Guomin Yang

6.0k total citations
130 papers, 3.3k citations indexed

About

Guomin Yang is a scholar working on Artificial Intelligence, Information Systems and Computer Networks and Communications. According to data from OpenAlex, Guomin Yang has authored 130 papers receiving a total of 3.3k indexed citations (citations by other indexed papers that have themselves been cited), including 118 papers in Artificial Intelligence, 61 papers in Information Systems and 39 papers in Computer Networks and Communications. Recurrent topics in Guomin Yang's work include Cryptography and Data Security (104 papers), Privacy-Preserving Technologies in Data (55 papers) and Advanced Authentication Protocols Security (33 papers). Guomin Yang is often cited by papers focused on Cryptography and Data Security (104 papers), Privacy-Preserving Technologies in Data (55 papers) and Advanced Authentication Protocols Security (33 papers). Guomin Yang collaborates with scholars based in Australia, China and Singapore. Guomin Yang's co-authors include Willy Susilo, Yi Mu, Duncan S. Wong, Fuchun Guo, Rongmao Chen, Qiong Huang, Xiaotie Deng, Tran Viet Xuan Phuong, Xiaofen Wang and Man Ho Au and has published in prestigious journals such as SHILAP Revista de lepidopterología, IEEE Transactions on Information Theory and IEEE Access.

In The Last Decade

Guomin Yang

121 papers receiving 3.2k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Guomin Yang Australia 32 2.6k 2.0k 1.1k 411 326 130 3.3k
Kaitai Liang China 29 2.3k 0.9× 1.9k 0.9× 774 0.7× 274 0.7× 362 1.1× 106 3.1k
Masahiro Mambo Japan 14 1.4k 0.6× 1.2k 0.6× 1.2k 1.1× 315 0.8× 246 0.8× 71 2.3k
Reza Curtmola United States 20 3.7k 1.4× 3.2k 1.6× 1.4k 1.3× 354 0.9× 450 1.4× 64 5.0k
Yinbin Miao China 33 2.9k 1.1× 1.6k 0.8× 738 0.7× 292 0.7× 609 1.9× 166 3.6k
Shai Halevi United States 23 2.3k 0.9× 1.2k 0.6× 765 0.7× 600 1.5× 386 1.2× 59 2.7k
Chunxiang Xu China 28 2.2k 0.8× 1.9k 1.0× 664 0.6× 181 0.4× 304 0.9× 154 2.8k
Juan A. Garay United States 23 2.6k 1.0× 1.2k 0.6× 1.7k 1.6× 625 1.5× 502 1.5× 87 3.7k
John Bethencourt United States 8 3.5k 1.3× 2.0k 1.0× 659 0.6× 636 1.5× 242 0.7× 10 3.8k
Huaxiong Wang Singapore 24 1.5k 0.6× 858 0.4× 628 0.6× 309 0.8× 381 1.2× 144 2.0k
Sherman S. M. Chow Hong Kong 24 2.8k 1.1× 2.1k 1.0× 697 0.7× 344 0.8× 303 0.9× 100 3.3k

Countries citing papers authored by Guomin Yang

Since Specialization
Citations

This map shows the geographic impact of Guomin Yang's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Guomin Yang with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Guomin Yang more than expected).

Fields of papers citing papers by Guomin Yang

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Guomin Yang. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Guomin Yang. The network helps show where Guomin Yang may publish in the future.

