H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 36 Citations 6,552 381 World Ranking 5709 National Ranking 543

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • Artificial intelligence
  • Operating system

His main research concerns Computer security, Encryption, Computer network, Cloud computing and Authentication. Challenge–response authentication, Authentication protocol, Mutual authentication, Password and Multi-factor authentication are the core of his Computer security study. His research integrates issues of Security analysis, Cryptographic primitive and Access control in his study of Encryption.

His study in Computer network is interdisciplinary in nature, drawing from both Wireless, Mobile telephony and Internet protocol suite. His work in the fields of Cloud computing, such as Cloud storage, intersects with other areas such as Outsourcing. His Authentication study integrates concerns from other disciplines, such as Smart card and Anonymity.

His most cited work include:

  • Device-to-Device Communication in LTE-Advanced Networks: A Survey (456 citations)
  • New Algorithms for Secure Outsourcing of Modular Exponentiations (218 citations)
  • Verifiable Computation over Large Database with Incremental Updates (183 citations)

What are the main themes of his work throughout his whole career to date?

The scientist’s investigation covers issues in Computer security, Computer network, Encryption, Cloud computing and Distributed computing. His study in Authentication, Security analysis, Access control, Cryptography and Public-key cryptography falls within the category of Computer security. His study in Authentication is interdisciplinary in nature, drawing from both Password and Smart card.

His research in Computer network tackles topics such as Wireless ad hoc network which are related to areas like Mobile ad hoc network. In his research, Verifiable secret sharing is intimately related to Database, which falls under the overarching field of Encryption. His work in the fields of Cloud storage overlaps with other areas such as Outsourcing.

He most often published in these fields:

  • Computer security (39.37%)
  • Computer network (34.10%)
  • Encryption (17.46%)

What were the highlights of his more recent work (between 2019-2021)?

  • Computer security (39.37%)
  • Cloud computing (16.31%)
  • Encryption (17.46%)

In recent papers he was focusing on the following fields of study:

Jianfeng Ma mainly focuses on Computer security, Cloud computing, Encryption, Computer network and Security analysis. In his study, which falls under the umbrella issue of Computer security, Scalability is strongly linked to Social network. The study incorporates disciplines such as Decision tree, Data security, Correctness and Information retrieval in addition to Cloud computing.

His studies in Encryption integrate themes in fields like Information privacy, Overhead, Database and Range query. Jianfeng Ma combines subjects such as Intrusion detection system, Key and Verifiable secret sharing with his study of Computer network. He focuses mostly in the field of Security analysis, narrowing it down to matters related to The Internet and, in some cases, Upload.

Between 2019 and 2021, his most popular works were:

  • Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing (41 citations)
  • Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting (31 citations)
  • Unified Biometric Privacy Preserving Three-Factor Authentication and Key Agreement for Cloud-Assisted Autonomous Vehicles (28 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • Artificial intelligence
  • Operating system

Cloud computing, Computer security, Encryption, Security analysis and Computer network are his primary areas of study. The various areas that Jianfeng Ma examines in his Cloud computing study include Data security, Decision tree, Nearest neighbor search, Affinity propagation and Image retrieval. His work on Ciphertext as part of general Computer security study is frequently linked to Incentive, bridging the gap between disciplines.

Jianfeng Ma has included themes like Range query, Information retrieval, Information privacy and Access control in his Encryption study. His Security analysis study combines topics in areas such as Overhead and Blockchain. A large part of his Computer network studies is devoted to Protocol.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Device-to-Device Communication in LTE-Advanced Networks: A Survey

Jiajia Liu;Nei Kato;Jianfeng Ma;Naoto Kadowaki.
IEEE Communications Surveys and Tutorials (2015)

604 Citations

New Algorithms for Secure Outsourcing of Modular Exponentiations

Xiaofeng Chen;Jin Li;Jianfeng Ma;Qiang Tang.
IEEE Transactions on Parallel and Distributed Systems (2014)

420 Citations

Verifiable Computation over Large Database with Incremental Updates

Xiaofeng Chen;Jin Li;Jian Weng;Jianfeng Ma.
IEEE Transactions on Computers (2016)

282 Citations

New Publicly Verifiable Databases with Efficient Updates

Xiaofeng Chen;Jin Li;Xinyi Huang;Jianfeng Ma.
IEEE Transactions on Dependable and Secure Computing (2015)

223 Citations

New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations

Xiaofeng Chen;Xinyi Huang;Jin Li;Jianfeng Ma.
IEEE Transactions on Information Forensics and Security (2015)

193 Citations

Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks

Qi Jiang;Sherali Zeadally;Jianfeng Ma;Debiao He.
IEEE Access (2017)

188 Citations

Privacy-Preserving Patient-Centric Clinical Decision Support System on Naïve Bayesian Classification

Ximeng Liu;Rongxing Lu;Jianfeng Ma;Le Chen.
IEEE Journal of Biomedical and Health Informatics (2016)

187 Citations

Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption

Jin Li;Xiaofeng Chen;Jingwei Li;Chunfu Jia.
european symposium on research in computer security (2013)

181 Citations

A privacy preserving three-factor authentication protocol for e-Health clouds

Qi Jiang;Muhammad Khurram Khan;Xiang Lu;Jianfeng Ma.
The Journal of Supercomputing (2016)

170 Citations

TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing

Sheng Gao;Jianfeng Ma;Weisong Shi;Guoxing Zhan.
IEEE Transactions on Information Forensics and Security (2013)

165 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Jianfeng Ma

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 62

Saru Kumari

Saru Kumari

Chaudhary Charan Singh University

Publications: 62

Ashok Kumar Das

Ashok Kumar Das

International Institute of Information Technology, Hyderabad

Publications: 59

Ximeng Liu

Ximeng Liu

Fuzhou University

Publications: 59

Xiaofeng Chen

Xiaofeng Chen

Xidian University

Publications: 51

Jin Li

Jin Li

Guangzhou University

Publications: 48

Muhammad Khurram Khan

Muhammad Khurram Khan

King Saud University

Publications: 48

Debiao He

Debiao He

Wuhan University

Publications: 48

Neeraj Kumar

Neeraj Kumar

Thapar University

Publications: 43

Cheng-Chi Lee

Cheng-Chi Lee

Fu Jen Catholic University

Publications: 33

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 33

Yang Xiang

Yang Xiang

Swinburne University of Technology

Publications: 28

Xinyi Huang

Xinyi Huang

Fujian Normal University

Publications: 27

Anfeng Liu

Anfeng Liu

Central South University

Publications: 26

Jiajia Liu

Jiajia Liu

Northwestern Polytechnical University

Publications: 24

Something went wrong. Please try again later.