D-Index & Metrics Best Publications
Research.com 2022 Rising Star of Science Award Badge

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Rising Stars D-index 56 Citations 13,515 238 World Ranking 151 National Ranking 55
Computer Science D-index 58 Citations 13,926 241 World Ranking 2383 National Ranking 231

Research.com Recognitions

Awards & Achievements

2022 - Research.com Rising Star of Science Award

Overview

What is she best known for?

The fields of study she is best known for:

  • Operating system
  • Artificial intelligence
  • The Internet

Her primary scientific interests are in Encryption, Cloud computing, Computer security, Server and Access control. Her Encryption research is multidisciplinary, relying on both Computer security model and Database. Her research integrates issues of Computer network, Information privacy and Distributed computing in her study of Cloud computing.

Her Computer security course of study focuses on Revocation and Computational Diffie–Hellman assumption, Random oracle and Authentication. Her Server research incorporates themes from Edit distance, Usability and Fuzzy logic. In her work, Merkle tree, Dynamic data, Backup, Storage security and Upload is strongly intertwined with Data integrity, which is a subfield of Cloud computing security.

Her most cited work include:

  • Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing (1136 citations)
  • Enabling public verifiability and data dynamics for storage security in cloud computing (718 citations)
  • Fuzzy Keyword Search over Encrypted Data in Cloud Computing (659 citations)

What are the main themes of her work throughout her whole career to date?

Jin Li mostly deals with Computer security, Encryption, Cloud computing, Access control and Theoretical computer science. Jin Li regularly ties together related areas like Service provider in her Computer security studies. Her biological study spans a wide range of topics, including Cryptography and Database.

Jin Li has included themes like Distributed computing and Server in her Cloud computing study. The various areas that Jin Li examines in her Server study include Computer security model and Upload. Her work deals with themes such as Data security, Overhead and Revocation, which intersect with Access control.

She most often published in these fields:

  • Computer security (45.60%)
  • Encryption (43.32%)
  • Cloud computing (38.44%)

What were the highlights of her more recent work (between 2018-2021)?

  • Computer security (45.60%)
  • Encryption (43.32%)
  • Artificial intelligence (7.17%)

In recent papers she was focusing on the following fields of study:

Her scientific interests lie mostly in Computer security, Encryption, Artificial intelligence, Computer network and Theoretical computer science. Jin Li focuses mostly in the field of Computer security, narrowing it down to topics relating to Protocol and, in certain cases, Computation. Her Encryption study integrates concerns from other disciplines, such as Cryptography, Construct, Cloud computing, Bloom filter and Information privacy.

Her work on Edge computing as part of general Cloud computing research is frequently linked to Outsourcing, thereby connecting diverse disciplines of science. Her work on Deep learning, Artificial neural network and Adversarial system as part of general Artificial intelligence research is frequently linked to Facial recognition system, bridging the gap between disciplines. In her study, which falls under the umbrella issue of Theoretical computer science, Homomorphic encryption is strongly linked to Key.

Between 2018 and 2021, her most popular works were:

  • Searchable Symmetric Encryption with Forward Search Privacy (42 citations)
  • The security of machine learning in an adversarial setting: A survey (38 citations)
  • Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-Assisted Industrial IoT (37 citations)

In her most recent research, the most cited papers focused on:

  • Operating system
  • Artificial intelligence
  • The Internet

Jin Li mainly investigates Computer security, Encryption, Cloud computing, Information privacy and Computer network. Her work in the fields of Computer security, such as Public-key cryptography and Intrusion detection system, intersects with other areas such as Computer communication networks and Trustworthiness. Her research in Encryption intersects with topics in Multimedia and Iterative reconstruction.

