H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 82 Citations 43,545 263 World Ranking 397 National Ranking 238

Research.com Recognitions

Awards & Achievements

2015 - IEEE Fellow For contributions to information and network security

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • Operating system
  • The Internet

His main research concerns Cloud computing, Computer security, Computer network, Server and Encryption. The Cloud computing study combines topics in areas such as Data integrity, Information privacy and Cryptography. His biological study spans a wide range of topics, including Delegation and Service.

His Computer network study combines topics in areas such as Wireless ad hoc network and Distributed database. Wenjing Lou has researched Server in several fields, including Outsourcing, Distributed computing and Computer security model. Wenjing Lou combines subjects such as Revocation, Information retrieval and Database with his study of Encryption.

His most cited work include:

  • Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing (1460 citations)
  • Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing (1136 citations)
  • Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing (1115 citations)

What are the main themes of his work throughout his whole career to date?

His primary scientific interests are in Computer network, Computer security, Distributed computing, Cloud computing and Encryption. His Computer network research incorporates themes from Wireless, Wireless ad hoc network, Throughput and Wireless network. Many of his studies on Computer security involve topics that are commonly interrelated, such as Service.

His Distributed computing research is multidisciplinary, relying on both Network packet and Dynamic Source Routing. His Cloud computing research incorporates elements of Outsourcing, Information privacy and Server. His Encryption research is multidisciplinary, incorporating elements of Cryptographic primitive, Database and Access control.

He most often published in these fields:

  • Computer network (52.55%)
  • Computer security (29.62%)
  • Distributed computing (18.79%)

What were the highlights of his more recent work (between 2016-2021)?

  • Computer network (52.55%)
  • Computer security (29.62%)
  • Encryption (17.20%)

In recent papers he was focusing on the following fields of study:

Wenjing Lou mainly focuses on Computer network, Computer security, Encryption, Cloud computing and Distributed computing. His study in Computer network focuses on Server in particular. His study in the fields of Blockchain under the domain of Computer security overlaps with other disciplines such as Game theory.

His Encryption study incorporates themes from Software, Information privacy and Cryptography. The various areas that Wenjing Lou examines in his Cloud computing study include Data deduplication, Homomorphic encryption, Overhead, Outsourcing and Access control. His studies deal with areas such as Communication channel, Node, Optimization problem, Telecommunications link and Job shop scheduling as well as Distributed computing.

Between 2016 and 2021, his most popular works were:

  • A Survey of Distributed Consensus Protocols for Blockchain Networks (113 citations)
  • Searchable Symmetric Encryption with Forward Search Privacy (42 citations)
  • Secure and Efficient Cloud Data Deduplication With Randomized Tag (41 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • Operating system
  • The Internet

Wenjing Lou mainly investigates Encryption, Computer network, Cloud computing, Information privacy and Computer security. While the research belongs to areas of Encryption, Wenjing Lou spends his time largely on the problem of Software, intersecting his research to questions surrounding Access control. His Computer network research is multidisciplinary, incorporating perspectives in Wireless and Exploit.

His research in Cloud computing intersects with topics in Tree, Outsourcing and Overhead. Wenjing Lou interconnects Probabilistic logic, Symmetric-key algorithm, Forward privacy and Cryptography in the investigation of issues within Information privacy. In the field of Computer security, his study on Memory forensics overlaps with subjects such as Processor register.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing

Cong Wang;Qian Wang;Kui Ren;Wenjing Lou.
international conference on computer communications (2010)

2691 Citations

Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing

Shucheng Yu;Cong Wang;Kui Ren;Wenjing Lou.
international conference on computer communications (2010)

2354 Citations

Ensuring data storage security in Cloud Computing

Cong Wang;Qian Wang;Kui Ren;Wenjing Lou.
international workshop on quality of service (2009)

2061 Citations

Privacy-preserving multi-keyword ranked search over encrypted cloud data

Ning Cao;Cong Wang;Ming Li;Kui Ren.
international conference on computer communications (2011)

1703 Citations

Privacy-Preserving Public Auditing for Secure Cloud Storage

Cong Wang;S. S. M. Chow;Qian Wang;Kui Ren.
IEEE Transactions on Computers (2013)

1516 Citations

Enabling public verifiability and data dynamics for storage security in cloud computing

Qian Wang;Cong Wang;Jin Li;Kui Ren.
european symposium on research in computer security (2009)

1322 Citations

Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing

Qian Wang;Cong Wang;Kui Ren;Wenjing Lou.
IEEE Transactions on Parallel and Distributed Systems (2011)

1317 Citations

Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption

Ming Li;Shucheng Yu;Yao Zheng;Kui Ren.
IEEE Transactions on Parallel and Distributed Systems (2013)

1158 Citations

Fuzzy Keyword Search over Encrypted Data in Cloud Computing

Jin Li;Qian Wang;Cong Wang;Ning Cao.
international conference on computer communications (2010)

1099 Citations

Secure Ranked Keyword Search over Encrypted Cloud Data

Cong Wang;Ning Cao;Jin Li;Kui Ren.
international conference on distributed computing systems (2010)

939 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Wenjing Lou

Jin Li

Jin Li

Guangzhou University

Publications: 94

Xuemin Shen

Xuemin Shen

University of Waterloo

Publications: 91

Xiaofeng Chen

Xiaofeng Chen

Xidian University

Publications: 84

Rongxing Lu

Rongxing Lu

University of New Brunswick

Publications: 70

Jianfeng Ma

Jianfeng Ma

Xidian University

Publications: 70

Hui Li

Hui Li

Xidian University

Publications: 65

Xiaodong Lin

Xiaodong Lin

University of Guelph

Publications: 64

Yuguang Fang

Yuguang Fang

University of Florida

Publications: 53

Ximeng Liu

Ximeng Liu

Fuzhou University

Publications: 53

Kui Ren

Kui Ren

Zhejiang University

Publications: 53

Debiao He

Debiao He

Wuhan University

Publications: 52

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 50

Jie Wu

Jie Wu

Temple University

Publications: 49

Yanchao Zhang

Yanchao Zhang

Arizona State University

Publications: 45

Xingming Sun

Xingming Sun

Nanjing University of Information Science and Technology

Publications: 43

Something went wrong. Please try again later.