H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 31 Citations 6,332 144 World Ranking 7954 National Ranking 71

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • Operating system
  • The Internet

Chin-Laung Lei spends much of his time researching Multimedia, The Internet, Quality of service, Model checking and Computer security. His Multimedia study incorporates themes from Quality, Provisioning and Cloud gaming. The concepts of his The Internet study are interwoven with issues in Crowdsourcing, Game mechanics, Video game design and Quality of experience.

His Quality of service study is related to the wider topic of Computer network. In general Model checking study, his work on Abstraction model checking often relates to the realm of Branching, Modalities and Multimodal logic, thereby connecting several areas of interest. His work on Traffic analysis, Trusted third party and Certificate authority as part of his general Computer security study is frequently connected to Watermark, thereby bridging the divide between different branches of science.

His most cited work include:

  • EFFICIENT MODEL CHECKING IN FRAGMENTS OF THE PROPOSITIONAL MU-CALCULUS. (431 citations)
  • Modalities for model checking: branching time logic strikes back (289 citations)
  • Quantifying Skype user satisfaction (248 citations)

What are the main themes of his work throughout his whole career to date?

Chin-Laung Lei focuses on Computer network, Computer security, Distributed computing, Scheme and The Internet. His Computer security study frequently draws connections to adjacent fields such as Internet privacy. His The Internet study combines topics from a wide range of disciplines, such as Crowdsourcing, Quality of service and Multimedia.

His work carried out in the field of Multimedia brings together such families of science as Screening game and Quality, Quality of experience. The various areas that he examines in his Authentication study include Ubiquitous computing, Wireless sensor network and Server. He has researched Blind signature in several fields, including Algorithm, Theoretical computer science and Discrete logarithm.

He most often published in these fields:

  • Computer network (33.17%)
  • Computer security (28.14%)
  • Distributed computing (11.56%)

What were the highlights of his more recent work (between 2016-2020)?

  • Computer security (28.14%)
  • Artificial intelligence (3.52%)
  • Computer network (33.17%)

In recent papers he was focusing on the following fields of study:

His main research concerns Computer security, Artificial intelligence, Computer network, Steganography and Algorithm. His work in Computer security is not limited to one particular discipline; it also encompasses Information sharing. His Artificial intelligence study integrates concerns from other disciplines, such as Machine learning, Task analysis and Computer vision.

His research is interdisciplinary, bridging the disciplines of Wireless network and Computer network. His Key research includes elements of Wireless sensor network and Distributed computing. Chin-Laung Lei has included themes like Computer hardware, Theoretical computer science, Personally identifiable information and Code in his Cover study.

Between 2016 and 2020, his most popular works were:

  • Preserving privacy of online digital physiological signals using blind and reversible steganography. (23 citations)
  • Audit-Free Cloud Storage via Deniable Attribute-Based Encryption (19 citations)
  • SFaaS: Keeping an eye on IoT fusion environment with security fusion as a service (18 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • Operating system
  • The Internet

Chin-Laung Lei mainly investigates Steganography, Cover, Futures contract, Information hiding and Computer security. His Steganography study spans across into subjects like Component, Information protection policy, Social media, Social network and Personally identifiable information. His Cover research is multidisciplinary, incorporating elements of Computer hardware, Theoretical computer science, World Wide Web and Code.

His Futures contract study combines topics in areas such as Breakout, Database transaction and Econometrics. His study on Information hiding is intertwined with other disciplines of science such as High capacity, Speech recognition, Amplitude, Scheme and Algorithm. His Computer security study is mostly concerned with Cloud storage, Filesystem-level encryption, Client-side encryption, Attribute-based encryption and 40-bit encryption.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

EFFICIENT MODEL CHECKING IN FRAGMENTS OF THE PROPOSITIONAL MU-CALCULUS.

E. Allen Emerson;Chin Laung Lei.
logic in computer science (1986)

826 Citations

Modalities for model checking: branching time logic strikes back

E. Allen Emerson;Chin-Laung Lei.
Science of Computer Programming (1987)

651 Citations

Quantifying Skype user satisfaction

Kuan-Ta Chen;Chun-Ying Huang;Polly Huang;Chin-Laung Lei.
acm special interest group on data communication (2006)

372 Citations

Game traffic analysis: an MMORPG perspective

Kuan-Ta Chen;Polly Huang;Chin-Laung Lei.
Computer Networks (2006)

287 Citations

An efficient and anonymous buyer-seller watermarking protocol

Chin-Laung Lei;Pei-Ling Yu;Pan-Lung Tsai;Ming-Hwa Chan.
IEEE Transactions on Image Processing (2004)

242 Citations

A crowdsourceable QoE evaluation framework for multimedia content

Kuan-Ta Chen;Chen-Chi Wu;Yu-Chun Chang;Chin-Laung Lei.
acm multimedia (2009)

227 Citations

Modalities for Model Checking: Branching Time Strikes Back.

E. Allen Emerson;Chin-Laung Lei.
POPL (1985)

225 Citations

Measuring the latency of cloud gaming systems

Kuan-Ta Chen;Yu-Chun Chang;Po-Han Tseng;Chun-Ying Huang.
acm multimedia (2011)

210 Citations

Modalities for model checking (extended abstract): branching time strikes back

E. Allen Emerson;Chin-Laung Lei.
symposium on principles of programming languages (1985)

187 Citations

How sensitive are online gamers to network quality

Kuan-Ta Chen;Polly Huang;Chin-Laung Lei.
Communications of The ACM (2006)

159 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Chin-Laung Lei

Moshe Y. Vardi

Moshe Y. Vardi

Rice University

Publications: 64

Orna Kupferman

Orna Kupferman

Hebrew University of Jerusalem

Publications: 44

Kuan-Ta Chen

Kuan-Ta Chen

Academia Sinica

Publications: 38

Edmund M. Clarke

Edmund M. Clarke

Carnegie Mellon University

Publications: 22

Orna Grumberg

Orna Grumberg

Technion – Israel Institute of Technology

Publications: 20

Rance Cleaveland

Rance Cleaveland

University of Maryland, College Park

Publications: 20

Bernhard Steffen

Bernhard Steffen

TU Dortmund University

Publications: 19

E. Allen Emerson

E. Allen Emerson

The University of Texas at Austin

Publications: 19

Alfredo De Santis

Alfredo De Santis

University of Salerno

Publications: 17

Thomas A. Henzinger

Thomas A. Henzinger

Institute of Science and Technology Austria

Publications: 16

Amir Pnueli

Amir Pnueli

Weizmann Institute of Science

Publications: 15

Roderick Bloem

Roderick Bloem

Graz University of Technology

Publications: 14

Wentong Cai

Wentong Cai

Nanyang Technological University

Publications: 14

Qingming Huang

Qingming Huang

Chinese Academy of Sciences

Publications: 14

Fabio Somenzi

Fabio Somenzi

University of Colorado Boulder

Publications: 13

Something went wrong. Please try again later.