Her research integrates issues of Random oracle, Software deployment and Keyword search in her study of Cloud computing. The concepts of her Information privacy study are interwoven with issues in Probabilistic logic, Deep learning, Artificial intelligence and Symmetric-key algorithm. Her Server and Client-side study in the realm of Computer network interacts with subjects such as Relay.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing

Qian Wang;Cong Wang;Kui Ren;Wenjing Lou.
IEEE Transactions on Parallel and Distributed Systems (2011)

1537 Citations

Enabling public verifiability and data dynamics for storage security in cloud computing

Qian Wang;Cong Wang;Jin Li;Kui Ren.
european symposium on research in computer security (2009)

1475 Citations

Fuzzy Keyword Search over Encrypted Data in Cloud Computing

Jin Li;Qian Wang;Cong Wang;Ning Cao.
international conference on computer communications (2010)

1267 Citations

Secure Ranked Keyword Search over Encrypted Cloud Data

Cong Wang;Ning Cao;Jin Li;Kui Ren.
international conference on distributed computing systems (2010)

1075 Citations

Secure Deduplication with Efficient and Reliable Convergent Key Management

Jin Li;Xiaofeng Chen;Mingqiang Li;Jingwei Li.
IEEE Transactions on Parallel and Distributed Systems (2014)

732 Citations

Toward publicly auditable secure cloud data storage services

Cong Wang;Kui Ren;Wenjing Lou;Jin Li.
IEEE Network (2010)

630 Citations

A Hybrid Cloud Approach for Secure Authorized Deduplication

Jin Li;Yan Kit Li;Xiaofeng Chen;Patrick P.C. Lee.
IEEE Transactions on Parallel and Distributed Systems (2015)

543 Citations

New Algorithms for Secure Outsourcing of Modular Exponentiations

Xiaofeng Chen;Jin Li;Jianfeng Ma;Qiang Tang.
IEEE Transactions on Parallel and Distributed Systems (2014)

490 Citations

Securely Outsourcing Attribute-Based Encryption with Checkability

Jin Li;Xinyi Huang;Jingwei Li;Xiaofeng Chen.
IEEE Transactions on Parallel and Distributed Systems (2014)

456 Citations

Secure attribute-based data sharing for resource-limited users in cloud computing

Jin Li;Yinghui Zhang;Xiaofeng Chen;Yang Xiang;Yang Xiang.
Computers & Security (2018)

430 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Jin Li

Jianfeng Ma

Jianfeng Ma

Xidian University

Publications: 70

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 67

Ximeng Liu

Ximeng Liu

Fuzhou University

Publications: 57

Yi Mu

Yi Mu

Fujian Normal University

Publications: 51

Debiao He

Debiao He

Wuhan University

Publications: 48

Xiaofeng Chen

Xiaofeng Chen

Xidian University

Publications: 46

Hui Li

Hui Li

Xidian University

Publications: 44

Xingming Sun

Xingming Sun

Nanjing University of Information Science and Technology

Publications: 38

Kui Ren

Kui Ren

Zhejiang University

Publications: 38

Xinyi Huang

Xinyi Huang

Fujian Normal University

Publications: 36

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 35

Joseph K. Liu

Joseph K. Liu

Monash University

Publications: 33

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 31

Cong Wang

Cong Wang

City University of Hong Kong

Publications: 30

Qianhong Wu

Qianhong Wu

Beihang University

Publications: 30

Anfeng Liu

Anfeng Liu

Central South University

Publications: 30

Trending Scientists

Beth Plale

Beth Plale

Indiana University

Christophe Len

Christophe Len

PSL University

Pasupati Mukerjee

Pasupati Mukerjee

University of Wisconsin–Madison

Michael D. Sevilla

Michael D. Sevilla

Oakland University

Min-Xin Guan

Min-Xin Guan

Zhejiang University

Bernard Dujon

Bernard Dujon

Institut Pasteur

Craig F. Drury

Craig F. Drury

Agriculture and Agriculture-Food Canada

Ricky N. S. Wong

Ricky N. S. Wong

Hong Kong Baptist University

Jean-Jacques Toulmé

Jean-Jacques Toulmé

University of Bordeaux

Peter Tunved

Peter Tunved

Stockholm University

Ronald S. Tjeerdema

Ronald S. Tjeerdema

University of California, Davis

Sangeeta Sharma

Sangeeta Sharma

Environment and Climate Change Canada

Michael Eid

Michael Eid

Freie Universität Berlin

Galen V. Bodenhausen

Galen V. Bodenhausen

Northwestern University

John L. Beard

John L. Beard

Pennsylvania State University

Erich Fromm

Erich Fromm

William Alanson White Institute

Something went wrong. Please try again later.