Jie Guan

448 total citations
56 papers, 199 citations indexed

About

Jie Guan is a scholar working on Artificial Intelligence, Computer Vision and Pattern Recognition and Hardware and Architecture. According to data from OpenAlex, Jie Guan has authored 56 papers receiving a total of 199 indexed citations (citations by other indexed papers that have themselves been cited), including 51 papers in Artificial Intelligence, 42 papers in Computer Vision and Pattern Recognition and 10 papers in Hardware and Architecture. Recurrent topics in Jie Guan's work include Cryptographic Implementations and Security (48 papers), Chaos-based Image/Signal Encryption (42 papers) and Coding theory and cryptography (39 papers). Jie Guan is often cited by papers focused on Cryptographic Implementations and Security (48 papers), Chaos-based Image/Signal Encryption (42 papers) and Coding theory and cryptography (39 papers). Jie Guan collaborates with scholars based in China. Jie Guan's co-authors include Chenhui Jin, Bin Hu, Dongdai Lin, Qiuyan Wang, Lei Wang, Xuejia Lai, Yongqiang Wang, Shaowu Zhang, Pei Zhang and Wei Zhao and has published in prestigious journals such as SHILAP Revista de lepidopterología, IEEE Transactions on Information Theory and IEEE Transactions on Computers.

In The Last Decade

Jie Guan

45 papers receiving 195 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Jie Guan China 8 174 141 38 14 14 56 199
Yonglin Hao China 5 103 0.6× 67 0.5× 19 0.5× 7 0.5× 10 0.7× 17 124
Ronny Van Keer Netherlands 6 116 0.7× 80 0.6× 29 0.8× 16 1.1× 13 0.9× 7 142
Jaechul Sung South Korea 7 124 0.7× 94 0.7× 36 0.9× 22 1.6× 14 1.0× 39 139
Nilanjan Datta India 8 183 1.1× 123 0.9× 29 0.8× 14 1.0× 7 0.5× 35 196
Christof Beierle Germany 7 175 1.0× 100 0.7× 46 1.2× 32 2.3× 31 2.2× 15 188
Kyoji Shibutani Taiwan 4 109 0.6× 81 0.6× 19 0.5× 14 1.0× 11 0.8× 10 124
Shahram Rasoolzadeh Germany 6 158 0.9× 82 0.6× 63 1.7× 31 2.2× 23 1.6× 13 168
Søren S. Thomsen Denmark 5 143 0.8× 95 0.7× 46 1.2× 27 1.9× 20 1.4× 6 158
Tomoyasu Suzaki Japan 5 130 0.7× 107 0.8× 32 0.8× 14 1.0× 16 1.1× 6 148
Paweł Chodowiec United States 4 153 0.9× 128 0.9× 38 1.0× 19 1.4× 15 1.1× 4 171

Countries citing papers authored by Jie Guan

Since Specialization
Citations

This map shows the geographic impact of Jie Guan's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Jie Guan with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Jie Guan more than expected).

Fields of papers citing papers by Jie Guan

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Jie Guan. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Jie Guan. The network helps show where Jie Guan may publish in the future.

Co-authorship network of co-authors of Jie Guan

This figure shows the co-authorship network connecting the top 25 collaborators of Jie Guan. A scholar is included among the top collaborators of Jie Guan based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Jie Guan. Jie Guan is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Feng, Dengguo, et al.. (2024). New Methods for Bounding the Length of Impossible Differentials of SPN Block Ciphers. IEEE Transactions on Information Theory. 70(12). 9165–9178.
2.
Lai, Xuejia, et al.. (2023). A revisited security evaluation of Simeck family ciphers against impossible differential cryptanalysis. Science China Information Sciences. 66(3). 5 indexed citations
3.
Lai, Xuejia, et al.. (2023). Weak rotational property and its application. Designs Codes and Cryptography. 91(10). 3187–3214. 1 indexed citations
4.
Lai, Xuejia, et al.. (2023). Real-Time Related-Key Attack on Full-Round Shadow Designed for IoT Nodes. IEEE Transactions on Computers. 73(2). 613–620. 3 indexed citations
5.
Lai, Xuejia, et al.. (2023). Selecting Rotation Constants on SIMON-Type Ciphers. Journal of Database Management. 34(1). 1–23.
6.
Lai, Xuejia, et al.. (2023). Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework. Designs Codes and Cryptography. 91(9). 2845–2878. 3 indexed citations
7.
Jin, Chenhui, et al.. (2023). Fast Correlation Attacks on K2 Stream Cipher. IEEE Transactions on Information Theory. 69(8). 5426–5439. 2 indexed citations
8.
Feng, Dengguo, et al.. (2023). New method for combining Matsui’s bounding conditions with sequential encoding method. Designs Codes and Cryptography. 91(11). 3603–3642. 1 indexed citations
9.
Hu, Bin, et al.. (2022). Practical Attacks on Full-round FRIET. IACR Transactions on Symmetric Cryptology. 105–119. 1 indexed citations
10.
Lai, Xuejia, et al.. (2022). Research on the Security Level of μ2 against Impossible Differential cryptanalysis. KSII Transactions on Internet and Information Systems. 16(3).
11.
Guan, Jie, et al.. (2021). Fault attacks on authenticated encryption modes for GIFT. IET Information Security. 16(1). 51–63. 4 indexed citations
12.
Wang, Yongqiang, et al.. (2020). UHF LS Peano fractal antenna for PD GIS detection. Journal of Electromagnetic Waves and Applications. 34(13). 1797–1811. 7 indexed citations
13.
Guan, Jie, et al.. (2019). Real-time state recovery attack against MORUS in nonce-misuse setting. Science China Information Sciences. 62(3). 2 indexed citations
14.
Guan, Jie, et al.. (2018). Automatic search of impossible differentials and zero-correlation linear hulls for ARX ciphers. China Communications. 15(2). 54–66. 9 indexed citations
15.
Guan, Jie, et al.. (2017). Security evaluation on Simeck against zero‐correlation linear cryptanalysis. IET Information Security. 12(1). 87–93. 15 indexed citations
16.
Zhang, Pei, et al.. (2016). Research on State Collisions of Authenticated Cipher ACORN. 1 indexed citations
17.
Guan, Jie, et al.. (2014). Novel Technique in Linear Cryptanalysis. ETRI Journal. 37(1). 165–174. 1 indexed citations
18.
Guan, Jie. (2012). Guess and determine attack on E_0 algorithm. Journal of Communications.
19.
Guan, Jie, et al.. (2012). New Results of Related-key Attacks on All Py-Family of Stream Ciphers. JUCS - Journal of Universal Computer Science. 18. 2 indexed citations
20.
Guan, Jie, et al.. (2011). Related key chosen IV attacks on Decim v2 and Decim-128. Mathematical and Computer Modelling. 55(1-2). 123–133. 7 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026