Baodong Qin

1.6k total citations
63 papers, 863 citations indexed

About

Baodong Qin is a scholar working on Artificial Intelligence, Information Systems and Computational Theory and Mathematics. According to data from OpenAlex, Baodong Qin has authored 63 papers receiving a total of 863 indexed citations (citations by other indexed papers that have themselves been cited), including 59 papers in Artificial Intelligence, 18 papers in Information Systems and 17 papers in Computational Theory and Mathematics. Recurrent topics in Baodong Qin's work include Cryptography and Data Security (51 papers), Cryptographic Implementations and Security (23 papers) and Privacy-Preserving Technologies in Data (18 papers). Baodong Qin is often cited by papers focused on Cryptography and Data Security (51 papers), Cryptographic Implementations and Security (23 papers) and Privacy-Preserving Technologies in Data (18 papers). Baodong Qin collaborates with scholars based in China, Singapore and Australia. Baodong Qin's co-authors include Ximeng Liu, Robert H. Deng, Rongxing Lu, Jianfeng Ma, Shengli Liu, Siqi Ma, Le Chen, Dong Zheng, Yu Chen and Qiong Huang and has published in prestigious journals such as IEEE Access, Sensors and Information Sciences.

In The Last Decade

Baodong Qin

55 papers receiving 830 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Baodong Qin China 15 744 405 146 129 104 63 863
Joppe W. Bos Belgium 11 584 0.8× 269 0.7× 73 0.5× 146 1.1× 98 0.9× 30 672
Junzuo Lai China 15 1.0k 1.4× 664 1.6× 242 1.7× 69 0.5× 131 1.3× 46 1.1k
Hui Cui Australia 16 579 0.8× 489 1.2× 89 0.6× 76 0.6× 172 1.7× 57 768
Bharath K. Samanthula United States 10 521 0.7× 232 0.6× 65 0.4× 75 0.6× 96 0.9× 45 649
Shengmin Xu China 18 881 1.2× 647 1.6× 68 0.5× 72 0.6× 195 1.9× 53 1.1k
Yousef Elmehdwi United States 5 428 0.6× 188 0.5× 49 0.3× 85 0.7× 67 0.6× 5 518
Geong Sen Poh Malaysia 11 454 0.6× 309 0.8× 73 0.5× 97 0.8× 176 1.7× 25 603
Xuexian Hu China 15 467 0.6× 536 1.3× 45 0.3× 129 1.0× 356 3.4× 46 774
Huixian Shi China 7 278 0.4× 462 1.1× 62 0.4× 36 0.3× 261 2.5× 15 577

Countries citing papers authored by Baodong Qin

Since Specialization
Citations

This map shows the geographic impact of Baodong Qin's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Baodong Qin with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Baodong Qin more than expected).

Fields of papers citing papers by Baodong Qin

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Baodong Qin. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Baodong Qin. The network helps show where Baodong Qin may publish in the future.

Co-authorship network of co-authors of Baodong Qin

This figure shows the co-authorship network connecting the top 25 collaborators of Baodong Qin. A scholar is included among the top collaborators of Baodong Qin based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Baodong Qin. Baodong Qin is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Gao, Wen, et al.. (2025). Logarithmic identity-based ring signature over lattices and linkable variant. Computer Standards & Interfaces. 95. 104036–104036.
2.
Gao, Wen, et al.. (2025). Lattice-Based Group Signature with VLR for Anonymous Medical Service Evaluation System. Electronics. 14(4). 680–680. 2 indexed citations
3.
Yu, Jinxia, et al.. (2024). Flexible Threshold Quantum Homomorphic Encryption on Quantum Networks. Entropy. 27(1). 7–7.
4.
6.
Zhang, Haoyu, et al.. (2023). Registered Keyword Searchable Encryption Based on SM9. Applied Sciences. 13(5). 3226–3226. 2 indexed citations
7.
Qin, Baodong, et al.. (2023). Privacy-Preserving Decision-Tree Evaluation with Low Complexity for Communication. Sensors. 23(5). 2624–2624. 4 indexed citations
8.
Cui, Hui, Xuechao Yang, Wencheng Yang, Baodong Qin, & Xun Yi. (2023). Token-Based Biometric Enhanced Key Derivation for Authentication Over Wireless Networks. IEEE Transactions on Network Science and Engineering. 10(4). 2347–2357. 1 indexed citations
9.
Zhang, Haoyu, et al.. (2023). Data Secure De-Duplication and Recovery Based on Public Key Encryption With Keyword Search. IEEE Access. 11. 28688–28698. 1 indexed citations
10.
Qin, Baodong, et al.. (2022). Generic Construction of Forward-Secure Revocable Identity-Based Signature and Lattice-Based Instantiations. Security and Communication Networks. 2022. 1–12.
11.
Zhao, Yanqi, et al.. (2021). Blockchain-Based Auditable Privacy-Preserving Data Classification for Internet of Things. IEEE Internet of Things Journal. 9(4). 2468–2484. 18 indexed citations
12.
Qin, Baodong, Ximeng Liu, Wei Zhuo, & Dong Zheng. (2020). Space efficient revocable IBE for mobile devices in cloud computing. Science China Information Sciences. 63(3). 3 indexed citations
13.
Zhao, Qinglan, et al.. (2019). A QR Code Secret Hiding Scheme against Contrast Analysis Attack for the Internet of Things. Security and Communication Networks. 2019. 1–8. 5 indexed citations
14.
Han, Gang, et al.. (2018). Chameleon all-but-one extractable hash proof and its applications. Science China Information Sciences. 61(9). 1 indexed citations
15.
Han, Shuai, Shengli Liu, Baodong Qin, & Dawu Gu. (2017). Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness. Designs Codes and Cryptography. 86(3). 517–554. 2 indexed citations
16.
Wang, Huige, et al.. (2017). LR-RRA-CCA secure functional encryption for randomized functionalities from trapdoor HPS and LAF. Science China Information Sciences. 61(5). 3 indexed citations
17.
Chen, Kefei, et al.. (2016). A new construction on randomized message-locked encryption in the standard model via UCEs. Science China Information Sciences. 60(5). 7 indexed citations
18.
Liu, Ximeng, Baodong Qin, Robert H. Deng, & Yingjiu Li. (2015). An Efficient Privacy-Preserving Outsourced Computation over Public Data. IEEE Transactions on Services Computing. 10(5). 756–770. 36 indexed citations
19.
Qin, Baodong, Robert H. Deng, Shengli Liu, & Siqi Ma. (2015). Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption. IEEE Transactions on Information Forensics and Security. 10(7). 1384–1393. 153 indexed citations
20.
Li, Ming, Baodong Qin, Fanyu Kong, & Daxing Li. (2007). Further Cryptanalysis of a CRT-RSA Algorithm at CCS 2003. 1233. 72–76. 4 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026