Hequn Xian

667 total citations
36 papers, 401 citations indexed

About

Hequn Xian is a scholar working on Artificial Intelligence, Information Systems and Computer Networks and Communications. According to data from OpenAlex, Hequn Xian has authored 36 papers receiving a total of 401 indexed citations (citations by other indexed papers that have themselves been cited), including 23 papers in Artificial Intelligence, 20 papers in Information Systems and 11 papers in Computer Networks and Communications. Recurrent topics in Hequn Xian's work include Cryptography and Data Security (15 papers), Cloud Data Security Solutions (11 papers) and Privacy-Preserving Technologies in Data (9 papers). Hequn Xian is often cited by papers focused on Cryptography and Data Security (15 papers), Cloud Data Security Solutions (11 papers) and Privacy-Preserving Technologies in Data (9 papers). Hequn Xian collaborates with scholars based in China, Australia and United States. Hequn Xian's co-authors include Zhenkuan Pan, Guangquan Xu, Wei Wang, Yuanyuan Li, Xiangliang Zhang, Wenjuan Lian, Guangquan Xu, Hanlin Zhang, Jia Yu and Aimin Yu and has published in prestigious journals such as IEEE Access, Information Sciences and IEEE Transactions on Industrial Informatics.

In The Last Decade

Hequn Xian

29 papers receiving 384 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Hequn Xian China 12 207 199 197 142 36 36 401
Ilir Gashi United Kingdom 11 165 0.8× 291 1.5× 118 0.6× 139 1.0× 24 0.7× 39 406
Mahmood Yousefi‐Azar Australia 5 76 0.4× 219 1.1× 313 1.6× 152 1.1× 37 1.0× 6 430
Futai Zou China 14 219 1.1× 326 1.6× 293 1.5× 205 1.4× 84 2.3× 66 568
Yongzheng Zhang China 14 177 0.9× 443 2.2× 469 2.4× 256 1.8× 41 1.1× 90 634
Xiaokui Shu United States 11 261 1.3× 333 1.7× 236 1.2× 318 2.2× 42 1.2× 24 530
Abdulghani Ali Ahmed Malaysia 12 233 1.1× 238 1.2× 205 1.0× 173 1.2× 25 0.7× 34 459
Yun Cui South Korea 9 281 1.4× 549 2.8× 264 1.3× 287 2.0× 36 1.0× 25 626
Gabriela Ciocarlie United States 10 108 0.5× 249 1.3× 132 0.7× 132 0.9× 13 0.4× 27 354
Jianhua Sun China 11 383 1.9× 492 2.5× 153 0.8× 114 0.8× 67 1.9× 79 700
Jinchun Choi United States 11 178 0.9× 158 0.8× 107 0.5× 159 1.1× 32 0.9× 22 362

Countries citing papers authored by Hequn Xian

Since Specialization
Citations

This map shows the geographic impact of Hequn Xian's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Hequn Xian with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Hequn Xian more than expected).

Fields of papers citing papers by Hequn Xian

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Hequn Xian. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Hequn Xian. The network helps show where Hequn Xian may publish in the future.

Co-authorship network of co-authors of Hequn Xian

This figure shows the co-authorship network connecting the top 25 collaborators of Hequn Xian. A scholar is included among the top collaborators of Hequn Xian based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Hequn Xian. Hequn Xian is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Chen, Fei, et al.. (2025). LFIoTDI: A lightweight and fine-grained device identification approach for IoT security enhancement. Computer Communications. 237. 108149–108149. 2 indexed citations
2.
Chen, Fei, et al.. (2025). P-A Scheme: A Robust and Lightweight Wi-Fi Device Identification Approach for Enhancing Industrial Security. Electronics. 14(3). 513–513. 1 indexed citations
3.
Xian, Hequn, et al.. (2024). AF-Dedup: Secure Encrypted Data Deduplication Based on Adaptive Dynamic Merkle Hash Forest PoW for Cloud Storage. IEEE Transactions on Industrial Informatics. 20(10). 12294–12304.
4.
Zhang, Hanlin, et al.. (2024). MRFE: A Deep-Learning-Based Multidimensional Radio Frequency Fingerprinting Enhancement Approach for IoT Device Identification. IEEE Internet of Things Journal. 11(18). 30442–30454. 5 indexed citations
5.
Li, Leibo, et al.. (2024). Biometric identification on the cloud: A more secure and faster construction. Information Sciences. 669. 120553–120553. 2 indexed citations
6.
Zhang, Hanlin, et al.. (2023). Eliminating Rogue Access Point Attacks in IoT: A Deep Learning Approach With Physical-Layer Feature Purification and Device Identification. IEEE Internet of Things Journal. 11(8). 14886–14900. 5 indexed citations
7.
Xian, Hequn, et al.. (2022). A Data Deduplication Scheme Based on DBSCAN With Tolerable Clustering Deviation. IEEE Access. 11. 9742–9750. 5 indexed citations
8.
Yang, Kun, et al.. (2022). Query on the cloud: improved privacy-preserving k-nearest neighbor classification over the outsourced database. World Wide Web. 26(4). 1747–1774. 5 indexed citations
9.
Tian, Chengliang, et al.. (2022). Privacy-Preserving and Verifiable Cloud-Aided Disease Diagnosis and Prediction With Hyperplane Decision-Based Classifier. IEEE Internet of Things Journal. 9(21). 21648–21661. 7 indexed citations
10.
Xian, Hequn, et al.. (2021). Semantics aware adversarial malware examples generation for black-box attacks. Applied Soft Computing. 109. 107506–107506. 28 indexed citations
11.
Xian, Hequn, et al.. (2020). SecDedup: Secure Encrypted Data Deduplication With Dynamic Ownership Updating. IEEE Access. 8. 186323–186334. 6 indexed citations
12.
He, Yunlong, et al.. (2020). Secure Encrypted Data Deduplication Based on Data Popularity. Mobile Networks and Applications. 26(4). 1686–1695. 15 indexed citations
13.
Xian, Hequn, et al.. (2020). CSNN: Password guessing method based on Chinese syllables and neural network. Peer-to-Peer Networking and Applications. 13(6). 2237–2250. 9 indexed citations
14.
Zhang, Hanlin, et al.. (2020). Blockchain-based two-party fair contract signing scheme. Information Sciences. 535. 142–155. 33 indexed citations
15.
Xian, Hequn, et al.. (2020). Secure data deduplication for Internet-of-things sensor networks based on threshold dynamic adjustment. International Journal of Distributed Sensor Networks. 16(3). 812443868–812443868. 12 indexed citations
16.
Zhou, Xiaojun, et al.. (2020). Machine Learning Methods for Industrial Protocol Security Analysis: Issues, Taxonomy, and Directions. IEEE Access. 8. 83842–83857. 15 indexed citations
17.
Xian, Hequn, et al.. (2019). A Graded Reversible Watermarking Scheme for Relational Data. Mobile Networks and Applications. 26(4). 1552–1563. 7 indexed citations
18.
Xu, Guangquan, Xiaotong Li, Kaitai Liang, et al.. (2019). SoProtector: Safeguard Privacy for Native SO Files in Evolving Mobile IoT Applications. IEEE Internet of Things Journal. 7(4). 2539–2552. 18 indexed citations
19.
20.
Zhang, Min, Desheng Zhang, Hequn Xian, Chi Chen, & Dengguo Feng. (2008). Towards A Secure Distribute Storage System. International Conference on Advanced Communication Technology. 1612–1617. 3 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026