Koen Simoens

599 total citations
15 papers, 351 citations indexed

About

Koen Simoens is a scholar working on Information Systems, Signal Processing and Computer Vision and Pattern Recognition. According to data from OpenAlex, Koen Simoens has authored 15 papers receiving a total of 351 indexed citations (citations by other indexed papers that have themselves been cited), including 11 papers in Information Systems, 9 papers in Signal Processing and 4 papers in Computer Vision and Pattern Recognition. Recurrent topics in Koen Simoens's work include User Authentication and Security Systems (9 papers), Biometric Identification and Security (8 papers) and Advanced Steganography and Watermarking Techniques (3 papers). Koen Simoens is often cited by papers focused on User Authentication and Security Systems (9 papers), Biometric Identification and Security (8 papers) and Advanced Steganography and Watermarking Techniques (3 papers). Koen Simoens collaborates with scholars based in Belgium, United States and Netherlands. Koen Simoens's co-authors include Bart Preneel, Pim Tuyls, Bian Yang, Christoph Busch, Julien Bringer, Stefaan Seys, Hervé Chabanne, Daniel M. Hartung, Xuebing Zhou and Elaine M. Newton and has published in prestigious journals such as ACM Computing Surveys, IEEE Transactions on Information Forensics and Security and Lecture notes in computer science.

In The Last Decade

Koen Simoens

15 papers receiving 322 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Koen Simoens Belgium 8 290 269 210 47 41 15 351
Yagiz Sutcu United States 12 426 1.5× 369 1.4× 435 2.1× 32 0.7× 39 1.0× 14 568
Ileana Buhan Netherlands 9 213 0.7× 199 0.7× 157 0.7× 30 0.6× 44 1.1× 18 274
Debanjan Sadhya India 9 135 0.5× 111 0.4× 127 0.6× 46 1.0× 22 0.5× 37 253
Dennis Lin United States 4 299 1.0× 258 1.0× 266 1.3× 35 0.7× 25 0.6× 5 377
Mark Reith United States 5 229 0.8× 290 1.1× 115 0.5× 50 1.1× 38 0.9× 17 333
Alex Stoianov United States 8 283 1.0× 229 0.9× 228 1.1× 12 0.3× 15 0.4× 10 309
John R. Vacca United States 9 113 0.4× 158 0.6× 67 0.3× 56 1.2× 57 1.4× 30 278
Christopher Hargreaves United Kingdom 8 155 0.5× 201 0.7× 87 0.4× 56 1.2× 37 0.9× 23 244
Xuebing Zhou Germany 11 186 0.6× 171 0.6× 215 1.0× 79 1.7× 9 0.2× 38 342
Harkeerat Kaur India 8 227 0.8× 132 0.5× 207 1.0× 19 0.4× 42 1.0× 20 300

Countries citing papers authored by Koen Simoens

Since Specialization
Citations

This map shows the geographic impact of Koen Simoens's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Koen Simoens with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Koen Simoens more than expected).

Fields of papers citing papers by Koen Simoens

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Koen Simoens. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Koen Simoens. The network helps show where Koen Simoens may publish in the future.

Co-authorship network of co-authors of Koen Simoens

This figure shows the co-authorship network connecting the top 25 collaborators of Koen Simoens. A scholar is included among the top collaborators of Koen Simoens based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Koen Simoens. Koen Simoens is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

15 of 15 papers shown
1.
Simoens, Koen, et al.. (2016). A Survey of Authentication and Communications Security in Online Banking. ACM Computing Surveys. 49(4). 1–35. 23 indexed citations
2.
Simoens, Koen, et al.. (2014). Technical report: Security of Online Banking Systems. Data Archiving and Networked Services (DANS). 1 indexed citations
3.
Simoens, Koen, Julien Bringer, Hervé Chabanne, & Stefaan Seys. (2012). A Framework for Analyzing Template Security and Privacy in Biometric Authentication Systems. IEEE Transactions on Information Forensics and Security. 7(2). 833–841. 70 indexed citations
4.
Simoens, Koen, Bian Yang, Xuebing Zhou, et al.. (2012). Criteria towards metrics for benchmarking template protection algorithms. 498–505. 45 indexed citations
5.
Lamberger, Mario, Florian Mendel, Vincent Rijmen, & Koen Simoens. (2011). Memoryless near-collisions via coding theory. Designs Codes and Cryptography. 62(1). 1–18. 5 indexed citations
6.
Simoens, Koen, Roel Peeters, & Bart Preneel. (2010). Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares. Lecture notes in computer science. 2010. 116–135. 2 indexed citations
7.
Yang, Bian, Daniel M. Hartung, Koen Simoens, & Christoph Busch. (2010). Dynamic random projection for biometric template protection. Zenodo (CERN European Organization for Nuclear Research). 1–7. 65 indexed citations
8.
Buhan, Ileana, Emile Kelkboom, & Koen Simoens. (2010). A Survey of the Security and Privacy Measures for Anonymous Biometric Authentication Systems. Zenodo (CERN European Organization for Nuclear Research). 346–351. 8 indexed citations
9.
Simoens, Koen, et al.. (2010). Reversing protected minutiae vicinities. 37. 1–8. 8 indexed citations
10.
Bringer, Julien, Hervé Chabanne, & Koen Simoens. (2010). Blackbox Security of Biometrics (Invited Paper). Zenodo (CERN European Organization for Nuclear Research). 5707. 337–340. 1 indexed citations
11.
Simoens, Koen, Pim Tuyls, & Bart Preneel. (2009). Privacy Weaknesses in Biometric Sketches. 188–203. 100 indexed citations
12.
Peeters, Roel, et al.. (2008). Cross-Context Delegation through Identity Federation. 79–92. 3 indexed citations
13.
Simoens, Koen, et al.. (2008). Insights on identity documents based on the Belgian case study. Information Security Technical Report. 13(2). 54–60. 2 indexed citations
14.
Delvaux, Nicolas, Hervé Chabanne, Julien Bringer, et al.. (2008). Pseudo Identities Based on Fingerprint Characteristics. University of Twente Research Information. P-108. 1063–1068. 6 indexed citations
15.
Wouters, Karel, et al.. (2008). Secure and Privacy-Friendly Logging for eGovernment Services. Document Server@UHasselt (UHasselt). 4. 1091–1096. 12 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026