Huixian Li

527 total citations
45 papers, 311 citations indexed

About

Huixian Li is a scholar working on Artificial Intelligence, Information Systems and Computer Networks and Communications. According to data from OpenAlex, Huixian Li has authored 45 papers receiving a total of 311 indexed citations (citations by other indexed papers that have themselves been cited), including 31 papers in Artificial Intelligence, 19 papers in Information Systems and 10 papers in Computer Networks and Communications. Recurrent topics in Huixian Li's work include Cryptography and Data Security (25 papers), Cryptography and Residue Arithmetic (11 papers) and Chaos-based Image/Signal Encryption (7 papers). Huixian Li is often cited by papers focused on Cryptography and Data Security (25 papers), Cryptography and Residue Arithmetic (11 papers) and Chaos-based Image/Signal Encryption (7 papers). Huixian Li collaborates with scholars based in China and United States. Huixian Li's co-authors include Liaojun Pang, Yumin Wang, Weidong Zhang, Ye Yao, Man Wang, Licheng Jiao, Yumin Wang, Xuxia Yan, Ping Yin and Yi Liu and has published in prestigious journals such as PLoS ONE, IEEE Access and IEEE Transactions on Information Forensics and Security.

In The Last Decade

Huixian Li

37 papers receiving 296 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Huixian Li China 11 219 140 123 51 38 45 311
Caixue Zhou China 10 224 1.0× 115 0.8× 122 1.0× 115 2.3× 45 1.2× 31 367
Atif Raza Jafri Pakistan 11 197 0.9× 181 1.3× 57 0.5× 27 0.5× 12 0.3× 27 335
Zhi Hu China 8 200 0.9× 168 1.2× 81 0.7× 62 1.2× 14 0.4× 21 283
Tuğrul Yanık Türkiye 7 281 1.3× 344 2.5× 283 2.3× 39 0.8× 15 0.4× 11 465
Anand Desai India 2 269 1.2× 83 0.6× 108 0.9× 108 2.1× 26 0.7× 2 331
Erdem Alkım Türkiye 8 297 1.4× 101 0.7× 41 0.3× 98 1.9× 42 1.1× 16 364
Patrick Longa United States 11 245 1.1× 214 1.5× 35 0.3× 74 1.5× 27 0.7× 24 327
Yiyuan Luo China 9 182 0.8× 40 0.3× 50 0.4× 83 1.6× 25 0.7× 33 231

Countries citing papers authored by Huixian Li

Since Specialization
Citations

This map shows the geographic impact of Huixian Li's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Huixian Li with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Huixian Li more than expected).

Fields of papers citing papers by Huixian Li

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Huixian Li. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Huixian Li. The network helps show where Huixian Li may publish in the future.

Co-authorship network of co-authors of Huixian Li

This figure shows the co-authorship network connecting the top 25 collaborators of Huixian Li. A scholar is included among the top collaborators of Huixian Li based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Huixian Li. Huixian Li is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Li, Huixian, et al.. (2024). Parallel Accelerating Number Theoretic Transform for Bootstrapping on a Graphics Processing Unit. Mathematics. 12(3). 458–458. 1 indexed citations
2.
Li, Huixian, et al.. (2024). EvalComp: Bootstrapping Based on Homomorphic Comparison Function for CKKS. IEEE Transactions on Information Forensics and Security. 20. 1349–1361.
3.
Li, Huixian, et al.. (2020). The vibration suppression of cable with self-excitation in parallel cable-driven regulating system. Advances in Space Research. 66(10). 2416–2427. 3 indexed citations
4.
Pang, Liaojun, et al.. (2019). Efficient and Anonymous Certificateless Multi-Message and Multi-Receiver Signcryption Scheme Based on ECC. IEEE Access. 7. 24511–24526. 33 indexed citations
5.
Pang, Liaojun, et al.. (2019). Anonymous Certificateless Multi-Receiver Signcryption Scheme Without Secure Channel. IEEE Access. 7. 84091–84106. 14 indexed citations
6.
Pang, Liaojun, et al.. (2016). Directed proxy signature with fast revocation proven secure in the standard model. IET Information Security. 11(3). 168–176.
7.
Pang, Liaojun, et al.. (2015). Improved Secret Image Sharing Scheme in Embedding Capacity without Underflow and Overflow. The Scientific World JOURNAL. 2015(1). 861546–861546. 2 indexed citations
8.
Pang, Liaojun & Huixian Li. (2013). nMIBAS: A Novel Multi-Receiver ID-Based Anonymous Signcryption with Decryption Fairness. Computing and Informatics / Computers and Artificial Intelligence. 32(3). 441–460. 20 indexed citations
9.
Pang, Liaojun, et al.. (2013). Fair data collection scheme in wireless sensor networks. China Communications. 10(2). 112–120. 6 indexed citations
10.
Li, Huixian, et al.. (2013). Quantum Attack-Resistent Certificateless Multi-Receiver Signcryption Scheme. PLoS ONE. 8(6). e49141–e49141. 4 indexed citations
11.
Li, Huixian, et al.. (2013). An efficient authentication protocol with user anonymity for mobile networks. 7. 1842–1847. 8 indexed citations
12.
Pang, Liaojun, et al.. (2013). Completely Anonymous Multi-Recipient Signcryption Scheme with Public Verification. PLoS ONE. 8(5). e63562–e63562. 12 indexed citations
13.
Li, Huixian. (2012). Research on analyzing sentiment of texts based on k-nearest neighbor algorithm. Jisuanji gongcheng yu sheji. 9 indexed citations
14.
Li, Huixian. (2012). Design and analysis of the light-weight mutual authentication protocol for RFID. 39(1). 172–178. 4 indexed citations
15.
Li, Huixian, et al.. (2011). A Novel Hash-based RFID Mutual Authentication Protocol. 13. 774–778. 8 indexed citations
16.
Li, Huixian. (2009). Extraction of sentiment topic sentences of Chinese texts. Journal of Computer Applications.
17.
Li, Huixian, Man Wang, Liaojun Pang, & Weidong Zhang. (2009). Key Binding Based on Biometric Shielding Functions. 19–22. 10 indexed citations
18.
Pang, Liaojun, Huixian Li, Licheng Jiao, & Yumin Wang. (2009). Design and Analysis of a Provable Secure Multi-Recipient Public Key Encryption Scheme. Journal of Software. 20(10). 2907–2914. 10 indexed citations
19.
Li, Huixian & Liaojun Pang. (2008). Improvement on WLAN Multicast Key Management Protocol. 419–424. 2 indexed citations
20.
Li, Huixian. (2006). PID Control for Piezoelectric Ceramic Micro-displacement System.

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026