Jian Weng

18.1k total citations · 5 hit papers
386 papers, 11.5k citations indexed

About

Jian Weng is a scholar working on Artificial Intelligence, Information Systems and Computer Vision and Pattern Recognition. According to data from OpenAlex, Jian Weng has authored 386 papers receiving a total of 11.5k indexed citations (citations by other indexed papers that have themselves been cited), including 204 papers in Artificial Intelligence, 96 papers in Information Systems and 85 papers in Computer Vision and Pattern Recognition. Recurrent topics in Jian Weng's work include Cryptography and Data Security (116 papers), Privacy-Preserving Technologies in Data (81 papers) and Cloud Data Security Solutions (33 papers). Jian Weng is often cited by papers focused on Cryptography and Data Security (116 papers), Privacy-Preserving Technologies in Data (81 papers) and Cloud Data Security Solutions (33 papers). Jian Weng collaborates with scholars based in China, United States and Singapore. Jian Weng's co-authors include Robert H. Deng, Wei Lu, Guo‐Qiang Zeng, Ximeng Liu, Anjia Yang, Junzuo Lai, Jianfeng Ma, Min-Rong Chen, Kim‐Kwang Raymond Choo and Kang‐Di Lu and has published in prestigious journals such as SHILAP Revista de lepidopterología, PLoS ONE and IEEE Transactions on Pattern Analysis and Machine Intelligence.

In The Last Decade

Jian Weng

366 papers receiving 11.2k citations

Hit Papers

An overview on smart contracts: Challenges, ad... 2013 2026 2017 2021 2019 2022 2018 2013 2025 200 400 600

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Jian Weng China 55 5.4k 3.6k 2.3k 2.0k 1.7k 386 11.5k
Wei Wang China 52 3.2k 0.6× 2.1k 0.6× 2.2k 1.0× 1.4k 0.7× 1.5k 0.9× 735 11.6k
Weiming Shen China 61 2.8k 0.5× 1.5k 0.4× 852 0.4× 2.3k 1.2× 1.5k 0.9× 592 15.6k
Xizhao Wang China 53 5.6k 1.0× 1.8k 0.5× 2.3k 1.0× 1.0k 0.5× 894 0.5× 366 10.7k
Gaurav Dhiman India 48 5.0k 0.9× 1.4k 0.4× 1.3k 0.6× 2.2k 1.1× 2.0k 1.2× 235 10.9k
Tian Wang China 64 3.3k 0.6× 2.7k 0.8× 1.5k 0.7× 7.4k 3.7× 4.3k 2.5× 573 14.1k
Stig Petersen United Kingdom 5 7.6k 1.4× 968 0.3× 2.8k 1.3× 3.3k 1.7× 3.8k 2.2× 6 19.6k
Chunyan Miao Singapore 57 7.0k 1.3× 2.9k 0.8× 2.3k 1.0× 3.1k 1.6× 2.0k 1.2× 482 14.3k
Lin Xiao China 58 5.7k 1.0× 1.6k 0.4× 1.9k 0.8× 4.9k 2.5× 1.7k 1.0× 298 14.5k
Jinjun Chen Australia 61 4.6k 0.8× 5.4k 1.5× 1.7k 0.7× 4.9k 2.5× 1.3k 0.8× 296 12.6k
Volodymyr Mnih United States 14 7.8k 1.4× 945 0.3× 3.2k 1.4× 3.3k 1.7× 3.8k 2.2× 19 18.0k

Countries citing papers authored by Jian Weng

Since Specialization
Citations

This map shows the geographic impact of Jian Weng's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Jian Weng with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Jian Weng more than expected).

Fields of papers citing papers by Jian Weng

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Jian Weng. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Jian Weng. The network helps show where Jian Weng may publish in the future.

