Kan Yang

8.3k total citations · 4 hit papers
95 papers, 5.9k citations indexed

About

Kan Yang is a scholar working on Artificial Intelligence, Information Systems and Computer Networks and Communications. According to data from OpenAlex, Kan Yang has authored 95 papers receiving a total of 5.9k indexed citations (citations by other indexed papers that have themselves been cited), including 58 papers in Artificial Intelligence, 35 papers in Information Systems and 30 papers in Computer Networks and Communications. Recurrent topics in Kan Yang's work include Cryptography and Data Security (43 papers), Privacy-Preserving Technologies in Data (42 papers) and Cloud Data Security Solutions (18 papers). Kan Yang is often cited by papers focused on Cryptography and Data Security (43 papers), Privacy-Preserving Technologies in Data (42 papers) and Cloud Data Security Solutions (18 papers). Kan Yang collaborates with scholars based in China, United States and Canada. Kan Yang's co-authors include Xiaohua Jia, Xuemin Shen, Hongwei Li, Kan Zheng, Zhe Yang, Xiaodong Lin, Kuan Zhang, Guowen Xu, Victor C. M. Leung and Lei Lei and has published in prestigious journals such as SHILAP Revista de lepidopterología, Annals of the New York Academy of Sciences and IEEE Access.

In The Last Decade

Kan Yang

85 papers receiving 5.7k citations

Hit Papers

Blockchain-Based Decentralized Trust Management i... 2012 2026 2016 2021 2018 2019 2012 2017 200 400 600

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Kan Yang China 38 3.8k 3.2k 1.7k 974 474 95 5.9k
Jianbing Ni Canada 37 2.5k 0.7× 2.3k 0.7× 2.0k 1.2× 1.1k 1.1× 495 1.0× 121 4.8k
Hongwei Li China 43 6.0k 1.6× 3.0k 1.0× 1.6k 0.9× 900 0.9× 544 1.1× 323 8.1k
Qiang He China 44 1.7k 0.5× 2.9k 0.9× 3.6k 2.1× 756 0.8× 245 0.5× 262 6.0k
Hui Li China 50 5.6k 1.5× 4.7k 1.5× 3.8k 2.2× 2.1k 2.1× 296 0.6× 488 9.8k
Liusheng Huang China 38 2.4k 0.6× 931 0.3× 2.7k 1.6× 1.6k 1.6× 687 1.4× 410 5.9k
Yun Yang Australia 45 1.4k 0.4× 4.1k 1.3× 4.2k 2.4× 508 0.5× 242 0.5× 322 6.7k
Jamal Bentahar Canada 30 1.5k 0.4× 1.3k 0.4× 1.3k 0.8× 429 0.4× 141 0.3× 215 3.3k
Dirk Grunwald United States 42 2.6k 0.7× 994 0.3× 4.2k 2.4× 2.2k 2.3× 529 1.1× 231 7.4k
Jianliang Xu Hong Kong 44 2.3k 0.6× 1.3k 0.4× 3.0k 1.7× 696 0.7× 311 0.7× 353 6.0k
Zhenfu Cao China 42 4.5k 1.2× 3.3k 1.0× 2.7k 1.6× 949 1.0× 87 0.2× 394 6.8k

Countries citing papers authored by Kan Yang

Since Specialization
Citations

This map shows the geographic impact of Kan Yang's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Kan Yang with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Kan Yang more than expected).

Fields of papers citing papers by Kan Yang

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Kan Yang. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Kan Yang. The network helps show where Kan Yang may publish in the future.