Co-authorship network of co-authors of Guomin Yang

This figure shows the co-authorship network connecting the top 25 collaborators of Guomin Yang. A scholar is included among the top collaborators of Guomin Yang based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Guomin Yang. Guomin Yang is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Xu, Shengmin, et al.. (2025). Enhancing Secure Cloud Data Sharing: Dynamic User Groups and Outsourced Decryption. IEEE Transactions on Dependable and Secure Computing. 22(6). 7971–7984.
2.
Sun, Jianfei, Guowen Xu, Yang Yang, et al.. (2025). Forward-Secure Hierarchical Delegable Signature for Smart Homes. IEEE Transactions on Information Forensics and Security. 20. 3950–3965. 1 indexed citations
3.
Hu, Donghui, et al.. (2024). Secure and Flexible Wildcard Queries. IEEE Transactions on Information Forensics and Security. 19. 7374–7388. 3 indexed citations
4.
Shen, Jiachen, Zhenfu Cao, Xiaolei Dong, et al.. (2024). OpenVFL: A Vertical Federated Learning Framework With Stronger Privacy-Preserving. IEEE Transactions on Information Forensics and Security. 19. 9670–9681. 4 indexed citations
5.
Wu, Tong, et al.. (2023). Toward Fine-Grained Task Allocation With Bilateral Access Control for Intelligent Transportation Systems. IEEE Internet of Things Journal. 11(8). 14814–14828. 8 indexed citations
6.
Zhang, Chuan, et al.. (2023). Blockchain-Based Dynamic Time-Encapsulated Data Auditing for Outsourcing Storage. IEEE Transactions on Information Forensics and Security. 19. 1979–1993. 11 indexed citations
7.
Saifullah, Yasir, Guomin Yang, & Xu Feng. (2021). A Four-leaf Clover-shaped Coding Metasurface For Ultra-wideband Diffusion-like Scattering. SHILAP Revista de lepidopterología. 6 indexed citations
8.
Wang, Xuan, Willy Susilo, Guomin Yang, et al.. (2021). Efficient maliciously secure two-party mixed-protocol framework for data-driven computation tasks. Computer Standards & Interfaces. 80. 103571–103571. 2 indexed citations
9.
Liu, Zhen, Guomin Yang, Duncan S. Wong, et al.. (2021). Secure Deterministic Wallet and Stealth Address: Key-Insulated and Privacy-Preserving Signature Scheme With Publicly Derived Public Key. IEEE Transactions on Dependable and Secure Computing. 19(5). 2934–2951. 5 indexed citations
10.
Li, Yannan, Willy Susilo, Guomin Yang, et al.. (2020). A Blockchain-Based Self-Tallying Voting Protocol in Decentralized IoT. IEEE Transactions on Dependable and Secure Computing. 19(1). 119–130. 77 indexed citations
11.
Li, Yannan, Guomin Yang, Willy Susilo, et al.. (2020). Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability. IEEE Transactions on Dependable and Secure Computing. 18(2). 679–691. 86 indexed citations
12.
Wu, Tong, Guomin Yang, Yi Mu, Rongmao Chen, & Shengmin Xu. (2020). Privacy-enhanced remote data integrity checking with updatable timestamp. Information Sciences. 527. 210–226. 11 indexed citations
13.
Huang, Ke, Xiaosong Zhang, Xiaofen Wang, et al.. (2020). HUCDO. ACM Transactions on Cyber-Physical Systems. 4(3). 1–23. 4 indexed citations
14.
Huang, Ke, Xiaosong Zhang, Yi Mu, et al.. (2019). Building Redactable Consortium Blockchain for Industrial Internet-of-Things. IEEE Transactions on Industrial Informatics. 15(6). 3670–3679. 85 indexed citations
15.
Wu, Tong, Guomin Yang, Yi Mu, Fuchun Guo, & Robert H. Deng. (2019). Privacy-Preserving Proof of Storage for the Pay-As-You-Go Business Model. IEEE Transactions on Dependable and Secure Computing. 18(2). 563–575. 16 indexed citations
16.
Xu, Shengmin, Guomin Yang, Yi Mu, & Robert H. Deng. (2018). Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in the Cloud. IEEE Transactions on Information Forensics and Security. 13(8). 2101–2113. 83 indexed citations
17.
Yang, Guomin, et al.. (2018). Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage. IEEE Transactions on Dependable and Secure Computing. 17(6). 1322–1332. 69 indexed citations
18.
Yu, Yong, et al.. (2017). Attribute-Based Cloud Data Integrity Auditing for Secure Outsourced Storage. IEEE Transactions on Emerging Topics in Computing. 8(2). 377–390. 75 indexed citations
19.
Munilla, Jorge, Mike Burmester, Alberto Peinado, Guomin Yang, & Willy Susilo. (2016). RFID Ownership Transfer with Positive Secrecy Capacity Channels. Sensors. 17(1). 53–53. 4 indexed citations
20.
Chen, Rongmao, Yi Mu, Guomin Yang, et al.. (2016). Server-Aided Public Key Encryption With Keyword Search. IEEE Transactions on Information Forensics and Security. 11(12). 2833–2842. 150 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026