Kejiang Chen

1.8k total citations
84 papers, 965 citations indexed

About

Kejiang Chen is a scholar working on Computer Vision and Pattern Recognition, Artificial Intelligence and Signal Processing. According to data from OpenAlex, Kejiang Chen has authored 84 papers receiving a total of 965 indexed citations (citations by other indexed papers that have themselves been cited), including 67 papers in Computer Vision and Pattern Recognition, 28 papers in Artificial Intelligence and 10 papers in Signal Processing. Recurrent topics in Kejiang Chen's work include Advanced Steganography and Watermarking Techniques (59 papers), Digital Media Forensic Detection (44 papers) and Chaos-based Image/Signal Encryption (29 papers). Kejiang Chen is often cited by papers focused on Advanced Steganography and Watermarking Techniques (59 papers), Digital Media Forensic Detection (44 papers) and Chaos-based Image/Signal Encryption (29 papers). Kejiang Chen collaborates with scholars based in China, Singapore and Canada. Kejiang Chen's co-authors include Weiming Zhang, Nenghai Yu, Hang Zhou, Yaofei Wang, Han Fang, Weixiang Li, Wenbo Zhou, Dongdong Chen, Dongdong Hou and Yujia Liu and has published in prestigious journals such as SHILAP Revista de lepidopterología, IEEE Transactions on Image Processing and IEEE Transactions on Signal Processing.

In The Last Decade

Kejiang Chen

73 papers receiving 948 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Kejiang Chen China 17 747 341 94 73 59 84 965
Abderrahim Saaidi Morocco 17 595 0.8× 107 0.3× 18 0.2× 49 0.7× 45 0.8× 71 694
Chuanmin Jia China 17 1.0k 1.4× 114 0.3× 487 5.2× 32 0.4× 22 0.4× 79 1.2k
Guillaume Alain Canada 7 215 0.3× 186 0.5× 86 0.9× 17 0.2× 17 0.3× 8 410
François Cayre France 10 602 0.8× 60 0.2× 57 0.6× 44 0.6× 148 2.5× 26 642
Gwenaël Doërr France 15 1.2k 1.6× 109 0.3× 183 1.9× 24 0.3× 64 1.1× 65 1.2k
Tiezheng Ge China 11 654 0.9× 187 0.5× 87 0.9× 27 0.4× 36 0.6× 33 774
Andrew D. J. Cross United Kingdom 8 266 0.4× 95 0.3× 86 0.9× 22 0.3× 11 0.2× 16 336
Joachim J. Eggers Germany 13 1.0k 1.3× 106 0.3× 95 1.0× 14 0.2× 24 0.4× 21 1.1k
Ilya Tolstikhin Germany 5 247 0.3× 219 0.6× 42 0.4× 13 0.2× 10 0.2× 9 398

Countries citing papers authored by Kejiang Chen

Since Specialization
Citations

This map shows the geographic impact of Kejiang Chen's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Kejiang Chen with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Kejiang Chen more than expected).

Fields of papers citing papers by Kejiang Chen

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Kejiang Chen. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Kejiang Chen. The network helps show where Kejiang Chen may publish in the future.

Co-authorship network of co-authors of Kejiang Chen

This figure shows the co-authorship network connecting the top 25 collaborators of Kejiang Chen. A scholar is included among the top collaborators of Kejiang Chen based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Kejiang Chen. Kejiang Chen is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Yang, Xi, Chang Liu, Han Fang, et al.. (2025). Synthesizing Glyph Vectors for Practical Information Hiding in Documents. IEEE Transactions on Dependable and Secure Computing. 22(6). 6074–6087.
2.
Chen, Kejiang, et al.. (2025). Performance-Lossless Black-Box Model Watermarking. IEEE Transactions on Dependable and Secure Computing. 23(2). 1955–1970.
3.
Jiang, Jun, et al.. (2025). Reversible adversarial visible image watermarking. Signal Processing. 234. 109999–109999. 1 indexed citations
4.
Ma, Zehua, Han Fang, Xi Yang, Kejiang Chen, & Weiming Zhang. (2025). RoPaSS: Robust Watermarking for Partial Screen-Shooting Scenarios. Proceedings of the AAAI Conference on Artificial Intelligence. 39(18). 19332–19339.
5.
Qiu, Jing, Xi Yang, Shuai Li, et al.. (2025). Watermarking Datasets for LLM Fine-tuning. 1–5. 2 indexed citations
6.
Chen, Kejiang, et al.. (2024). Data-Free Hard-Label Robustness Stealing Attack. Proceedings of the AAAI Conference on Artificial Intelligence. 38(7). 6853–6861. 1 indexed citations
7.
Jiang, Yue, et al.. (2024). Robust Secret Image Sharing Resistant to JPEG Recompression Based on Stable Block Condition. IEEE Transactions on Multimedia. 26. 10446–10461. 2 indexed citations
8.
Fang, Han, et al.. (2024). DERO: Diffusion-Model-Erasure Robust Watermarking. 2973–2981.
9.
Chen, Kejiang, et al.. (2024). CodeWMBench: An Automated Benchmark for Code Watermarking Evaluation. 120–125. 2 indexed citations
10.
Xiao, Yu, Kejiang Chen, Qi Yang, Weiming Zhang, & Nenghai Yu. (2024). Text Fluoroscopy: Detecting LLM-Generated Text through Intrinsic Features. 15838–15846. 3 indexed citations
11.
Chen, Kejiang, et al.. (2024). Natias: Neuron Attribution-Based Transferable Image Adversarial Steganography. IEEE Transactions on Information Forensics and Security. 19. 6636–6649. 3 indexed citations
12.
Fang, Han, et al.. (2023). Flow-Based Robust Watermarking with Invertible Noise Layer for Black-Box Distortions. Proceedings of the AAAI Conference on Artificial Intelligence. 37(4). 5054–5061. 20 indexed citations
13.
Chen, Kejiang, et al.. (2023). Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network. Proceedings of the AAAI Conference on Artificial Intelligence. 37(3). 3349–3357. 12 indexed citations
14.
Chen, Kejiang, Zehua Ma, Jie Zhang, et al.. (2023). ProTegO: Protect Text Content against OCR Extraction Attack. 7424–7434. 1 indexed citations
15.
Zhu, Yao, Xiaodan Li, Kejiang Chen, et al.. (2022). Toward Understanding and Boosting Adversarial Transferability From a Distribution Perspective. IEEE Transactions on Image Processing. 31. 6487–6501. 37 indexed citations
16.
Chen, Yuefeng, Kejiang Chen, Xiaoyi Dong, et al.. (2022). Feature Fusion Based Adversarial Example Detection Against Second-Round Adversarial Attacks. IEEE Transactions on Artificial Intelligence. 4(5). 1029–1040. 6 indexed citations
17.
Zhang, Xiongwei, et al.. (2022). Imperceptible black-box waveform-level adversarial attack towards automatic speaker recognition. Complex & Intelligent Systems. 9(1). 65–79. 9 indexed citations
18.
Yin, Yi, Weiming Zhang, Nenghai Yu, & Kejiang Chen. (2022). Steganalysis of neural networks based on parameter statistical bias. JUSTC. 52(1). 1–1.
19.
Zhou, Hang, et al.. (2018). Deflecting 3D Adversarial Point Clouds Through Outlier-Guided Removal.. arXiv (Cornell University). 2 indexed citations
20.
Chen, Kejiang, Hang Zhou, Hanqing Zhao, et al.. (2018). When Provably Secure Steganography Meets Generative Models. arXiv (Cornell University). 5 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026