D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 59 Citations 11,404 517 World Ranking 2286 National Ranking 223

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • Operating system
  • Artificial intelligence

His primary areas of study are Computer network, Cloud computing, Wireless sensor network, Computer security and Distributed computing. His studies deal with areas such as Wireless and Service provider as well as Computer network. His Cloud computing research is multidisciplinary, incorporating elements of Software deployment, Information retrieval, Encryption, Information privacy and Big data.

His Wireless sensor network research includes themes of Fault tolerance, Key distribution in wireless sensor networks and Embedded system. His Computer security research is multidisciplinary, relying on both Trust network, Small-world network and Search algorithm. His work carried out in the field of Distributed computing brings together such families of science as Static routing, Geographic routing and Reliability.

His most cited work include:

  • Hierarchical attribute-based encryption for fine-grained access control in cloud storage services (520 citations)
  • Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers (189 citations)
  • Time-based proxy re-encryption scheme for secure data sharing in a cloud environment (153 citations)

What are the main themes of his work throughout his whole career to date?

His scientific interests lie mostly in Computer network, Computer security, Distributed computing, Wireless sensor network and Cloud computing. His study in Mobile computing, Routing protocol, Dynamic Source Routing, Multicast and Server is carried out as part of his Computer network studies. His study looks at the relationship between Computer security and topics such as Service provider, which overlap with Location-based service.

His Distributed computing study combines topics in areas such as Node, Wireless ad hoc network, Mobile ad hoc network and Routing. He has included themes like Wireless, Key distribution in wireless sensor networks and Real-time computing in his Wireless sensor network study. His Encryption research incorporates themes from Cryptography and Access control.

He most often published in these fields:

  • Computer network (33.79%)
  • Computer security (24.11%)
  • Distributed computing (18.38%)

What were the highlights of his more recent work (between 2018-2021)?

  • Computer security (24.11%)
  • Cloud computing (14.03%)
  • Computer network (33.79%)

In recent papers he was focusing on the following fields of study:

Computer security, Cloud computing, Computer network, Artificial intelligence and Encryption are his primary areas of study. The study incorporates disciplines such as Service provider and Smart city in addition to Computer security. His study in Cloud computing is interdisciplinary in nature, drawing from both Identification, Correctness, Authentication and Key.

His Computer network research incorporates elements of Wireless and Wireless ad hoc network. His work on Ciphertext as part of general Encryption research is frequently linked to Popularity, bridging the gap between disciplines. His Information privacy research includes elements of Server and Cryptography.

Between 2018 and 2021, his most popular works were:

  • A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services (70 citations)
  • Fog-Based Computing and Storage Offloading for Data Synchronization in IoT (65 citations)
  • A Blockchain-Based Nonrepudiation Network Computing Service Scheme for Industrial IoT (57 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • Operating system
  • Artificial intelligence

Guojun Wang focuses on Computer network, Computer security, Cloud computing, Service provider and Overhead. His Computer network study integrates concerns from other disciplines, such as Wireless ad hoc network and Fog computing. Guojun Wang has researched Computer security in several fields, including Theoretical computer science and Dependability.

His studies in Cloud computing integrate themes in fields like Wireless sensor network, Information privacy, Server and Encryption. His work on Sensor cloud is typically connected to Raw data as part of general Wireless sensor network study, connecting several disciplines of science. His Service provider study also includes

  • Service and Scalability most often made with reference to Blockchain,
  • Location-based service which is related to area like Cache, k-anonymity, Anonymity, Trajectory and Range.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Hierarchical attribute-based encryption for fine-grained access control in cloud storage services

Guojun Wang;Qin Liu;Jie Wu.
computer and communications security (2010)

877 Citations

Hierarchical attribute-based encryption for fine-grained access control in cloud storage services

Guojun Wang;Qin Liu;Jie Wu.
computer and communications security (2010)

877 Citations

Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers

Guojun Wang;Qin Liu;Jie Wu;Minyi Guo.
Computers & Security (2011)