Co-authorship network of co-authors of Kan Yang

This figure shows the co-authorship network connecting the top 25 collaborators of Kan Yang. A scholar is included among the top collaborators of Kan Yang based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Kan Yang. Kan Yang is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Fan, Kai, et al.. (2025). Dynamic Multi-User Authorization in Ciphertext Retrieval With Proxy Re-Encryption. IEEE Transactions on Dependable and Secure Computing. 22(6). 5918–5930.
2.
Li, Yibo, et al.. (2025). Burnout and its relationship with depressive symptoms in primary school teachers under the “Double Reduction” policy in China. Frontiers in Public Health. 12. 1420452–1420452. 1 indexed citations
3.
Wu, Fan, et al.. (2024). EpiOracle: Privacy-Preserving Cross-Facility Early Warning for Unknown Epidemics. Proceedings on Privacy Enhancing Technologies. 2025(1). 361–378.
4.
Zhang, Yuan, et al.. (2024). Beyond Security: Achieving Fairness in Mailmen-Assisted Timed Data Delivery. IEEE Transactions on Information Forensics and Security. 19. 6425–6440. 2 indexed citations
5.
Yang, Kan, et al.. (2024). Sex difference in alexithymia and cognitive impairment in chronic schizophrenia: a large sample study based on Chinese Han population. European Archives of Psychiatry and Clinical Neuroscience. 275(3). 733–742.
7.
Shi, Yijie, Kai Fan, Yuhan Bai, et al.. (2024). Building Efficient and Flexible Voting Protocols: An Approach to Fairness and Anonymity. IEEE Internet of Things Journal. 12(3). 3163–3176.
8.
Yang, Kan, et al.. (2024). PKChain: Compromise-Tolerant and Verifiable Public Key Management System. IEEE Internet of Things Journal. 12(3). 3130–3144.
10.
Yang, Kan, et al.. (2021). Reputation-Based Truth Discovery With Long-Term Quality of Source in Internet of Things. IEEE Internet of Things Journal. 9(7). 5410–5421. 9 indexed citations
11.
Yang, Anjia, Jian Weng, Kan Yang, Cheng Huang, & Xuemin Shen. (2020). Delegating Authentication to Edge: A Decentralized Authentication Architecture for Vehicular Networks. IEEE Transactions on Intelligent Transportation Systems. 23(2). 1284–1298. 97 indexed citations
12.
Zhang, Yuan, Chunxiang Xu, Hongwei Li, et al.. (2020). PROTECT: Efficient Password-Based Threshold Single-Sign-On Authentication for Mobile Users against Perpetual Leakage. IEEE Transactions on Mobile Computing. 20(6). 2297–2312. 80 indexed citations
13.
Xu, Guowen, Hongwei Li, Sen Liu, Kan Yang, & Xiaodong Lin. (2019). VerifyNet: Secure and Verifiable Federated Learning. IEEE Transactions on Information Forensics and Security. 15. 911–926. 552 indexed citations breakdown →
14.
Su, Zhou, et al.. (2018). Experience Blocking Ratio Based Game Theoretic Approach for Spectrum Sharing in Heterogeneous Networks. IEEE Transactions on Network Science and Engineering. 7(1). 343–355. 7 indexed citations
15.
Shu, Jiangang, Kan Yang, Xiaohua Jia, et al.. (2018). Proxy-Free Privacy-Preserving Task Matching with Efficient Revocation in Crowdsourcing. IEEE Transactions on Dependable and Secure Computing. 18(1). 117–130. 55 indexed citations
16.
Zhang, Yinghui, Robert H. Deng, Jiangang Shu, Kan Yang, & Dong Zheng. (2018). TKSE: Trustworthy Keyword Search Over Encrypted Data With Two-Side Verifiability via Blockchain. IEEE Access. 6. 31077–31087. 79 indexed citations
17.
Xu, Qichao, Zhou Su, & Kan Yang. (2017). Optimal Control Theory-Based Epidemic Information Spreading Scheme for Mobile Social Users With Energy Constraint. IEEE Access. 5. 14107–14118. 24 indexed citations
18.
Zhang, Kuan, Xiaohui Liang, Jianbing Ni, Kan Yang, & Xuemin Shen. (2016). Exploiting Social Network to Enhance Human-to-Human Infection Analysis without Privacy Leakage. IEEE Transactions on Dependable and Secure Computing. 15(4). 607–620. 36 indexed citations
19.
Yang, Kan & Xiaohua Jia. (2012). Attributed-Based Access Control for Multi-authority Systems in Cloud Storage. 536–545. 78 indexed citations
20.
Lipkin, Martin, Kan Yang, Winfried Edelmann, et al.. (1999). Preclinical Mouse Models for Cancer Chemoprevention Studies. Annals of the New York Academy of Sciences. 889(1). 14–19. 25 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026