Hongyang Yan

2.3k total citations
62 papers, 1.6k citations indexed

About

Hongyang Yan is a scholar working on Artificial Intelligence, Information Systems and Computer Vision and Pattern Recognition. According to data from OpenAlex, Hongyang Yan has authored 62 papers receiving a total of 1.6k indexed citations (citations by other indexed papers that have themselves been cited), including 42 papers in Artificial Intelligence, 23 papers in Information Systems and 17 papers in Computer Vision and Pattern Recognition. Recurrent topics in Hongyang Yan's work include Privacy-Preserving Technologies in Data (30 papers), Cryptography and Data Security (24 papers) and Adversarial Robustness in Machine Learning (13 papers). Hongyang Yan is often cited by papers focused on Privacy-Preserving Technologies in Data (30 papers), Cryptography and Data Security (24 papers) and Adversarial Robustness in Machine Learning (13 papers). Hongyang Yan collaborates with scholars based in China, Hong Kong and United States. Hongyang Yan's co-authors include Rafik Hamza, Yi Tang, Li Hu, Zhengan Huang, Jian Shen, Chunfu Jia, Xiaofeng Chen, Jin Li, Wenbin Chen and Qun Lin and has published in prestigious journals such as IEEE Access, Sensors and ACM Computing Surveys.

In The Last Decade

Hongyang Yan

56 papers receiving 1.6k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Hongyang Yan China 22 914 739 495 309 166 62 1.6k
Xianghan Zheng China 23 797 0.9× 989 1.3× 871 1.8× 206 0.7× 225 1.4× 97 1.8k
Hidayet Aksu United States 18 788 0.9× 583 0.8× 473 1.0× 249 0.8× 237 1.4× 28 1.5k
Chunfu Jia China 19 1.1k 1.2× 764 1.0× 497 1.0× 255 0.8× 89 0.5× 139 1.6k
Hui Zhu China 25 1.5k 1.7× 680 0.9× 450 0.9× 232 0.8× 287 1.7× 138 2.1k
Jiangang Shu China 21 1.4k 1.5× 873 1.2× 623 1.3× 275 0.9× 280 1.7× 41 2.1k
Arcangelo Castiglione Italy 23 717 0.8× 680 0.9× 568 1.1× 330 1.1× 164 1.0× 65 1.5k
Yue Shi Netherlands 19 882 1.0× 1.5k 2.1× 264 0.5× 570 1.8× 86 0.5× 45 2.0k
Anjia Yang China 16 749 0.8× 828 1.1× 386 0.8× 141 0.5× 252 1.5× 63 1.3k
Xiaolin Gui China 20 1.1k 1.2× 693 0.9× 608 1.2× 220 0.7× 197 1.2× 143 1.9k
Xingliang Yuan Australia 27 1.6k 1.7× 777 1.1× 415 0.8× 310 1.0× 134 0.8× 102 1.9k

Countries citing papers authored by Hongyang Yan

Since Specialization
Citations

This map shows the geographic impact of Hongyang Yan's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Hongyang Yan with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Hongyang Yan more than expected).

Fields of papers citing papers by Hongyang Yan

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Hongyang Yan. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Hongyang Yan. The network helps show where Hongyang Yan may publish in the future.

Co-authorship network of co-authors of Hongyang Yan

This figure shows the co-authorship network connecting the top 25 collaborators of Hongyang Yan. A scholar is included among the top collaborators of Hongyang Yan based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Hongyang Yan. Hongyang Yan is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Li, Jin, Hongyang Yan, Arthur Sandor Voundi Koe, et al.. (2024). Self-sovereign identity management in ciphertext policy attribute based encryption for IoT protocols. Journal of Information Security and Applications. 86. 103885–103885. 5 indexed citations
2.
Yan, Hongyang, et al.. (2024). Reputation is not enough: Ensuring strong order-fairness in Byzantine consensus. Computer Standards & Interfaces. 90. 103855–103855. 1 indexed citations
3.
Yan, Hongyang, et al.. (2023). Explanation-based data-free model extraction attacks. World Wide Web. 26(5). 3081–3092. 3 indexed citations
4.
Li, Cong, et al.. (2023). LEOCN: Real-time and complete network simulation framework for LEO constellation networks1. Journal of High Speed Networks. 30(1). 1–18.
5.
Yan, Hongyang, et al.. (2023). Unlinkable Signcryption Scheme for Multi-Receiver in VANETs. IEEE Transactions on Intelligent Transportation Systems. 24(9). 10138–10154. 16 indexed citations
6.
Pang, Yan, et al.. (2023). Smart contract watermarking based on code obfuscation. Information Sciences. 628. 439–448. 5 indexed citations
7.
Yan, Hongyang, et al.. (2023). MTL-Leak: Privacy Risk Assessment in Multi-Task Learning. IEEE Transactions on Dependable and Secure Computing. 21(1). 204–215. 1 indexed citations
8.
Fu, Shaojing, et al.. (2023). A Robust and Lightweight Privacy-Preserving Data Aggregation Scheme for Smart Grid. IEEE Transactions on Dependable and Secure Computing. 21(1). 270–283. 32 indexed citations
9.
Yan, Hongyang, Yajie Wang, Yaoyuan Zhang, et al.. (2022). Membership Inference Attacks Against Deep Learning Models via Logits Distribution. IEEE Transactions on Dependable and Secure Computing. 20(5). 3799–3808. 9 indexed citations
10.
Koe, Arthur Sandor Voundi, et al.. (2021). Revocable Outsourcing Multi-Authority ABE for Medical Data in Mobile Cloud. 20. 338–345. 1 indexed citations
11.
Yan, Hongyang, et al.. (2020). PPCL: Privacy-preserving collaborative learning for mitigating indirect information leakage. Information Sciences. 548. 423–437. 65 indexed citations
12.
Yan, Hongyang, Mengqi Chen, Li Hu, & Chunfu Jia. (2020). Secure video retrieval using image query on an untrusted cloud. Applied Soft Computing. 97. 106782–106782. 38 indexed citations
13.
Chen, Xiaofeng, et al.. (2020). Machine Learning for Cyber Security. Lecture notes in computer science. 2 indexed citations
14.
Xu, Lingling, et al.. (2020). Delegatable searchable encryption with specified keywords for EHR systems. Wireless Networks. 30(5). 3547–3559. 2 indexed citations
15.
Chen, Liang, Meixia Miao, Jianfeng Ma, et al.. (2020). Detection of global positioning system spoofing attack on unmanned aerial vehicle system. Concurrency and Computation Practice and Experience. 34(7). 13 indexed citations
16.
Wang, Xianmin, Jing Li, Jin Li, & Hongyang Yan. (2019). Multilevel similarity model for high-resolution remote sensing image registration. Information Sciences. 505. 294–305. 21 indexed citations
17.
Lin, Qun, Hongyang Yan, Zhengan Huang, et al.. (2018). An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain. IEEE Access. 6. 20632–20640. 161 indexed citations
18.
Yan, Hongyang, et al.. (2018). Centralized Duplicate Removal Video Storage System with Privacy Preservation in IoT. Sensors. 18(6). 1814–1814. 41 indexed citations
19.
Yan, Hongyang, Huifang Wang, Yangzhou Chen, & Guiping Dai. (2008). Mobile robot navigation in the triangulation of dynamic environment. 40. 776–783. 2 indexed citations
20.
Yan, Hongyang, Huifang Wang, Yangzhou Chen, & Guiping Dai. (2008). Path planning based on Constrained Delaunay Triangulation. 5168–5173. 12 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026