Boyang Wang

3.3k total citations · 1 hit paper
73 papers, 2.0k citations indexed

About

Boyang Wang is a scholar working on Artificial Intelligence, Information Systems and Signal Processing. According to data from OpenAlex, Boyang Wang has authored 73 papers receiving a total of 2.0k indexed citations (citations by other indexed papers that have themselves been cited), including 58 papers in Artificial Intelligence, 21 papers in Information Systems and 16 papers in Signal Processing. Recurrent topics in Boyang Wang's work include Cryptography and Data Security (35 papers), Privacy-Preserving Technologies in Data (29 papers) and Internet Traffic Analysis and Secure E-voting (15 papers). Boyang Wang is often cited by papers focused on Cryptography and Data Security (35 papers), Privacy-Preserving Technologies in Data (29 papers) and Internet Traffic Analysis and Secure E-voting (15 papers). Boyang Wang collaborates with scholars based in United States, China and Canada. Boyang Wang's co-authors include Baochun Li, Hui Li, Ming Li, Hui Li, Yuqing Zhang, Xuefeng Liu, Haitao Wang, Jingbo Yan, Fenghua Li and Yantian Hou and has published in prestigious journals such as Optics Letters, IEEE Access and Applied Soft Computing.

In The Last Decade

Boyang Wang

67 papers receiving 1.8k citations

Hit Papers

Oruta: privacy-preserving public auditing for shared data... 2014 2026 2018 2022 2014 100 200 300

Peers

Boyang Wang
Stephen Tu United States
Michael Naehrig United States
John Bethencourt United States
Boyang Wang
Citations per year, relative to Boyang Wang Boyang Wang (= 1×) peers Chunxiang Xu

Countries citing papers authored by Boyang Wang

Since Specialization
Citations

This map shows the geographic impact of Boyang Wang's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Boyang Wang with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Boyang Wang more than expected).

Fields of papers citing papers by Boyang Wang

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Boyang Wang. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Boyang Wang. The network helps show where Boyang Wang may publish in the future.

Co-authorship network of co-authors of Boyang Wang

This figure shows the co-authorship network connecting the top 25 collaborators of Boyang Wang. A scholar is included among the top collaborators of Boyang Wang based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Boyang Wang. Boyang Wang is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Li, Xiaolin, Ninghui Li, Boyang Wang, & Wenhai Sun. (2025). Mitigating Data Poisoning Attacks to Local Differential Privacy. 1230–1244.
2.
Wang, Ziyi, Peng Luo, Mingming Xiao, et al.. (2024). Recover then aggregate: unified cross-modal deep clustering with global structural information for single-cell data. Briefings in Bioinformatics. 25(6). 1 indexed citations
3.
Câmpan, Alina, et al.. (2024). Search and Retrieval in Semantic-Structural Representations of Novel Malware. 4(1). 2052–2076. 1 indexed citations
5.
Yang, Jian, Jiaheng Liu, Boyang Wang, et al.. (2024). LogFormer: A Pre-train and Tuning Pipeline for Log Anomaly Detection. Proceedings of the AAAI Conference on Artificial Intelligence. 38(1). 135–143. 13 indexed citations
6.
Liu, Bingsheng, Boyang Wang, Yinghua Shen, Witold Pedrycz, & Yuan Chen. (2023). Granular fuzzy rule-based model construction under the collaboration of multiple organizations. Applied Soft Computing. 152. 111191–111191. 5 indexed citations
7.
Wang, Boyang, et al.. (2023). FastReach: A system for privacy-preserving reachability queries over location data. Computers & Security. 135. 103513–103513. 1 indexed citations
8.
Wang, Boyang, et al.. (2023). Portability of Deep-Learning Side-Channel Attacks against Software Discrepancies. 227–238. 4 indexed citations
9.
Wang, Boyang, et al.. (2023). Design and Implementation of Machine Vision Experiment Platform for Virtual Production Line. 28. 452–460. 1 indexed citations
10.
Cho, Daniel, et al.. (2023). EvilELF: Evasion Attacks on Deep-Learning Malware Detection over ELF Files. 1702–1709. 1 indexed citations
11.
12.
Niu, Ben, et al.. (2021). AdaPDP: Adaptive Personalized Differential Privacy. 1–10. 26 indexed citations
13.
14.
Chi, Xiao, et al.. (2020). SPMSM sensorless control of a new non-singular fast terminal sliding mode speed controller. Systems Science & Control Engineering. 9(sup2). 102–111. 1 indexed citations
15.
Niu, Ben, et al.. (2020). Utility-aware Exponential Mechanism for Personalized Differential Privacy. 1–6. 15 indexed citations
16.
Wang, Boyang, Ming Li, & Li Xiong. (2017). FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data. IEEE Transactions on Dependable and Secure Computing. 16(2). 245–258. 53 indexed citations
17.
Wang, Boyang, Hui Li, Xuefeng Liu, Xiaoqing Li, & Fenghua Li. (2013). Preserving identity privacy on multi‐owner cloud data during public verification. Security and Communication Networks. 7(11). 2104–2113. 4 indexed citations
18.
Wang, Boyang, Sherman S. M. Chow, Ming Li, & Hui Li. (2013). Storing Shared Data on the Cloud via Security-Mediator. 124–133. 69 indexed citations
19.
Wang, Boyang, Hui Li, & Jin Cao. (2012). An efficient MAC scheme for secure network coding with probabilistic detection. Frontiers of Computer Science. 2 indexed citations
20.
Wang, Boyang, Baochun Li, & Hui Li. (2012). Gmatch: Secure and privacy-preserving group matching in social networks. 726–731. 8 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026