Zhang, & Yucheng Chen. (2020). Adaptive model-free synchronization of different fractional-order neural networks with an application in cryptography. Nonlinear Dynamics. 100(4). 3979–4001. 71 indexed citations
7.
Chen, Yucheng, et al.. (2020). A Novel Image Encryption Scheme Based on PWLCM and Standard Map. Complexity. 2020. 1–23. 11 indexed citations
8.
Ye, Ruisong, et al.. (2018). A Color Image Encryption Scheme Using Inverse Fractal Interpolation Function. 15. 1883–1887. 1 indexed citations
9.
Meng, Anbo, Yucheng Chen, Hao Yin, & Sizhe Chen. (2014). Crisscross optimization algorithm and its application. Knowledge-Based Systems. 67. 218–229. 186 indexed citations
10.
Chen, Yucheng & Yin-Tien Wang. (2010). A generalized framework of dynamic role assignment for robot formation control. International Journal of Control Automation and Systems. 8(6). 1288–1295. 2 indexed citations
11.
Chen, Yucheng & Yin-Tien Wang. (2009). A method for obstacle avoidance in role reassignment of robot formation control. WSEAS TRANSACTIONS on SYSTEMS archive. 8(8). 1031–1040. 2 indexed citations
12.
Chen, Yucheng & Yin-Tien Wang. (2007). Dynamic role assignment algorithm for robot formation control. 4. 1–6. 5 indexed citations
13.
Su, Wei‐Chia, et al.. (2004). Duplication of phase key for random-phase-encrypted volume holograms. Applied Optics. 43(8). 1728–1728. 9 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026