Half the Highly Cited Researchers in Computer Science Work with 6G

November 17, 2023

Written by Caio Castro
6G World Map

According to data analysis made by 6GWorld, almost half the most cited researchers in the field of computer science conduct work specifically about 6G or technologies directly connected to the next generation of mobile communications.

Released earlier this week, Clarivate’s Highly Cited Researchers recognised 6,849 professionals whose academic production ranks in the top 1% by citations for their field and publication year in the Web of Science over the past decade.

The company nominated 96 individuals in Computer Science, from which 47 have actively researched 6G in recent years. Only two women made the Computer Science list, while none is in the 6G one.

Overall, 40 educational institutions appear in the 6G cohort. China tops the list with 12 names, followed by the United Kingdom (10) and the United States (6).

The University of Oulu (Finland), University of London (United Kingdom), University of Electronic Science & Technology of China (China), Southeast University (China), Queen Mary University London (United Kingdom), Nanyang Technological University (Singapore), and the Khalifa University of Science & Technology (United Arab Emirates) lead the list with two representatives each.

You can see the nominees here (sorted by last name):

 Jeffrey G. AndrewsUniversity of Texas Austin, United States
 Mehdi BennisUniversity of Oulu, Finland
 Emil BjörnsonKTH Royal Institute of Technology, Sweden
 Yunfei ChenUniversity of Warwick, United Kingdom
 Linglong DaiTsinghua University, China
 Merouane DebbahKhalifa University of Science & Technology, United Arab Emirates
 Zhiguo DingKhalifa University of Science & Technology, United Arab Emirates
 Maged ElkashlanUniversity of London, United Kingdom
 Song GuoHong Kong University of Science & Technology, Hong Kong
 Zhu HanUniversity of Houston System, United States
 Lajos HanzoUniversity of Southampton, United Kingdom
 Robert W. HeathNorth Carolina State University, United States
 Ekram HossainUniversity of Manitoba, Canada
 M. Shamim HossainKing Saud University, Saudi Arabia
 Kaibin HuangUniversity of Hong Kong, Hong Kong
 Shi JinSoutheast University – China, China
 Nei KatoTohoku University, Japan
 Erik G. LarssonLinkoping University, Sweden
 Victor C. M. LeungShenzhen University, China
 Geoffrey Ye LiImperial College London, United Kingdom
 Ying-Chang LiangUniversity of Electronic Science & Technology of China, China
 Jiajia LiuNorthwestern Polytechnical University, China
 Yuanwei LiuQueen Mary University London, United Kingdom
 Shahid MumtazNottingham Trent University, United Kingdom
 Arumugam NallanathanQueen Mary University London, United Kingdom
 Derrick Wing Kwan NgUniversity of New South Wales Sydney, Australia
 Zhaolong NingChongqing University of Posts & Telecommunications, China
 Dusit NiyatoNanyang Technological University, Singapore
 Cunhua PanUniversity of London, United Kingdom
 Mugen PengBeijing University of Posts & Telecommunications, China
 H. Vincent PoorPrinceton University, United States
 Lianyong QiChina University of Petroleum, China
 Marco Di RenzoUniversite Paris Saclay, France
 Walid SaadVirginia Polytechnic Institute & State University, United States
 Robert SchoberUniversity of Erlangen Nuremberg, Germany
 Xuemin (Sherman) ShenUniversity of Waterloo, Canada
 Tarik TalebUniversity of Oulu, Finland
 Shaohua WanUniversity of Electronic Science & Technology of China, China
 Kezhi WangNorthumbria University, United Kingdom
 Kai-Kit WongUniversity College London, United Kingdom
 Qingqing WuShanghai Jiao Tong University, China
 Chau YuenNanyang Technological University, Singapore
 Sherali ZeadallyUniversity of Kentucky, United States
 Yong ZengSoutheast University – China, China
 Rui ZhangNational University of Singapore, Singapore
 Yan ZhangUniversity of Oslo, Norway
 Nan ZhaoDalian University of Technology, China

Recent Posts

Guest Post: Navigating the IoT security landscape

Guest Post: Navigating the IoT security landscape

By Iain Davidson, senior product manager, Wireless Logic According to IDC, spend on the internet of things (IoT) could reach almost $345 billion by 2027. The fastest adoption will be in applications such as irrigation and fleet management, with prominent use cases in...

Key Value Indicators – Making Good Business

Key Value Indicators – Making Good Business

One of the most original and most overlooked features of 6G is the involvement of Key Value Indicators [KVIs] in its development. However, KVIs may hold the key to revamping the fortunes of the telecoms industry. Key Value Indicators were introduced as a concept into...

Pin It on Pinterest

Share This