Ajoy Kumar Khan

449 total citations
59 papers, 199 citations indexed

About

Ajoy Kumar Khan is a scholar working on Artificial Intelligence, Computer Vision and Pattern Recognition and Computer Networks and Communications. According to data from OpenAlex, Ajoy Kumar Khan has authored 59 papers receiving a total of 199 indexed citations (citations by other indexed papers that have themselves been cited), including 26 papers in Artificial Intelligence, 24 papers in Computer Vision and Pattern Recognition and 23 papers in Computer Networks and Communications. Recurrent topics in Ajoy Kumar Khan's work include Chaos-based Image/Signal Encryption (19 papers), Cryptographic Implementations and Security (13 papers) and Coding theory and cryptography (8 papers). Ajoy Kumar Khan is often cited by papers focused on Chaos-based Image/Signal Encryption (19 papers), Cryptographic Implementations and Security (13 papers) and Coding theory and cryptography (8 papers). Ajoy Kumar Khan collaborates with scholars based in India and South Africa. Ajoy Kumar Khan's co-authors include Neetu Faujdar, Paromita Goswami, Somen Debnath, Ghanshyam Singh, Sudipta Roy, V. D. Ambeth Kumar, Rajat Kumar Pal, Mukesh Kumar Gupta, Somnath Mukhopadhyay and Partha Pakray and has published in prestigious journals such as SHILAP Revista de lepidopterología, Scientific Reports and IEEE Access.

In The Last Decade

Ajoy Kumar Khan

36 papers receiving 183 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Ajoy Kumar Khan India 8 89 80 71 42 34 59 199
Geovandro C. C. F. Pereira Brazil 8 92 1.0× 64 0.8× 80 1.1× 31 0.7× 17 0.5× 9 161
Mohsen Amini Salehi United States 10 71 0.8× 132 1.6× 149 2.1× 45 1.1× 36 1.1× 25 233
Amir Jalali United States 7 169 1.9× 33 0.4× 69 1.0× 45 1.1× 23 0.7× 9 216
Gunnar Gaubatz United States 5 147 1.7× 122 1.5× 75 1.1× 46 1.1× 19 0.6× 8 242
Stefan Tillich Austria 7 127 1.4× 76 0.9× 41 0.6× 72 1.7× 25 0.7× 24 207
Olivier Blazy France 7 117 1.3× 62 0.8× 54 0.8× 23 0.5× 36 1.1× 23 171
Osama Hosam Saudi Arabia 8 54 0.6× 58 0.7× 88 1.2× 90 2.1× 19 0.6× 28 209
Olivier Heen France 6 104 1.2× 100 1.3× 59 0.8× 15 0.4× 39 1.1× 14 166
Chunxiang Gu China 8 112 1.3× 82 1.0× 73 1.0× 31 0.7× 33 1.0× 39 185
Carlos Andres Lara-Nino Mexico 5 177 2.0× 63 0.8× 87 1.2× 100 2.4× 16 0.5× 9 225

Countries citing papers authored by Ajoy Kumar Khan

Since Specialization
Citations

This map shows the geographic impact of Ajoy Kumar Khan's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Ajoy Kumar Khan with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Ajoy Kumar Khan more than expected).

Fields of papers citing papers by Ajoy Kumar Khan

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Ajoy Kumar Khan. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Ajoy Kumar Khan. The network helps show where Ajoy Kumar Khan may publish in the future.

Co-authorship network of co-authors of Ajoy Kumar Khan

This figure shows the co-authorship network connecting the top 25 collaborators of Ajoy Kumar Khan. A scholar is included among the top collaborators of Ajoy Kumar Khan based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Ajoy Kumar Khan. Ajoy Kumar Khan is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
2.
Khan, Ajoy Kumar, et al.. (2025). SLCA-Cipher: secure and lightweight Cellular Automata cipher for resource-constrained devices. Iran Journal of Computer Science. 8(3). 773–790. 4 indexed citations
3.
Khan, Ajoy Kumar, et al.. (2025). Advancements in image encryption: A comprehensive review of design principles and performance metrics. Computer Science Review. 57. 100759–100759. 5 indexed citations
4.
Khan, Ajoy Kumar, et al.. (2025). Efficient shared secret key distribution using Cellular Automata for hybrid cryptosystems. Franklin Open. 14. 100465–100465.
5.
Khan, Ajoy Kumar, et al.. (2025). Enhanced Intrusion Detection System Using a Two‐Staged Feature Selection Method. Security and Privacy. 8(3). 1 indexed citations
6.
Khan, Ajoy Kumar, et al.. (2025). CAChaIoT: Hybrid lightweight image encryption for IoT using cellular automata and chaotic maps. Franklin Open. 12. 100361–100361.
8.
Goswami, Paromita, Neetu Faujdar, Somen Debnath, Ajoy Kumar Khan, & Ghanshyam Singh. (2024). Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability. Journal of Cloud Computing Advances Systems and Applications. 13(1). 22 indexed citations
9.
Khan, Ajoy Kumar, et al.. (2024). ProDetect: A Proactive Detection Approach of the TCP SYN Flooding Attack in the SDN Controller. IETE Journal of Education. 66(1). 60–71.
10.
Goswami, Paromita, Neetu Faujdar, Ghanshyam Singh, et al.. (2024). Stub Signature-Based Efficient Public Data Auditing System Using Dynamic Procedures in Cloud Computing. IEEE Access. 12. 58502–58518. 1 indexed citations
12.
Goswami, Paromita, Neetu Faujdar, Somen Debnath, Ajoy Kumar Khan, & Ghanshyam Singh. (2023). ZSS Signature-Based Audit Message Verification Process for Cloud Data Integrity. IEEE Access. 11. 145485–145502. 5 indexed citations
13.
Khan, Ajoy Kumar, et al.. (2023). Energy Efficient Routing Algorithm for WSN-IoT Network. Ingénierie des systèmes d information. 28(1). 231–238.
14.
Khan, Ajoy Kumar, et al.. (2023). A Digital Forensics Model for the Examination of QR Code and Android App to Investigate Aadhaar Card Identity Fraud. Journal of Applied Security Research. 19(3). 437–452.
15.
Khan, Ajoy Kumar, et al.. (2020). RTT based wormhole detection for wireless mesh networks. International Journal of Information Technology. 12(2). 539–546. 5 indexed citations
16.
Khan, Ajoy Kumar, et al.. (2019). Architectural and Security Prospective of Wireless Mesh Network. SSRN Electronic Journal. 3 indexed citations
17.
Khan, Ajoy Kumar, et al.. (2018). Investigating the Blinding Approach to Resist Power Analysis Attacks on Modular Exponentiation. SSRN Electronic Journal. 1 indexed citations
18.
Khan, Ajoy Kumar, et al.. (2017). A New Key Management Scheme for Wireless Sensor Networks using an Elliptic Curve. Indian Journal of Science and Technology. 10(13). 1–7. 8 indexed citations
19.
Khan, Ajoy Kumar, et al.. (2016). Performance evaluation of RSA and Elliptic Curve Cryptography. 302–306. 22 indexed citations
20.
Khan, Ajoy Kumar, et al.. (2013). A new algorithm with minimum track for four layer channel routing in VLSI design. 7. 1–5. 2 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026