Qi Jiang

4.0k total citations · 2 hit papers
96 papers, 3.2k citations indexed

About

Qi Jiang is a scholar working on Computer Networks and Communications, Information Systems and Artificial Intelligence. According to data from OpenAlex, Qi Jiang has authored 96 papers receiving a total of 3.2k indexed citations (citations by other indexed papers that have themselves been cited), including 59 papers in Computer Networks and Communications, 56 papers in Information Systems and 39 papers in Artificial Intelligence. Recurrent topics in Qi Jiang's work include Advanced Authentication Protocols Security (48 papers), User Authentication and Security Systems (45 papers) and Cryptography and Data Security (29 papers). Qi Jiang is often cited by papers focused on Advanced Authentication Protocols Security (48 papers), User Authentication and Security Systems (45 papers) and Cryptography and Data Security (29 papers). Qi Jiang collaborates with scholars based in China, United States and India. Qi Jiang's co-authors include Jianfeng Ma, Xindi Ma, Youliang Tian, Guangsong Li, Debiao He, Fushan Wei, Xiang Lu, Li Yang, Jian Shen and Xinghua Li and has published in prestigious journals such as IEEE Access, IEEE Transactions on Vehicular Technology and IEEE Transactions on Intelligent Transportation Systems.

In The Last Decade

Qi Jiang

89 papers receiving 3.1k citations

Hit Papers

Lightweight three-factor authentication and key agreement... 2017 2026 2020 2023 2017 2020 50 100 150 200

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Qi Jiang China 33 2.2k 2.2k 1.3k 524 425 96 3.2k
Vanga Odelu India 30 2.5k 1.1× 2.3k 1.1× 1.2k 0.9× 550 1.0× 428 1.0× 65 3.3k
SK Hafizul Islam India 40 3.2k 1.4× 2.9k 1.3× 2.0k 1.5× 630 1.2× 615 1.4× 144 4.6k
Ruhul Amin India 36 3.3k 1.5× 3.3k 1.5× 1.3k 1.0× 626 1.2× 639 1.5× 136 4.4k
Fan Wu China 38 3.8k 1.7× 3.4k 1.5× 1.5k 1.1× 780 1.5× 522 1.2× 83 4.7k
An Braeken Belgium 26 1.4k 0.6× 1.1k 0.5× 795 0.6× 253 0.5× 623 1.5× 189 2.5k
Prosanta Gope United Kingdom 26 1.3k 0.6× 1.3k 0.6× 770 0.6× 321 0.6× 548 1.3× 64 2.4k
Priyadarsi Nanda Australia 24 1.8k 0.8× 723 0.3× 1.2k 0.9× 562 1.1× 393 0.9× 106 2.4k
Youliang Tian China 26 1.0k 0.5× 1.1k 0.5× 1.1k 0.9× 211 0.4× 283 0.7× 144 2.3k
Ayman Kayssi Lebanon 24 1.6k 0.7× 722 0.3× 846 0.6× 395 0.8× 728 1.7× 223 2.5k
Jin Cao China 26 1.6k 0.7× 941 0.4× 922 0.7× 213 0.4× 932 2.2× 125 2.5k

Countries citing papers authored by Qi Jiang

Since Specialization
Citations

This map shows the geographic impact of Qi Jiang's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Qi Jiang with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Qi Jiang more than expected).

Fields of papers citing papers by Qi Jiang

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Qi Jiang. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Qi Jiang. The network helps show where Qi Jiang may publish in the future.

