Yuliang Lu

1.4k total citations
103 papers, 914 citations indexed

About

Yuliang Lu is a scholar working on Computer Vision and Pattern Recognition, Artificial Intelligence and Information Systems. According to data from OpenAlex, Yuliang Lu has authored 103 papers receiving a total of 914 indexed citations (citations by other indexed papers that have themselves been cited), including 61 papers in Computer Vision and Pattern Recognition, 46 papers in Artificial Intelligence and 20 papers in Information Systems. Recurrent topics in Yuliang Lu's work include Advanced Steganography and Watermarking Techniques (57 papers), Chaos-based Image/Signal Encryption (43 papers) and Cryptography and Data Security (23 papers). Yuliang Lu is often cited by papers focused on Advanced Steganography and Watermarking Techniques (57 papers), Chaos-based Image/Signal Encryption (43 papers) and Cryptography and Data Security (23 papers). Yuliang Lu collaborates with scholars based in China, New Zealand and United States. Yuliang Lu's co-authors include Xuehu Yan, Lintao Liu, Longlong Li, Xianhua Song, Feng Liu, Jingju Liu, Ching‐Nung Yang, Xinpeng Zhang, Juntao Yao and Hui Zhao and has published in prestigious journals such as Expert Systems with Applications, IEEE Access and Sensors.

In The Last Decade

Yuliang Lu

90 papers receiving 880 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Yuliang Lu China 17 665 405 144 85 71 103 914
Claudia Feregrino-Uribe Mexico 14 282 0.4× 310 0.8× 186 1.3× 99 1.2× 94 1.3× 80 618
Yuwei Hu United States 10 463 0.7× 341 0.8× 59 0.4× 28 0.3× 213 3.0× 12 858
Tiezheng Ge China 11 654 1.0× 187 0.5× 66 0.5× 87 1.0× 36 0.5× 33 774
Kannan Srinathan India 12 247 0.4× 305 0.8× 181 1.3× 134 1.6× 213 3.0× 55 640
Der‐Chyuan Lou Taiwan 19 988 1.5× 260 0.6× 214 1.5× 85 1.0× 125 1.8× 92 1.2k
Junbo Zhao China 6 236 0.4× 305 0.8× 38 0.3× 31 0.4× 45 0.6× 18 514
Xuehu Yan China 21 1.3k 2.0× 608 1.5× 190 1.3× 137 1.6× 38 0.5× 135 1.5k
Dipankar Das India 8 347 0.5× 221 0.5× 97 0.7× 19 0.2× 176 2.5× 16 617
Laurent Amsaleg France 13 858 1.3× 249 0.6× 73 0.5× 179 2.1× 125 1.8× 40 1.1k
Jiacheng Yang China 9 213 0.3× 368 0.9× 87 0.6× 72 0.8× 183 2.6× 23 682

Countries citing papers authored by Yuliang Lu

Since Specialization
Citations

This map shows the geographic impact of Yuliang Lu's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Yuliang Lu with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Yuliang Lu more than expected).

Fields of papers citing papers by Yuliang Lu

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Yuliang Lu. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Yuliang Lu. The network helps show where Yuliang Lu may publish in the future.

Co-authorship network of co-authors of Yuliang Lu

This figure shows the co-authorship network connecting the top 25 collaborators of Yuliang Lu. A scholar is included among the top collaborators of Yuliang Lu based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Yuliang Lu. Yuliang Lu is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Liu, Jingju, et al.. (2025). Autonomous penetration testing using reinforcement learning: A review and perspectives. Expert Systems with Applications. 300. 130219–130219.
2.
Lu, Yuliang, et al.. (2025). Understanding the Security Risks of Websites Using Cloud Storage for Direct User File Uploads. IEEE Transactions on Information Forensics and Security. 20. 2677–2692. 1 indexed citations
3.
Liu, Jingju, et al.. (2025). SCRIPT: A Scalable Continual Reinforcement Learning Framework for Autonomous Penetration Testing. Expert Systems with Applications. 285. 127827–127827. 1 indexed citations
4.
Liu, Yali, et al.. (2025). Multi-image secret sharing for general access structure without size expansion. Journal of Information Security and Applications. 93. 104154–104154.
5.
Guo, Shasha, et al.. (2024). A robust defense for spiking neural networks against adversarial examples via input filtering. Journal of Systems Architecture. 153. 103209–103209. 1 indexed citations
6.
Lu, Yuliang, et al.. (2024). Invisible backdoor learning in regional transform domain. Neural Computing and Applications. 36(14). 8097–8108.
7.
Lu, Yuliang, et al.. (2024). ZBanner: Fast Stateless Scanning Capable of Obtaining Responses over TCP. 1–6. 1 indexed citations
8.
Lu, Yuliang, et al.. (2024). A Unified Model for Chinese Cyber Threat Intelligence Flat Entity and Nested Entity Recognition. Electronics. 13(21). 4329–4329. 2 indexed citations
9.
Ma, Yunshan, et al.. (2024). AttacKG+: Boosting attack graph construction with Large Language Models. Computers & Security. 150. 104220–104220. 14 indexed citations
10.
Lu, Yuliang, et al.. (2023). On the kinematics of general plane-symmetric Bricard mechanisms. Mechanism and Machine Theory. 190. 105433–105433. 4 indexed citations
12.
Lu, Yuliang, et al.. (2023). URadar: Discovering Unrestricted File Upload Vulnerabilities via Adaptive Dynamic Testing. IEEE Transactions on Information Forensics and Security. 19. 1251–1266. 3 indexed citations
14.
Zhang, Tianxiang, et al.. (2023). State-Sensitive Black-Box Web Application Scanning for Cross-Site Scripting Vulnerability Detection. Applied Sciences. 13(16). 9212–9212.
15.
Lu, Yuliang, et al.. (2022). Research on the Identification of Internet Critical Nodes Based on Multilayer Network Modeling. Security and Communication Networks. 2022. 1–17. 4 indexed citations
16.
Lu, Yuliang, et al.. (2021). AMBTC-based visual secret sharing with different meaningful shadows. Mathematical Biosciences & Engineering. 18(5). 5236–5251. 2 indexed citations
17.
Yan, Xuehu, et al.. (2020). Image inpainting-based behavior image secret sharing. Mathematical Biosciences & Engineering. 17(4). 2950–2966. 1 indexed citations
18.
Lu, Yuliang, et al.. (2019). Construction approach for control flow graph from binaries using hybrid analysis. Journal of ZheJiang University (Engineering Science). 53(5). 829–836. 2 indexed citations
19.
Liu, Feng, et al.. (2019). Weighted visual secret sharing with multiple decryptions and lossless recovery. Mathematical Biosciences & Engineering. 16(5). 5750–5764. 4 indexed citations
20.
Yan, Xuehu & Yuliang Lu. (2018). Applying QR Code to Secure Medical Management. 53–56. 2 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026