Ming Xian

1.2k total citations
67 papers, 760 citations indexed

About

Ming Xian is a scholar working on Artificial Intelligence, Information Systems and Computer Networks and Communications. According to data from OpenAlex, Ming Xian has authored 67 papers receiving a total of 760 indexed citations (citations by other indexed papers that have themselves been cited), including 40 papers in Artificial Intelligence, 33 papers in Information Systems and 25 papers in Computer Networks and Communications. Recurrent topics in Ming Xian's work include Cryptography and Data Security (29 papers), Privacy-Preserving Technologies in Data (20 papers) and Cloud Data Security Solutions (14 papers). Ming Xian is often cited by papers focused on Cryptography and Data Security (29 papers), Privacy-Preserving Technologies in Data (20 papers) and Cloud Data Security Solutions (14 papers). Ming Xian collaborates with scholars based in China, Australia and Canada. Ming Xian's co-authors include Huimei Wang, Jian Liu, Hong Rong, Wei Wu, Xuemin Shen, Cheng Huang, Udaya Parampalli, Jianbing Ni, Shaojing Fu and Jiawei He and has published in prestigious journals such as SHILAP Revista de lepidopterología, IEEE Transactions on Information Theory and IEEE Access.

In The Last Decade

Ming Xian

61 papers receiving 722 citations

Peers

Ming Xian
Ming Xian
Citations per year, relative to Ming Xian Ming Xian (= 1×) peers Avelino F. Zorzo

Countries citing papers authored by Ming Xian

Since Specialization
Citations

This map shows the geographic impact of Ming Xian's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Ming Xian with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Ming Xian more than expected).

Fields of papers citing papers by Ming Xian

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Ming Xian. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Ming Xian. The network helps show where Ming Xian may publish in the future.

Co-authorship network of co-authors of Ming Xian

This figure shows the co-authorship network connecting the top 25 collaborators of Ming Xian. A scholar is included among the top collaborators of Ming Xian based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Ming Xian. Ming Xian is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
2.
Zhang, Yuxiang, et al.. (2022). A Blockchain-Based and SGX-Enabled Access Control Framework for IoT. Electronics. 11(17). 2710–2710. 12 indexed citations
4.
Liu, Jian, et al.. (2022). Construction of network security domain knowledge graph for network attack detection. 1171–1178. 2 indexed citations
5.
Tang, Wenjuan, et al.. (2021). Secure Data Sharing With Flexible User Access Privilege Update in Cloud-Assisted IoMT. IEEE Transactions on Emerging Topics in Computing. 10(2). 933–947. 18 indexed citations
6.
Wu, Wei, et al.. (2020). Secure and Efficient Outsourced k-Means Clustering using Fully Homomorphic Encryption With Ciphertext Packing Technique. IEEE Transactions on Knowledge and Data Engineering. 33(10). 3424–3437. 40 indexed citations
7.
Liu, Jian, et al.. (2020). CrowdSFL: A Secure Crowd Computing Framework Based on Blockchain and Federated Learning. Electronics. 9(5). 773–773. 53 indexed citations
8.
Liu, Jian, et al.. (2020). An IoT-Applicable Access Control Model Under Double-Layer Blockchain. IEEE Transactions on Circuits & Systems II Express Briefs. 68(6). 2102–2106. 21 indexed citations
9.
10.
Liu, Jian, et al.. (2019). Secure and Fine-Grained Self-Controlled Outsourced Data Deletion in Cloud-Based IoT. IEEE Internet of Things Journal. 7(2). 1140–1153. 26 indexed citations
11.
Liu, Jian, et al.. (2019). The Development Trend Analysis of 5G Network. 38. 382–385. 5 indexed citations
12.
Wang, Huimei, et al.. (2019). Feasibility analysis of network security teaching platform based on KVM and GNS3. 310–313. 2 indexed citations
13.
He, Jiawei, Huimei Wang, Ming Xian, & Jian Liu. (2019). The Application of Big Data in Cyberspace: A Survey. 323. 570–574.
14.
Parampalli, Udaya, et al.. (2018). Improved Upper Bounds on Systematic-Length for Linear Minimum Storage Regenerating Codes. IEEE Transactions on Information Theory. 65(2). 975–984. 4 indexed citations
15.
Parampalli, Udaya, et al.. (2017). On Secrecy Capacity of Minimum Storage Regenerating Codes. IEEE Transactions on Information Theory. 63(3). 1510–1524. 10 indexed citations
16.
Parampalli, Udaya, et al.. (2016). Security Concerns in Minimum Storage Cooperative Regenerating Codes. IEEE Transactions on Information Theory. 62(11). 6218–6232. 6 indexed citations
17.
Liu, Jian, et al.. (2013). Achieving Robust Biometric based Access Control Mechanism for Cloud Computing. 27–27. 3 indexed citations
18.
Xian, Ming. (2007). Data Collection Technique of Computer Network Attack Effect Evaluation Based on Mobile Agent. Jisuanji gongcheng. 2 indexed citations
19.
Xian, Ming. (2007). Research of Network Attack Effect Evaluating Based on Rough Set. Jisuanji yingyong yanjiu. 2 indexed citations
20.
Xian, Ming. (1999). RADAR TARGET RECOGNITION BASED ON FRACTAL COMPRESSION CHARACTERISTIC. JOURNAL OF INFRARED AND MILLIMETER WAVES. 2 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026