Co-authorship network of co-authors of Qi Jiang

This figure shows the co-authorship network connecting the top 25 collaborators of Qi Jiang. A scholar is included among the top collaborators of Qi Jiang based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Qi Jiang. Qi Jiang is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Ma, Xindi, Qi Jiang, Zhuo Ma, et al.. (2025). FedWiper: Federated Unlearning via Universal Adapter. IEEE Transactions on Information Forensics and Security. 20. 4042–4054. 1 indexed citations
2.
Xiao, Hao, et al.. (2025). Multi-factor single-registration authentication and key exchange protocol for IIoT. Journal of Systems Architecture. 168. 103542–103542. 1 indexed citations
3.
Dong, Xuewen, et al.. (2023). Anonymous Lightweight Authenticated Key Agreement Protocol for Fog-Assisted Healthcare IoT System. IEEE Internet of Things Journal. 10(19). 16715–16726. 15 indexed citations
4.
Zhang, Jiawei, Teng Li, Qi Jiang, & Jianfeng Ma. (2022). Enabling efficient traceable and revocable time-based data sharing in smart city. EURASIP Journal on Wireless Communications and Networking. 2022(1). 3–3. 5 indexed citations
5.
Ma, Xindi, Baopu Li, Qi Jiang, et al.. (2021). NOSnoop: An Effective Collaborative Meta-Learning Scheme Against Property Inference Attack. IEEE Internet of Things Journal. 9(9). 6778–6789. 10 indexed citations
6.
Zhang, Jiawei, Jianfeng Ma, Teng Li, & Qi Jiang. (2021). Efficient Hierarchical and Time-Sensitive Data Sharing with User Revocation in Mobile Crowdsensing. Security and Communication Networks. 2021. 1–17. 6 indexed citations
7.
Li, Xinghua, et al.. (2020). BUA: A Blockchain-based Unlinkable Authentication in VANETs. 1–6. 41 indexed citations
8.
Cheng, Qingfeng, et al.. (2020). Security Analysis of Two Unbalancing Pairing-free Identity-based Authenticated Key Exchange Protocols.. Int. J. Netw. Secur.. 22. 597–601. 1 indexed citations
9.
Ma, Xindi, Jianfeng Ma, Hui Li, Qi Jiang, & Sheng Gao. (2018). PDLM: Privacy-Preserving Deep Learning Model on Cloud with Multiple Keys. IEEE Transactions on Services Computing. 14(4). 1251–1263. 56 indexed citations
10.
Li, Yanping, et al.. (2018). MAKA: Provably Secure Multi-factor Authenticated Key Agreement Protocol. 網際網路技術學刊. 19(3). 669–677. 1 indexed citations
11.
Ma, Chuangui, Jian Shen, Ruijie Zhang, Qi Jiang, & Fushan Wei. (2017). A Privacy-Preserving Multi-Factor Authenticated Key Exchange Protocol with Provable Security for Cloud Computing. Journal of information science and engineering. 33. 907–921. 4 indexed citations
12.
Jiang, Qi, Jianfeng Ma, Chao Yang, et al.. (2017). Efficient end-to-end authentication protocol for wearable health monitoring systems. Computers & Electrical Engineering. 63. 182–195. 126 indexed citations
13.
Li, Guangsong, et al.. (2016). Anonymous Network Information Acquirement Protocol for Mobile Users in Heterogeneous Wireless Networks. International journal of network security. 18(1). 193–200.
14.
Jiang, Qi, et al.. (2016). A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth. Journal of Medical Systems. 40(11). 231–231. 47 indexed citations
15.
Jiang, Qi, Jianfeng Ma, Fushan Wei, et al.. (2016). An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks. Journal of Network and Computer Applications. 76. 37–48. 163 indexed citations
16.
Zhang, Jixun, et al.. (2015). Study on Rock Mass Stability Criterion Based on Catastrophe Theory. Mathematical Problems in Engineering. 2015. 1–7. 6 indexed citations
17.
Jiang, Qi, Jianfeng Ma, Xiang Lu, & Youliang Tian. (2014). Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems. Journal of Medical Systems. 38(2). 12–12. 70 indexed citations
18.
Jiang, Qi, Jianfeng Ma, Zhuo Ma, & Guangsong Li. (2013). A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems. Journal of Medical Systems. 37(1). 9897–9897. 100 indexed citations
19.
Jiang, Qi, et al.. (2012). Security Enhancement of Robust User Authentication Framework for Wireless Sensor Networks. 中国通信. 9(10). 103–111. 14 indexed citations
20.
Yang, Li, Jianfeng Ma, & Qi Jiang. (2012). Mutual Authentication Scheme with Smart Cards and Password under Trusted Computing.. International journal of network security. 14(3). 156–163. 23 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026