Chan Yeob Yeun

4.1k total citations · 1 hit paper
168 papers, 2.3k citations indexed

About

Chan Yeob Yeun is a scholar working on Computer Networks and Communications, Artificial Intelligence and Information Systems. According to data from OpenAlex, Chan Yeob Yeun has authored 168 papers receiving a total of 2.3k indexed citations (citations by other indexed papers that have themselves been cited), including 70 papers in Computer Networks and Communications, 69 papers in Artificial Intelligence and 57 papers in Information Systems. Recurrent topics in Chan Yeob Yeun's work include Cryptography and Data Security (29 papers), Advanced Authentication Protocols Security (23 papers) and Advanced Malware Detection Techniques (23 papers). Chan Yeob Yeun is often cited by papers focused on Cryptography and Data Security (29 papers), Advanced Authentication Protocols Security (23 papers) and Advanced Malware Detection Techniques (23 papers). Chan Yeob Yeun collaborates with scholars based in United Arab Emirates, South Korea and United Kingdom. Chan Yeob Yeun's co-authors include Ernesto Damiani, Mohamed Jamal Zemerly, Hussam Al Hamadi, Paul D. Yoo, Dina Shehada, Song-Kyoo Kim, Mahmoud Al‐Qutayri, Zhibo Zhang, Kyusuk Han and Yousof Al-Hammadi and has published in prestigious journals such as Scientific Reports, Cement and Concrete Research and IEEE Communications Surveys & Tutorials.

In The Last Decade

Chan Yeob Yeun

151 papers receiving 2.2k citations

Hit Papers

Explainable Artificial Intelligence Applications in Cyber... 2022 2026 2023 2024 2022 50 100 150

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Chan Yeob Yeun United Arab Emirates 29 953 836 778 312 255 168 2.3k
Roobaea Alroobaea Saudi Arabia 27 666 0.7× 508 0.6× 661 0.8× 304 1.0× 232 0.9× 194 2.3k
Guangquan Xu China 26 991 1.0× 1.1k 1.3× 732 0.9× 307 1.0× 295 1.2× 113 2.1k
Md. Abdur Rahman Saudi Arabia 24 1.1k 1.2× 831 1.0× 704 0.9× 391 1.3× 149 0.6× 149 2.7k
Uttam Ghosh United States 29 1.5k 1.5× 993 1.2× 867 1.1× 599 1.9× 194 0.8× 172 3.1k
Subhi R. M. Zeebaree Iraq 34 1.2k 1.2× 1.5k 1.8× 790 1.0× 412 1.3× 287 1.1× 177 3.3k
Manju Khari India 26 897 0.9× 519 0.6× 613 0.8× 275 0.9× 366 1.4× 132 2.3k
M. Shamim Hossain Saudi Arabia 35 1.3k 1.4× 837 1.0× 815 1.0× 524 1.7× 248 1.0× 100 3.4k
Shamsul Huda Australia 26 925 1.0× 651 0.8× 817 1.1× 173 0.6× 676 2.7× 82 2.2k
Zahid Halim Pakistan 26 514 0.5× 414 0.5× 849 1.1× 235 0.8× 262 1.0× 119 2.2k
Omar Cheikhrouhou Tunisia 32 1.4k 1.5× 781 0.9× 638 0.8× 595 1.9× 221 0.9× 122 2.8k

Countries citing papers authored by Chan Yeob Yeun

Since Specialization
Citations

This map shows the geographic impact of Chan Yeob Yeun's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Chan Yeob Yeun with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Chan Yeob Yeun more than expected).

Fields of papers citing papers by Chan Yeob Yeun

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Chan Yeob Yeun. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Chan Yeob Yeun. The network helps show where Chan Yeob Yeun may publish in the future.

