D-Index & Metrics Best Publications

D-Index & Metrics

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 33 Citations 25,481 114 World Ranking 6921 National Ranking 3280

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • The Internet
  • Telecommunications

Yih-Chun Hu mainly investigates Computer network, Wireless Routing Protocol, Optimized Link State Routing Protocol, Ad hoc wireless distribution service and Wireless ad hoc network. His Computer network study combines topics from a wide range of disciplines, such as Computer security and Distributed computing. His studies deal with areas such as Wireless network and Service as well as Computer security.

Wireless Routing Protocol is a subfield of Routing protocol that Yih-Chun Hu studies. His study looks at the intersection of Mobile ad hoc network and topics like Vehicular ad hoc network with Adaptive quality of service multi-hop routing. Yih-Chun Hu has researched Zone Routing Protocol in several fields, including Static routing and Enhanced Interior Gateway Routing Protocol.

His most cited work include:

  • A performance comparison of multi-hop wireless ad hoc network routing protocols (4634 citations)
  • Packet leashes: a defense against wormhole attacks in wireless networks (1436 citations)
  • Ariadne: a secure on-demand routing protocol for ad hoc networks (1344 citations)

What are the main themes of his work throughout his whole career to date?

His primary areas of study are Computer network, Computer security, Wireless, Wireless network and Distributed computing. His research integrates issues of Wireless ad hoc network and Vehicular ad hoc network in his study of Computer network. In his research on the topic of Wireless ad hoc network, Geocast and Mobile computing is strongly related with Mobile ad hoc network.

His Computer security research incorporates elements of Bandwidth, Denial-of-service attack, The Internet and Service. He has included themes like Protocol and Router in his Distributed computing study. He combines subjects such as Link-state routing protocol and Dynamic Source Routing with his study of Wireless Routing Protocol.

He most often published in these fields:

  • Computer network (68.61%)
  • Computer security (38.69%)
  • Wireless (27.74%)

What were the highlights of his more recent work (between 2015-2021)?

  • Computer network (68.61%)
  • Computer security (38.69%)
  • Wireless (27.74%)

In recent papers he was focusing on the following fields of study:

The scientist’s investigation covers issues in Computer network, Computer security, Wireless, Denial-of-service attack and Wireless network. His studies in Computer network integrate themes in fields like Spread spectrum and Channel capacity. In his study, Source lines of code is strongly linked to Protocol, which falls under the umbrella field of Computer security.

His work carried out in the field of Wireless network brings together such families of science as Network topology, Hash chain, Key and Secrecy. His study in Distributed computing is interdisciplinary in nature, drawing from both Wireless ad hoc network, Ad hoc wireless distribution service, Optimized Link State Routing Protocol, Latency and Wireless Routing Protocol. His Optimized Link State Routing Protocol research is multidisciplinary, relying on both Wireless mesh network and Vehicular ad hoc network.

Between 2015 and 2021, his most popular works were:

  • MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the Internet (26 citations)
  • TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network (16 citations)
  • Enabling Efficient Source and Path Verification via Probabilistic Packet Marking (12 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • The Internet
  • Telecommunications

His primary areas of investigation include Computer network, Computer security, Denial-of-service attack, Wireless and Wireless network. His Computer network research is multidisciplinary, incorporating perspectives in Frequency-hopping spread spectrum and Goodput. His biological study spans a wide range of topics, including Internet privacy and Botnet.

In his research, Embedded system, Active networking, Vulnerability, Authentication and Wireless sensor network is intimately related to Maximum power transfer theorem, which falls under the overarching field of Denial-of-service attack. His Wireless research is multidisciplinary, incorporating elements of Leaky feeder, Communications system and Repeater. His research in Wireless network intersects with topics in Key generation, Optimized Link State Routing Protocol and Data transmission.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

A performance comparison of multi-hop wireless ad hoc network routing protocols

Josh Broch;David A. Maltz;David B. Johnson;Yih-Chun Hu.
acm/ieee international conference on mobile computing and networking (1998)

7435 Citations

Ariadne: a secure on-demand routing protocol for ad hoc networks

Yih-Chun Hu;Adrian Perrig;David B. Johnson.
Wireless Networks (2005)

3320 Citations

Packet leashes: a defense against wormhole attacks in wireless networks

Y.-C. Hu;A. Perrig;D.B. Johnson.
international conference on computer communications (2003)

2643 Citations

SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks

Yih Chun Hu;David B. Johnson;Adrian Perrig.
ad hoc networks (2003)

2038 Citations

Rushing attacks and defense in wireless ad hoc network routing protocols

Yih-Chun Hu;Adrian Perrig;David B. Johnson.
workshop on wireless security (2003)

985 Citations

Wormhole attacks in wireless networks

Yih-Chun Hu;A. Perrig;D.B. Johnson.
IEEE Journal on Selected Areas in Communications (2006)

883 Citations

Caching strategies in on-demand routing protocols for wireless ad hoc networks

Yih-Chun Hu;David B. Johnson.
acm/ieee international conference on mobile computing and networking (2000)

514 Citations

SPV: secure path vector routing for securing BGP

Yih-Chun Hu;Adrian Perrig;Marvin Sirbu.
acm special interest group on data communication (2004)

296 Citations

Portcullis: protecting connection setup from denial-of-capability attacks

Bryan Parno;Dan Wendlandt;Elaine Shi;Adrian Perrig.
acm special interest group on data communication (2007)

273 Citations

Efficient Security Mechanisms for Routing Protocolsa.

Yih-Chun Hu;Adrian Perrig;David B. Johnson.
network and distributed system security symposium (2003)

244 Citations

Best Scientists Citing Yih-Chun Hu

Adrian Perrig

Adrian Perrig

ETH Zurich

Publications: 59

Srdjan Capkun

Srdjan Capkun

ETH Zurich

Publications: 56

Mario Gerla

Mario Gerla

University of California, Los Angeles

Publications: 45

Takahiro Hara

Takahiro Hara

Osaka University

Publications: 42

J.J. Garcia-Luna-Aceves

J.J. Garcia-Luna-Aceves

University of California, Santa Cruz

Publications: 38

Jean-Pierre Hubaux

Jean-Pierre Hubaux

École Polytechnique Fédérale de Lausanne

Publications: 37

Cristina Nita-Rotaru

Cristina Nita-Rotaru

Northeastern University

Publications: 36

Azzedine Boukerche

Azzedine Boukerche

University of Ottawa

Publications: 30

Xuemin Shen

Xuemin Shen

University of Waterloo

Publications: 30

Panos Papadimitratos

Panos Papadimitratos

Royal Institute of Technology

Publications: 29

Yuguang Fang

Yuguang Fang

University of Florida

Publications: 28

Ivan Stojmenovic

Ivan Stojmenovic

University of Ottawa

Publications: 26

Samir R. Das

Samir R. Das

Stony Brook University

Publications: 25

Peng Ning

Peng Ning

Google (United States)

Publications: 24

Thomas Kunz

Thomas Kunz

Carleton University

Publications: 23

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us
Something went wrong. Please try again later.