Baodian Wei

506 total citations
49 papers, 288 citations indexed

About

Baodian Wei is a scholar working on Artificial Intelligence, Computer Networks and Communications and Electrical and Electronic Engineering. According to data from OpenAlex, Baodian Wei has authored 49 papers receiving a total of 288 indexed citations (citations by other indexed papers that have themselves been cited), including 33 papers in Artificial Intelligence, 20 papers in Computer Networks and Communications and 15 papers in Electrical and Electronic Engineering. Recurrent topics in Baodian Wei's work include Cryptography and Data Security (24 papers), Error Correcting Code Techniques (12 papers) and Cryptographic Implementations and Security (10 papers). Baodian Wei is often cited by papers focused on Cryptography and Data Security (24 papers), Error Correcting Code Techniques (12 papers) and Cryptographic Implementations and Security (10 papers). Baodian Wei collaborates with scholars based in China, South Korea and Australia. Baodian Wei's co-authors include Fangguo Zhang, Haibo Tian, Xiaofeng Chen, Jingmei Liu, Kwangjo Kim, Xiao Ma, Xinmei Wang, Yi Mu, Zhengtao Jiang and Willy Susilo and has published in prestigious journals such as IEEE Transactions on Information Theory, IEEE Transactions on Communications and Information Sciences.

In The Last Decade

Baodian Wei

46 papers receiving 269 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Baodian Wei China 9 222 91 82 80 52 49 288
Goichiro Hanaoka Japan 10 346 1.6× 130 1.4× 73 0.9× 68 0.8× 53 1.0× 98 409
Helmut Knebl Germany 5 140 0.6× 82 0.9× 67 0.8× 99 1.2× 32 0.6× 11 252
Maozhi Xu China 10 211 1.0× 117 1.3× 83 1.0× 38 0.5× 61 1.2× 53 291
Doug Whiting United States 6 217 1.0× 80 0.9× 69 0.8× 122 1.5× 37 0.7× 11 276
Qi Chai Canada 7 249 1.1× 216 2.4× 82 1.0× 60 0.8× 35 0.7× 12 335
Song Y. Yan United Kingdom 9 181 0.8× 85 0.9× 38 0.5× 61 0.8× 30 0.6× 34 255
Gilad Asharov Israel 10 417 1.9× 104 1.1× 57 0.7× 51 0.6× 30 0.6× 23 444
Malika Izabachène France 2 394 1.8× 128 1.4× 54 0.7× 57 0.7× 25 0.5× 4 434
Wakaha Ogata Japan 9 286 1.3× 100 1.1× 63 0.8× 79 1.0× 91 1.8× 41 347
Mariya Georgieva Switzerland 4 463 2.1× 139 1.5× 61 0.7× 71 0.9× 28 0.5× 5 510

Countries citing papers authored by Baodian Wei

Since Specialization
Citations

This map shows the geographic impact of Baodian Wei's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Baodian Wei with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Baodian Wei more than expected).

Fields of papers citing papers by Baodian Wei

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Baodian Wei. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Baodian Wei. The network helps show where Baodian Wei may publish in the future.

Co-authorship network of co-authors of Baodian Wei

This figure shows the co-authorship network connecting the top 25 collaborators of Baodian Wei. A scholar is included among the top collaborators of Baodian Wei based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Baodian Wei. Baodian Wei is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Wang, Qianfan, et al.. (2024). Quasi-OSD of Binary Image of RS Codes with Applications to JSCC. 3576–3581. 7 indexed citations
2.
Wei, Baodian, et al.. (2021). Systematic Convolutional Low Density Generator Matrix Code. IEEE Transactions on Information Theory. 67(6). 3752–3764. 11 indexed citations
3.
Ma, Xiao, et al.. (2019). Statistical Learning Aided Decoding of BMST Tail-Biting Convolutional Code. 1352–1356. 4 indexed citations
4.
Wei, Baodian, et al.. (2018). Coding Theorem for Systematic LDGM Codes Under List Decoding. 1–5. 3 indexed citations
5.
Tian, Haibo, et al.. (2017). Proxy re-designated verifier signature and its applications. International Journal of Embedded Systems. 9(6). 535–535. 1 indexed citations
6.
Wei, Baodian, et al.. (2017). Proxy re-designated verifier signature and its applications. International Journal of Embedded Systems. 9(6). 535–535.
7.
Tian, Haibo, Fangguo Zhang, & Baodian Wei. (2016). A lattice‐based partially blind signature. Security and Communication Networks. 9(12). 1820–1828. 10 indexed citations
8.
Tian, Haibo, Xiaofeng Chen, Baodian Wei, & Yi Liu. (2013). Security Analysis of a Suite of Deniable Authentication Protocols. International journal of network security. 15. 384–389. 2 indexed citations
9.
Tian, Haibo, Xiaofeng Chen, Fangguo Zhang, et al.. (2013). A non-delegatable strong designated verifier signature in ID-based setting for mobile environment. Mathematical and Computer Modelling. 58(5-6). 1289–1300. 10 indexed citations
10.
Tian, Haibo, Fangguo Zhang, Xiaofeng Chen, & Baodian Wei. (2013). Selectively unforgeable but existentially forgeable signature schemes and applications. Science China Information Sciences. 56(1). 1–14. 2 indexed citations
11.
Gao, Chong, Dongqing Xie, Jin Li, Baodian Wei, & Haibo Tian. (2012). Deniably Information-Hiding Encryptions Secure against Adaptive Chosen Ciphertext Attack. 1462. 377–384. 2 indexed citations
12.
Wei, Baodian, Fangguo Zhang, & Xiaofeng Chen. (2010). Efficient Online/Offline Signcryption Scheme. Intelligent Automation & Soft Computing. 16(3). 449–459. 1 indexed citations
13.
Chen, Xiaofeng, Guomin Chen, Fangguo Zhang, Baodian Wei, & Yi Mu. (2009). Identity-based Universal Designated Verifier Signature Proof System. International journal of network security. 8. 52–58. 8 indexed citations
14.
Wang, Xinmei, et al.. (2009). An Efficient and Deterministic Algorithm to Determine Irreducible and Primitive Polynomials over Finite Fields. Acta Scientiarum Naturalium Universitatis Sunyatseni. 48(1). 6. 2 indexed citations
15.
Wei, Baodian, et al.. (2009). An improved MFE scheme resistant against SOLE attacks. 3352. 157–160. 1 indexed citations
16.
Wei, Baodian, Fangguo Zhang, & Xiaofeng Chen. (2008). A New Type of Designated Confirmer Signatures for a Group of Individuals. International journal of network security. 7. 293–300. 3 indexed citations
17.
Chen, Xiaofeng, Fangguo Zhang, Haibo Tian, et al.. (2008). Efficient generic on-line/off-line (threshold) signatures without key exposure. Information Sciences. 178(21). 4192–4203. 38 indexed citations
18.
Liu, Jingmei, et al.. (2005). An AES S-Box to Increase Complexity and Cryptographic Analysis. 1. 724–728. 41 indexed citations
19.
Wei, Baodian. (2004). Analysis of the cryptographic properties of the AES S-box. 3 indexed citations
20.
Wei, Baodian & Jingwei Liu. (2004). The NESSIE block ciphers and their security.

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026