Co-authorship network of co-authors of Jian Weng

This figure shows the co-authorship network connecting the top 25 collaborators of Jian Weng. A scholar is included among the top collaborators of Jian Weng based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Jian Weng. Jian Weng is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Xiao, Yuting, et al.. (2025). Fully-incremental public key encryption with adjustable timed-release keyword search. Information Sciences. 702. 121887–121887.
2.
Xiong, Lizhi, Wenhao Zhou, Zhihua Xia, & Jian Weng. (2025). A Universal Framework for Reversible Data Hiding in Encrypted Images With Multiple Hiders. IEEE Transactions on Dependable and Secure Computing. 22(4). 3944–3959. 1 indexed citations
3.
Weng, Jian, et al.. (2024). Enabling privacy-preserving medication analysis in distributed EHR systems. Journal of Information Security and Applications. 82. 103749–103749. 2 indexed citations
4.
Zeng, Guo‐Qiang, et al.. (2024). Automated federated learning for intrusion detection of industrial control systems based on evolutionary neural architecture search. Computers & Security. 143. 103910–103910. 13 indexed citations
5.
Yang, Zixuan, Yushu Zhang, Tao Wang, et al.. (2024). Once-for-all: Efficient Visual Face Privacy Protection via Person-specific Veils. 7705–7713.
6.
Kang, Yulin, et al.. (2024). Byzantine-Robust and Privacy-Preserving Federated Learning With Irregular Participants. IEEE Internet of Things Journal. 11(21). 35193–35205. 2 indexed citations
7.
Li, Xinghua, et al.. (2024). BADFL: Backdoor Attack Defense in Federated Learning From Local Model Perspective. IEEE Transactions on Knowledge and Data Engineering. 36(11). 5661–5674. 3 indexed citations
8.
Liu, Zhiquan, et al.. (2024). Preimage Attacks on Xoodyak and Gaston Based on Algebraic Strategies. IEEE Internet of Things Journal. 11(19). 31368–31384. 1 indexed citations
9.
Zeng, Guo‐Qiang, et al.. (2024). Automated federated learning‐based adversarial attack and defence in industrial control systems. SHILAP Revista de lepidopterología. 6(2). 13 indexed citations
10.
Fu, Y., et al.. (2024). AMD XDNA NPU in Ryzen AI Processors. IEEE Micro. 44(6). 73–82. 7 indexed citations
11.
Liu, Zitao, et al.. (2023). Towards Robust Knowledge Tracing Models via k-Sparse Attention. 2441–2445. 15 indexed citations
12.
Wu, Yongdong, Jian Weng, Kaimin Wei, et al.. (2023). Attacks on Acceleration-Based Secure Device Pairing With Automatic Visual Tracking. IEEE Transactions on Information Forensics and Security. 18. 3991–4005. 1 indexed citations
13.
Zhang, Jia, Yidong Lin, Min Jiang, et al.. (2022). Fast Multilabel Feature Selection via Global Relevance and Redundancy Optimization. IEEE Transactions on Neural Networks and Learning Systems. 35(4). 5721–5734. 29 indexed citations
14.
Wu, Yongdong, Jian Weng, Zhengxia Wang, et al.. (2022). Attacks and Countermeasures on Privacy-Preserving Biometric Authentication Schemes. IEEE Transactions on Dependable and Secure Computing. 20(2). 1744–1755. 17 indexed citations
15.
Yu, Peipeng, Jianwei Fei, Zhihua Xia, Zhili Zhou, & Jian Weng. (2022). Improving Generalization by Commonality Learning in Face Forgery Detection. IEEE Transactions on Information Forensics and Security. 17. 547–558. 80 indexed citations
16.
Yang, Anjia, Jian Weng, Kan Yang, Cheng Huang, & Xuemin Shen. (2020). Delegating Authentication to Edge: A Decentralized Authentication Architecture for Vehicular Networks. IEEE Transactions on Intelligent Transportation Systems. 23(2). 1284–1298. 97 indexed citations
17.
Wen, Jinming, Jian Weng, Yi Fang, Haris Gacanin, & Weiqi Luo. (2019). Novel Properties of Successive Minima and Their Applications to 5G Tactile Internet. IEEE Transactions on Industrial Informatics. 15(5). 3068–3076.
18.
Wu, Yongdong, Zhuo Wei, Jian Weng, & Robert H. Deng. (2018). Position Manipulation Attacks to Balise-Based Train Automatic Stop Control. IEEE Transactions on Vehicular Technology. 67(6). 5287–5301. 16 indexed citations
19.
Zhang, Leo Yu, et al.. (2018). You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center. IEEE Transactions on Dependable and Secure Computing. 17(6). 1218–1231. 27 indexed citations
20.
Wu, Yongdong, et al.. (2016). Vulnerabilities, Attacks, and Countermeasures in Balise-Based Train Control Systems. IEEE Transactions on Intelligent Transportation Systems. 18(4). 814–823. 37 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026