Jeff Yan

2.9k total citations
42 papers, 1.8k citations indexed

About

Jeff Yan is a scholar working on Information Systems, Signal Processing and Computer Vision and Pattern Recognition. According to data from OpenAlex, Jeff Yan has authored 42 papers receiving a total of 1.8k indexed citations (citations by other indexed papers that have themselves been cited), including 35 papers in Information Systems, 26 papers in Signal Processing and 10 papers in Computer Vision and Pattern Recognition. Recurrent topics in Jeff Yan's work include User Authentication and Security Systems (29 papers), Advanced Malware Detection Techniques (24 papers) and Spam and Phishing Detection (11 papers). Jeff Yan is often cited by papers focused on User Authentication and Security Systems (29 papers), Advanced Malware Detection Techniques (24 papers) and Spam and Phishing Detection (11 papers). Jeff Yan collaborates with scholars based in United Kingdom, China and Sweden. Jeff Yan's co-authors include Ahmad Salah El Ahmad, Paul Dunphy, Brian Randell, Ping Wang, Ding Wang, Xinyi Huang, Bin Zhu, Ning Xu, Nur Haryani Zakaria and David Griffiths and has published in prestigious journals such as PLoS ONE, Personality and Individual Differences and Computer.

In The Last Decade

Jeff Yan

41 papers receiving 1.6k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Jeff Yan United Kingdom 18 1.5k 1.1k 398 284 230 42 1.8k
Timothy Vidas United States 13 1.0k 0.7× 968 0.9× 99 0.2× 111 0.4× 266 1.2× 28 1.2k
Adam J. Aviv United States 18 830 0.5× 667 0.6× 107 0.3× 205 0.7× 443 1.9× 79 1.3k
Emanuel von Zezschwitz Germany 20 1.1k 0.7× 704 0.6× 117 0.3× 669 2.4× 77 0.3× 38 1.4k
Anupam Das United States 15 590 0.4× 489 0.4× 217 0.5× 51 0.2× 230 1.0× 36 1.1k
Dawn Song United States 11 775 0.5× 662 0.6× 138 0.3× 148 0.5× 236 1.0× 20 1.1k
Marian Harbach Germany 14 904 0.6× 695 0.6× 36 0.1× 223 0.8× 173 0.8× 35 1.3k
Mario Frank United States 14 811 0.5× 609 0.6× 131 0.3× 159 0.6× 268 1.2× 23 1.2k
Shahriyar Amini United States 8 305 0.2× 257 0.2× 84 0.2× 114 0.4× 75 0.3× 13 755
Markus Dürmuth Germany 12 447 0.3× 401 0.4× 92 0.2× 78 0.3× 114 0.5× 41 725
Patrick Bours Norway 15 621 0.4× 465 0.4× 145 0.4× 145 0.5× 72 0.3× 57 790

Countries citing papers authored by Jeff Yan

Since Specialization
Citations

This map shows the geographic impact of Jeff Yan's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Jeff Yan with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Jeff Yan more than expected).

Fields of papers citing papers by Jeff Yan

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Jeff Yan. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Jeff Yan. The network helps show where Jeff Yan may publish in the future.

Co-authorship network of co-authors of Jeff Yan

This figure shows the co-authorship network connecting the top 25 collaborators of Jeff Yan. A scholar is included among the top collaborators of Jeff Yan based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Jeff Yan. Jeff Yan is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Gao, Yipeng, et al.. (2021). Research on the Security of Visual Reasoning {CAPTCHA}. USENIX Security Symposium. 3291–3308. 4 indexed citations
2.
Gao, Haichang, et al.. (2018). Extended Security Analysis of Hollow Captchas. 網際網路技術學刊. 19(4). 1075–1088. 1 indexed citations
3.
Cheng, Peng, İbrahim Ethem Bağcı, Jeff Yan, & Utz Roedig. (2018). Towards Reactive Acoustic Jamming for Personal Voice Assistants. ePrints Soton (University of Southampton). 12–17. 6 indexed citations
4.
Wang, Ding, Haibo Cheng, Ping Wang, Jeff Yan, & Xinyi Huang. (2018). A Security Analysis of Honeywords. ePrints Soton (University of Southampton). 41 indexed citations
5.
Yan, Jeff & Aurélien Bourquard. (2017). POSTER. ePrints Soton (University of Southampton). 2595–2597.
6.
Palomäki, Jussi, et al.. (2016). "To Bluff like a Man or Fold like a Girl?" – Gender Biased Deceptive Behavior in Online Poker. PLoS ONE. 11(7). e0157838–e0157838. 8 indexed citations
7.
Yan, Jeff, et al.. (2016). Acceleration attacks on PBKDF2 : or, what is inside the black-box of oclHashcat?. Lancaster EPrints (Lancaster University). 3 indexed citations
8.
Gao, Haichang, Jeff Yan, Fang Cao, et al.. (2016). A Simple Generic Attack on Text Captchas. ePrints Soton (University of Southampton). 64 indexed citations
9.
Wei, Xingjie, Jussi Palomäki, Jeff Yan, & Peter Robinson. (2016). The Science and Detection of Tilting. ePrints Soton (University of Southampton). 79–86. 6 indexed citations
10.
Palomäki, Jussi, Jeff Yan, & Michael Laakasuo. (2016). Machiavelli as a poker mate — A naturalistic behavioural study on strategic deception. Personality and Individual Differences. 98. 266–271. 9 indexed citations
11.
Zhu, Bin, et al.. (2014). Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems. IEEE Transactions on Information Forensics and Security. 9(6). 891–904. 64 indexed citations
12.
Zhu, Bin, et al.. (2013). Security implications of password discretization for click-based graphical passwords. ePrints Soton (University of Southampton). 1581–1591. 7 indexed citations
13.
Hammerla, Nils, et al.. (2012). A statistical aimbot detection method for online FPS games. ePrints Soton (University of Southampton). 8 indexed citations
14.
Ahmad, Ahmad Salah El, et al.. (2011). CAPTCHA Design: Color, Usability, and Security. IEEE Internet Computing. 16(2). 44–51. 33 indexed citations
15.
Yan, Jeff. (2010). Collusion Detection in Online Bridge. Proceedings of the AAAI Conference on Artificial Intelligence. 24(1). 1510–1515. 4 indexed citations
16.
Yan, Jeff & Ahmad Salah El Ahmad. (2009). The Robustness of CAPTCHAs: A Security Engineering Perspective. School of Computing Science Technical Report Series. 2 indexed citations
17.
Yan, Jeff, et al.. (2009). Streamlining attacks on CAPTCHAs with a computer game. Lancaster EPrints (Lancaster University). 2095–2100. 6 indexed citations
18.
Dunphy, Paul & Jeff Yan. (2007). Is FacePIN secure and usable?. 165–166. 10 indexed citations
19.
Lin, Di, Paul Dunphy, Patrick Olivier, & Jeff Yan. (2007). Graphical passwords & qualitative spatial relations. 161–162. 43 indexed citations
20.
Yan, Jeff & Brian Randell. (2005). Security in Computer Games: from Pong to Online Poker. School of Computing Science Technical Report Series. 6 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026