H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 76 Citations 22,605 392 World Ranking 571 National Ranking 22

Research.com Recognitions

Awards & Achievements

2021 - IEEE Fellow For contributions to security and privacy in vehicular communications

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • The Internet
  • Computer security

Rongxing Lu mostly deals with Computer network, Computer security, Information privacy, Public-key cryptography and Wireless ad hoc network. In most of his Computer network studies, his work intersects topics such as Vehicular ad hoc network. His Computer security research includes elements of The Internet, Cloud computing security and Server.

His work deals with themes such as Wireless, Dynamic pricing, Supply and demand and Access control, which intersect with Information privacy. His research in Public-key cryptography intersects with topics in Key management and Password strength. His research investigates the link between Wireless ad hoc network and topics such as Mobile radio that cross with problems in Network packet, Protocol, Mobile ad hoc network, Bundle and Delay-tolerant networking.

His most cited work include:

  • Smart community: an internet of things application (533 citations)
  • ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications (498 citations)
  • EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications (487 citations)

What are the main themes of his work throughout his whole career to date?

Rongxing Lu mainly investigates Computer security, Computer network, Encryption, Authentication and Cryptography. His Computer security research integrates issues from Server, Mobile computing and Internet privacy. His Computer network research is multidisciplinary, incorporating elements of Wireless ad hoc network and Vehicular ad hoc network.

His Encryption study combines topics from a wide range of disciplines, such as Security analysis, Range query, Distributed computing and Database. His Authentication study integrates concerns from other disciplines, such as Wireless network, Access control and Anonymity. His research links Digital signature with Cryptography.

He most often published in these fields:

  • Computer security (44.87%)
  • Computer network (43.53%)
  • Encryption (21.43%)

What were the highlights of his more recent work (between 2019-2021)?

  • Computer security (44.87%)
  • Encryption (21.43%)
  • Security analysis (11.83%)

In recent papers he was focusing on the following fields of study:

His primary areas of investigation include Computer security, Encryption, Security analysis, Computer network and Distributed computing. His research in Computer security intersects with topics in Service provider and Protocol. His research integrates issues of Similarity, Range query, Information privacy and Server in his study of Encryption.

His Security analysis research is multidisciplinary, relying on both Overhead, Core, Trusted third party, Smart contract and Personally identifiable information. His Computer network research incorporates themes from Wireless and Verifiable secret sharing. His Distributed computing study combines topics in areas such as Intelligent transportation system and Spanning tree.

Between 2019 and 2021, his most popular works were:

  • On Feasibility and Limitations of Detecting False Data Injection Attacks on Power Grid State Estimation Using D-FACTS Devices (25 citations)
  • Security and Privacy Challenges in 5G-Enabled Vehicular Networks (22 citations)
  • Game Theory and Reinforcement Learning Based Secure Edge Caching in Mobile Social Networks (13 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • The Internet
  • Artificial intelligence

Rongxing Lu mostly deals with Computer security, Encryption, Artificial intelligence, Distributed computing and Security analysis. His biological study spans a wide range of topics, including Variety and Emerging technologies. The Artificial intelligence study which covers Machine learning that intersects with Overhead and Homomorphic encryption.

Rongxing Lu has included themes like Information privacy, Differential privacy and State in his Distributed computing study. His Security analysis research integrates issues from Service provider, The Internet and Access control. His Anonymity research focuses on Computer network and how it relates to Reinforcement learning.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Smart community: an internet of things application

Xu Li;Rongxing Lu;Xiaohui Liang;Xuemin Shen.
IEEE Communications Magazine (2011)

722 Citations

ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications

Rongxing Lu;Xiaodong Lin;Haojin Zhu;Pin-Han Ho.
international conference on computer communications (2008)

684 Citations

An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks

Chenxi Zhang;Rongxing Lu;Xiaodong Lin;Pin-Han Ho.
international conference on computer communications (2008)

607 Citations

EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications

Rongxing Lu;Xiaohui Liang;Xu Li;Xiaodong Lin.
IEEE Transactions on Parallel and Distributed Systems (2012)

604 Citations

Optimal Workload Allocation in Fog-Cloud Computing Toward Balanced Delay and Power Consumption

Ruilong Deng;Rongxing Lu;Chengzhe Lai;Tom H. Luan.
IEEE Internet of Things Journal (2016)

530 Citations

SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks

Rongxing Lu;Xiaodong Lin;Xuemin Shen.
international conference on computer communications (2010)

525 Citations

Secure provenance: the essential of bread and butter of data forensics in cloud computing

Rongxing Lu;Xiaodong Lin;Xiaohui Liang;Xuemin (Sherman) Shen.
computer and communications security (2010)

449 Citations

Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs

Rongxing Lu;Xiaodong Li;T. H. Luan;Xiaohui Liang.
IEEE Transactions on Vehicular Technology (2012)

431 Citations

Security in vehicular ad hoc networks

Xiaodong Lin;Rongxing Lu;Chenxi Zhang;Haojin Zhu.
IEEE Communications Magazine (2008)

402 Citations

A Lightweight Message Authentication Scheme for Smart Grid Communications

M. M. Fouda;Z. M. Fadlullah;N. Kato;Rongxing Lu.
IEEE Transactions on Smart Grid (2011)

392 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Rongxing Lu

Xuemin Shen

Xuemin Shen

University of Waterloo

Publications: 135

Irwin Gerszberg

Irwin Gerszberg

AT&T (United States)

Publications: 107

Paul Shala Henry

Paul Shala Henry

AT&T (United States)

Publications: 102

Robert Bennett

Robert Bennett

AT&T (United States)

Publications: 100

Farhad Barzegar

Farhad Barzegar

AT&T (United States)

Publications: 95

Xiaodong Lin

Xiaodong Lin

University of Guelph

Publications: 70

Hui Li

Hui Li

Xidian University

Publications: 59

Neeraj Kumar

Neeraj Kumar

Thapar University

Publications: 48

Zhenfu Cao

Zhenfu Cao

East China Normal University

Publications: 47

Liehuang Zhu

Liehuang Zhu

Beijing Institute of Technology

Publications: 47

Kuan Zhang

Kuan Zhang

University of Nebraska–Lincoln

Publications: 43

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 42

Ximeng Liu

Ximeng Liu

Fuzhou University

Publications: 41

Mohsen Guizani

Mohsen Guizani

Qatar University

Publications: 41

Jianfeng Ma

Jianfeng Ma

Xidian University

Publications: 40

Something went wrong. Please try again later.