310 Citations

Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers

Guojun Wang;Qin Liu;Jie Wu;Minyi Guo.
Computers & Security (2011)

310 Citations

Time-based proxy re-encryption scheme for secure data sharing in a cloud environment

Qin Liu;Guojun Wang;Jie Wu.
Information Sciences (2014)

285 Citations

Time-based proxy re-encryption scheme for secure data sharing in a cloud environment

Qin Liu;Guojun Wang;Jie Wu.
Information Sciences (2014)

285 Citations

Energy-Efficient Resource Allocation for D2D Communications Underlaying Cloud-RAN-Based LTE-A Networks

Zhenyu Zhou;Mianxiong Dong;Kaoru Ota;Guojun Wang.
IEEE Internet of Things Journal (2016)

262 Citations

Energy-Efficient Resource Allocation for D2D Communications Underlaying Cloud-RAN-Based LTE-A Networks

Zhenyu Zhou;Mianxiong Dong;Kaoru Ota;Guojun Wang.
IEEE Internet of Things Journal (2016)

262 Citations

Deploying Wireless Sensor Networks with Fault-Tolerance for Structural Health Monitoring

Zakirul Alam Bhuiyan;Guojun Wang;Jiannong Cao;Jie Wu.
IEEE Transactions on Computers (2015)

225 Citations

Deploying Wireless Sensor Networks with Fault-Tolerance for Structural Health Monitoring

Zakirul Alam Bhuiyan;Guojun Wang;Jiannong Cao;Jie Wu.
IEEE Transactions on Computers (2015)

225 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Guojun Wang

Tian Wang

Tian Wang

Beijing Normal University

Publications: 71

Anfeng Liu

Anfeng Liu

Central South University

Publications: 67

Zakirul Alam Bhuiyan

Zakirul Alam Bhuiyan

Fordham University

Publications: 39

Zheng Yan

Zheng Yan

Xidian University

Publications: 33

Jie Wu

Jie Wu

Temple University

Publications: 31

Shui Yu

Shui Yu

University of Technology Sydney

Publications: 26

Yang Xiang

Yang Xiang

Swinburne University of Technology

Publications: 20

Ximeng Liu

Ximeng Liu

Fuzhou University

Publications: 19

Jianfeng Ma

Jianfeng Ma

Xidian University

Publications: 18

Laurence T. Yang

Laurence T. Yang

St. Francis Xavier University

Publications: 18

Nadeem Javaid

Nadeem Javaid

COMSATS University Islamabad

Publications: 18

Keqin Li

Keqin Li

State University of New York at New Paltz

Publications: 16

J.J. Garcia-Luna-Aceves

J.J. Garcia-Luna-Aceves

University of California, Santa Cruz

Publications: 16

Jin Li

Jin Li

Chinese Academy of Sciences

Publications: 15

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 14

Xiaojiang Du

Xiaojiang Du

Temple University

Publications: 14

Trending Scientists

Hao Su

Hao Su

University of California, San Diego

Javier Lafuente

Javier Lafuente

Autonomous University of Barcelona

Yue Li

Yue Li

Chinese Academy of Sciences

Stein R. Moe

Stein R. Moe

Norwegian University of Life Sciences

Ramon Massana

Ramon Massana

Spanish National Research Council

Kevin de Queiroz

Kevin de Queiroz

National Museum of Natural History

Konstanze F. Winklhofer

Konstanze F. Winklhofer

Ruhr University Bochum

Ulrich Brandt

Ulrich Brandt

Radboud University Nijmegen

Hiroshi Sato

Hiroshi Sato

Kanazawa University

Olivier Rieppel

Olivier Rieppel

Field Museum of Natural History

Silke Robatzek

Silke Robatzek

Ludwig-Maximilians-Universität München

Richard A. Shakesby

Richard A. Shakesby

Swansea University

David Forbes

David Forbes

University of Melbourne

Takao Kawabe

Takao Kawabe

University of Tokyo

Jean Logan

Jean Logan

New York University

David P. DiVincenzo

David P. DiVincenzo

RWTH Aachen University

Something went wrong. Please try again later.