H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 56 Citations 13,501 212 World Ranking 2075 National Ranking 199

Overview

What is she best known for?

The fields of study she is best known for:

  • Operating system
  • Artificial intelligence
  • The Internet

Her primary scientific interests are in Encryption, Cloud computing, Computer security, Server and Access control. Her Encryption research is multidisciplinary, relying on both Computer security model and Database. Her research integrates issues of Computer network, Information privacy and Distributed computing in her study of Cloud computing.

Her Computer security course of study focuses on Revocation and Computational Diffie–Hellman assumption, Random oracle and Authentication. Her Server research incorporates themes from Edit distance, Usability and Fuzzy logic. In her work, Merkle tree, Dynamic data, Backup, Storage security and Upload is strongly intertwined with Data integrity, which is a subfield of Cloud computing security.

Her most cited work include:

  • Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing (1136 citations)
  • Enabling public verifiability and data dynamics for storage security in cloud computing (718 citations)
  • Fuzzy Keyword Search over Encrypted Data in Cloud Computing (659 citations)

What are the main themes of her work throughout her whole career to date?

Jin Li mostly deals with Computer security, Encryption, Cloud computing, Access control and Theoretical computer science. Jin Li regularly ties together related areas like Service provider in her Computer security studies. Her biological study spans a wide range of topics, including Cryptography and Database.

Jin Li has included themes like Distributed computing and Server in her Cloud computing study. The various areas that Jin Li examines in her Server study include Computer security model and Upload. Her work deals with themes such as Data security, Overhead and Revocation, which intersect with Access control.

She most often published in these fields:

  • Computer security (45.60%)
  • Encryption (43.32%)
  • Cloud computing (38.44%)

What were the highlights of her more recent work (between 2018-2021)?

  • Computer security (45.60%)
  • Encryption (43.32%)
  • Artificial intelligence (7.17%)

In recent papers she was focusing on the following fields of study:

Her scientific interests lie mostly in Computer security, Encryption, Artificial intelligence, Computer network and Theoretical computer science. Jin Li focuses mostly in the field of Computer security, narrowing it down to topics relating to Protocol and, in certain cases, Computation. Her Encryption study integrates concerns from other disciplines, such as Cryptography, Construct, Cloud computing, Bloom filter and Information privacy.

Her work on Edge computing as part of general Cloud computing research is frequently linked to Outsourcing, thereby connecting diverse disciplines of science. Her work on Deep learning, Artificial neural network and Adversarial system as part of general Artificial intelligence research is frequently linked to Facial recognition system, bridging the gap between disciplines. In her study, which falls under the umbrella issue of Theoretical computer science, Homomorphic encryption is strongly linked to Key.

Between 2018 and 2021, her most popular works were:

  • Searchable Symmetric Encryption with Forward Search Privacy (42 citations)
  • The security of machine learning in an adversarial setting: A survey (38 citations)
  • Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-Assisted Industrial IoT (37 citations)

In her most recent research, the most cited papers focused on:

  • Operating system
  • Artificial intelligence
  • The Internet

Jin Li mainly investigates Computer security, Encryption, Cloud computing, Information privacy and Computer network. Her work in the fields of Computer security, such as Public-key cryptography and Intrusion detection system, intersects with other areas such as Computer communication networks and Trustworthiness. Her research in Encryption intersects with topics in Multimedia and Iterative reconstruction.

Her research integrates issues of Random oracle, Software deployment and Keyword search in her study of Cloud computing. The concepts of her Information privacy study are interwoven with issues in Probabilistic logic, Deep learning, Artificial intelligence and Symmetric-key algorithm. Her Server and Client-side study in the realm of Computer network interacts with subjects such as Relay.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Enabling public verifiability and data dynamics for storage security in cloud computing

Qian Wang;Cong Wang;Jin Li;Kui Ren.
european symposium on research in computer security (2009)

1322 Citations

Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing

Qian Wang;Cong Wang;Kui Ren;Wenjing Lou.
IEEE Transactions on Parallel and Distributed Systems (2011)

1317 Citations

Fuzzy Keyword Search over Encrypted Data in Cloud Computing

Jin Li;Qian Wang;Cong Wang;Ning Cao.
international conference on computer communications (2010)

1099 Citations

Secure Ranked Keyword Search over Encrypted Cloud Data

Cong Wang;Ning Cao;Jin Li;Kui Ren.
international conference on distributed computing systems (2010)

939 Citations

Secure Deduplication with Efficient and Reliable Convergent Key Management

Jin Li;Xiaofeng Chen;Mingqiang Li;Jingwei Li.
IEEE Transactions on Parallel and Distributed Systems (2014)

632 Citations

Toward publicly auditable secure cloud data storage services

Cong Wang;Kui Ren;Wenjing Lou;Jin Li.
IEEE Network (2010)

585 Citations

Securely Outsourcing Attribute-Based Encryption with Checkability

Jin Li;Xinyi Huang;Jingwei Li;Xiaofeng Chen.
IEEE Transactions on Parallel and Distributed Systems (2014)

432 Citations

A Hybrid Cloud Approach for Secure Authorized Deduplication

Jin Li;Yan Kit Li;Xiaofeng Chen;Patrick P.C. Lee.
IEEE Transactions on Parallel and Distributed Systems (2015)

429 Citations

New Algorithms for Secure Outsourcing of Modular Exponentiations

Xiaofeng Chen;Jin Li;Jianfeng Ma;Qiang Tang.
IEEE Transactions on Parallel and Distributed Systems (2014)

420 Citations

Identity-Based Encryption with Outsourced Revocation in Cloud Computing

Jin Li;Jingwei Li;Xiaofeng Chen;Chunfu Jia.
IEEE Transactions on Computers (2015)

362 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Jin Li

Jianfeng Ma

Jianfeng Ma

Xidian University

Publications: 70

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 67

Ximeng Liu

Ximeng Liu

Fuzhou University

Publications: 57

Yi Mu

Yi Mu

Fujian Normal University

Publications: 51

Debiao He

Debiao He

Wuhan University

Publications: 48

Xiaofeng Chen

Xiaofeng Chen

Xidian University

Publications: 46

Hui Li

Hui Li

Xidian University

Publications: 44

Kui Ren

Kui Ren

Zhejiang University

Publications: 38

Xingming Sun

Xingming Sun

Nanjing University of Information Science and Technology

Publications: 38

Xinyi Huang

Xinyi Huang

Fujian Normal University

Publications: 36

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 35

Joseph K. Liu

Joseph K. Liu

Monash University

Publications: 33

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 31

Qianhong Wu

Qianhong Wu

Beihang University

Publications: 30

Yang Xiang

Yang Xiang

Swinburne University of Technology

Publications: 30

Something went wrong. Please try again later.