Co-authorship network of co-authors of Chan Yeob Yeun

This figure shows the co-authorship network connecting the top 25 collaborators of Chan Yeob Yeun. A scholar is included among the top collaborators of Chan Yeob Yeun based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Chan Yeob Yeun. Chan Yeob Yeun is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Anisetti, Marco, et al.. (2025). Protecting machine learning from poisoning attacks: A risk-based approach. Computers & Security. 155. 104468–104468. 2 indexed citations
2.
Lezzi, Marianna, et al.. (2025). A Systematic Literature Review on AI-Based Cybersecurity in Nuclear Power Plants. Journal of Cybersecurity and Privacy. 5(4). 79–79.
3.
Han, Kyusuk, et al.. (2024). Privacy enhanced data aggregation based on federated learning in Internet of Vehicles (IoV). Computer Communications. 223. 15–25. 5 indexed citations
4.
Yeun, Chan Yeob, et al.. (2024). Automated Welder Safety Assurance: A YOLOv3-Based Approach for Real-Time Detection of Welding Helmet Availability. IEEE Access. 13. 2187–2202. 2 indexed citations
5.
Han, Kyusuk, et al.. (2024). Emerging Blockchain and Reputation Management in Federated Learning: Enhanced Security and Reliability for Internet of Vehicles (IoV). IEEE Transactions on Vehicular Technology. 74(2). 1893–1908. 5 indexed citations
6.
Abbas, Sagheer, Shabib Aftab, Muhammad Adnan Khan, et al.. (2023). Data and Ensemble Machine Learning Fusion Based Intelligent Software Defect Prediction System. Computers, materials & continua/Computers, materials & continua (Print). 75(3). 6083–6100. 12 indexed citations
7.
Zhang, Zhibo, et al.. (2023). Explainable Data Poison Attacks on Human Emotion Evaluation Systems Based on EEG Signals. IEEE Access. 11. 18134–18147. 10 indexed citations
8.
Aftab, Shabib, Sagheer Abbas, Taher M. Ghazal, et al.. (2023). A Cloud-Based Software Defect Prediction System Using Data and Decision-Level Machine Learning Fusion. Mathematics. 11(3). 632–632. 14 indexed citations
9.
Zhang, Zhibo, et al.. (2023). A Robust Adversary Detection-Deactivation Method for Metaverse-Oriented Collaborative Deep Learning. IEEE Sensors Journal. 24(14). 22011–22022. 13 indexed citations
10.
11.
Yeun, Chan Yeob, et al.. (2022). Blockchain Interoperability in Unmanned Aerial Vehicles Networks: State-of-the-Art and Open Issues. IEEE Access. 10. 14463–14479. 48 indexed citations
12.
Yeun, Chan Yeob, et al.. (2022). Enhanced Inf-TESLA Protocol: A Continuous Connectivity and Low Overhead Authentication Protocol via IoT Devices. IEEE Access. 10. 54912–54921. 4 indexed citations
13.
Lee, Dong Kun, Chan Yeob Yeun, Ernesto Damiani, et al.. (2020). Novel EEG Sensor-Based Risk Framework for the Detection of Insider Threats in Safety Critical Industrial Infrastructure. IEEE Access. 8. 206222–206234. 18 indexed citations
14.
Kim, Song-Kyoo, Chan Yeob Yeun, Ernesto Damiani, & Nai‐Wei Lo. (2019). A Machine Learning Framework for Biometric Authentication Using Electrocardiogram. IEEE Access. 7. 94858–94868. 49 indexed citations
15.
Kim, Song-Kyoo, Chan Yeob Yeun, & Paul D. Yoo. (2019). An Enhanced Machine Learning-Based Biometric Authentication System Using RR-Interval Framed Electrocardiograms. IEEE Access. 7. 168669–168674. 60 indexed citations
16.
Yeun, Chan Yeob, et al.. (2012). A new lightweight hybrid cryptographic algorithm for the internet of things. International Conference for Internet Technology and Secured Transactions. 87–92. 25 indexed citations
17.
Yeun, Chan Yeob, et al.. (2011). Understanding the security challenges of virtualized environments. International Conference for Internet Technology and Secured Transactions. 67–72. 3 indexed citations
18.
Baek, Joonsang, et al.. (2011). The use of Boolean functions in stream ciphers. International Conference for Internet Technology and Secured Transactions. 29–33. 1 indexed citations
19.
Yeun, Chan Yeob, et al.. (2010). Cloud computing security management. 1–7. 73 indexed citations
20.
Yeun, Chan Yeob, et al.. (2010). Enhancement of anonymous authentication scheme in wireless sensor network. International Conference for Internet Technology and Secured Transactions. 1–4. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026