Caixue Zhou

464 total citations
31 papers, 367 citations indexed

About

Caixue Zhou is a scholar working on Artificial Intelligence, Information Systems and Computational Theory and Mathematics. According to data from OpenAlex, Caixue Zhou has authored 31 papers receiving a total of 367 indexed citations (citations by other indexed papers that have themselves been cited), including 24 papers in Artificial Intelligence, 11 papers in Information Systems and 11 papers in Computational Theory and Mathematics. Recurrent topics in Caixue Zhou's work include Cryptography and Data Security (22 papers), Complexity and Algorithms in Graphs (11 papers) and Cloud Data Security Solutions (9 papers). Caixue Zhou is often cited by papers focused on Cryptography and Data Security (22 papers), Complexity and Algorithms in Graphs (11 papers) and Cloud Data Security Solutions (9 papers). Caixue Zhou collaborates with scholars based in China, United States and Japan. Caixue Zhou's co-authors include Guangyong Gao, Xingming Sun, Xiwei Dong, Yue Zhang, Lihua Wang, Zongda Wu, Lifen Zhang, Ying Xia and Yun-Qing Shi and has published in prestigious journals such as Information Sciences, Knowledge-Based Systems and IEEE Transactions on Information Forensics and Security.

In The Last Decade

Caixue Zhou

31 papers receiving 351 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Caixue Zhou China 10 224 122 115 115 45 31 367
Huixian Li China 11 219 1.0× 123 1.0× 140 1.2× 51 0.4× 38 0.8× 45 311
Fuyou Miao China 9 196 0.9× 85 0.7× 85 0.7× 98 0.9× 29 0.6× 60 311
Lunzhi Deng China 12 312 1.4× 171 1.4× 191 1.7× 63 0.5× 70 1.6× 75 432
Yitao Chen China 8 252 1.1× 287 2.4× 237 2.1× 83 0.7× 24 0.5× 30 423
Zhi Hu China 8 200 0.9× 81 0.7× 168 1.5× 62 0.5× 14 0.3× 21 283
David Jao Canada 8 341 1.5× 62 0.5× 247 2.1× 121 1.1× 40 0.9× 16 463
Amparo Fúster-Sabater Spain 9 174 0.8× 80 0.7× 26 0.2× 99 0.9× 92 2.0× 48 276
Erdem Alkım Türkiye 8 297 1.3× 41 0.3× 101 0.9× 98 0.9× 42 0.9× 16 364
Ayaz Hassan Moon India 8 55 0.2× 101 0.8× 81 0.7× 122 1.1× 18 0.4× 23 261
Anand Desai India 2 269 1.2× 108 0.9× 83 0.7× 108 0.9× 26 0.6× 2 331

Countries citing papers authored by Caixue Zhou

Since Specialization
Citations

This map shows the geographic impact of Caixue Zhou's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Caixue Zhou with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Caixue Zhou more than expected).

Fields of papers citing papers by Caixue Zhou

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Caixue Zhou. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Caixue Zhou. The network helps show where Caixue Zhou may publish in the future.

Co-authorship network of co-authors of Caixue Zhou

This figure shows the co-authorship network connecting the top 25 collaborators of Caixue Zhou. A scholar is included among the top collaborators of Caixue Zhou based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Caixue Zhou. Caixue Zhou is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Zhou, Caixue. (2020). Security Analysis of a Certi cateless Public Provable Data Possession Scheme with Privacy Preserving for Cloud-Based Smart Grid Data Management System.. Int. J. Netw. Secur.. 22. 584–588. 1 indexed citations
2.
Zhou, Caixue. (2019). An improved lightweight certificateless generalized signcryption scheme for mobile-health system. International Journal of Distributed Sensor Networks. 15(1). 812235214–812235214. 34 indexed citations
3.
Gao, Guangyong, et al.. (2018). Blind Reversible Authentication Based on PEE and CS Reconstruction. IEEE Signal Processing Letters. 25(7). 1099–1103. 11 indexed citations
4.
Zhou, Caixue, et al.. (2018). A Provable Secure Identity-based Generalized Proxy Signcryption Scheme.. Int. J. Netw. Secur.. 20. 1183–1193. 6 indexed citations
5.
Zhang, Lifen, et al.. (2018). An Efficient Feature Extraction Scheme for Mobile Anti-Shake in Augmented Reality. Tehnicki vjesnik - Technical Gazette. 25(4). 1 indexed citations
6.
Gao, Guangyong, et al.. (2017). Reversible data hiding with contrast enhancement and tamper localization for medical images. Information Sciences. 385-386. 250–265. 80 indexed citations
7.
Gao, Guangyong, et al.. (2017). Improved sparsity adaptive matching pursuit algorithm. 28. 1761–1766. 5 indexed citations
8.
Gao, Guangyong, et al.. (2016). Reversible authentication scheme based on prediction-error expansion with compound symbolic chaos. 2169–2174. 2 indexed citations
9.
Zhou, Caixue, et al.. (2016). Certificate‐based signature scheme in the standard model. IET Information Security. 11(5). 256–260. 5 indexed citations
10.
Wu, Zongda, et al.. (2016). An efficient subscription index for publication matching in the cloud. Knowledge-Based Systems. 110. 110–120. 6 indexed citations
11.
Zhou, Caixue, et al.. (2016). Certificateless Signcryption in the Standard Model. Wireless Personal Communications. 92(2). 495–513. 23 indexed citations
12.
Gao, Guangyong, et al.. (2016). Reversible Watermarking with Adaptive Embedding Threshold Matrix. KSII Transactions on Internet and Information Systems. 10(9). 1 indexed citations
13.
Gao, Guangyong, et al.. (2015). Reversible Watermarking Using Prediction-Error Expansion and Extreme Learning Machine. Mathematical Problems in Engineering. 2015. 1–12. 1 indexed citations
14.
Zhou, Caixue. (2015). An Improved Multi-Receiver Generalized Signcryption Scheme. International journal of network security. 17(3). 340–350. 9 indexed citations
15.
Xia, Ying, et al.. (2015). Lightweight Data Storage Based on Secret Sharing for Cloud Data. 99. 264–267. 1 indexed citations
16.
Zhou, Caixue. (2015). An Improved ID-based Proxy Signature Scheme with Message Recovery. International Journal of Security and Its Applications. 9(9). 151–164. 4 indexed citations
17.
Zhou, Caixue. (2014). Attacks on a strong designated verifier proxy signature scheme. Advanced science and technology letters. 7–12. 1 indexed citations
18.
19.
Zhou, Caixue. (2014). Improvement on Lin et al's Strong Designated Verifier Proxy Signature Scheme for Electronic Commerce. International Journal of Security and Its Applications. 8(5). 333–348. 1 indexed citations
20.
Zhou, Caixue. (2013). Improved certificateless hybrid signcryption scheme. Jisuanji yingyong yanjiu. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026