Runhua Xu

1.0k total citations
25 papers, 329 citations indexed

About

Runhua Xu is a scholar working on Artificial Intelligence, Information Systems and Computational Theory and Mathematics. According to data from OpenAlex, Runhua Xu has authored 25 papers receiving a total of 329 indexed citations (citations by other indexed papers that have themselves been cited), including 20 papers in Artificial Intelligence, 13 papers in Information Systems and 4 papers in Computational Theory and Mathematics. Recurrent topics in Runhua Xu's work include Privacy-Preserving Technologies in Data (17 papers), Cryptography and Data Security (15 papers) and Blockchain Technology Applications and Security (8 papers). Runhua Xu is often cited by papers focused on Privacy-Preserving Technologies in Data (17 papers), Cryptography and Data Security (15 papers) and Blockchain Technology Applications and Security (8 papers). Runhua Xu collaborates with scholars based in United States, China and Australia. Runhua Xu's co-authors include James Joshi, Chao Li, Bo Lang, Prashant Krishnamurthy, Yi Zhou, Heiko Ludwig, Nathalie Baracaldo, Ali Anwar, Chao Li and Yixin Zhang and has published in prestigious journals such as Biosensors and Bioelectronics, IEEE Transactions on Information Forensics and Security and IEEE Transactions on Dependable and Secure Computing.

In The Last Decade

Runhua Xu

24 papers receiving 319 citations

Peers

Runhua Xu
Rui Jiang China
Duo Zhang China
Zelei Liu China
Runhua Xu
Citations per year, relative to Runhua Xu Runhua Xu (= 1×) peers Yuefei Zhu

Countries citing papers authored by Runhua Xu

Since Specialization
Citations

This map shows the geographic impact of Runhua Xu's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Runhua Xu with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Runhua Xu more than expected).

Fields of papers citing papers by Runhua Xu

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Runhua Xu. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Runhua Xu. The network helps show where Runhua Xu may publish in the future.

Co-authorship network of co-authors of Runhua Xu

This figure shows the co-authorship network connecting the top 25 collaborators of Runhua Xu. A scholar is included among the top collaborators of Runhua Xu based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Runhua Xu. Runhua Xu is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Xu, Runhua, et al.. (2025). DeFeed: Secure Decentralized Cross-Contract Data Feed in Web 3.0 for Connected Autonomous Vehicles. ACM Transactions on Autonomous and Adaptive Systems.
2.
Zhou, Haoyi, et al.. (2024). PE-Attack: On the Universal Positional Embedding Vulnerability in Transformer-Based Models. IEEE Transactions on Information Forensics and Security. 19. 9359–9373. 1 indexed citations
3.
Xu, Runhua, Bo Li, Chao Li, et al.. (2024). TAPFed: Threshold Secure Aggregation for Privacy-Preserving Federated Learning. IEEE Transactions on Dependable and Secure Computing. 21(5). 4309–4323. 14 indexed citations
4.
Li, Jianxin, et al.. (2024). Dual Defense: Enhancing Privacy and Mitigating Poisoning Attacks in Federated Learning. 70476–70498. 1 indexed citations
5.
Li, Chao, Runhua Xu, & Li Duan. (2023). Characterizing Coin-Based Voting Governance in DPoS Blockchains. Proceedings of the International AAAI Conference on Web and Social Media. 17. 1148–1152. 6 indexed citations
6.
Li, Chao, Balaji Palanisamy, Runhua Xu, et al.. (2023). How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance. 150–164. 8 indexed citations
7.
Xu, Runhua, Nathalie Baracaldo, Yi Zhou, et al.. (2022). DeTrust-FL: Privacy-Preserving Federated Learning in Decentralized Trust Setting. 417–426. 17 indexed citations
8.
Xu, Runhua, et al.. (2022). Blockchain-based Transparency Framework for Privacy Preserving Third-party Services. IEEE Transactions on Dependable and Secure Computing. 1–1. 18 indexed citations
9.
Xu, Runhua, Nathalie Baracaldo, Yi Zhou, et al.. (2021). FedV. 181–192. 45 indexed citations
10.
Xu, Runhua, James Joshi, & Chao Li. (2021). NN-EMD: Efficiently Training Neural Networks Using Encrypted Multi-Sourced Datasets. IEEE Transactions on Dependable and Secure Computing. 19(4). 2807–2820. 16 indexed citations
11.
Xu, Runhua. (2020). Functional encryption based approaches for practical privacy-preserving machine learning. D-Scholarship@Pitt (University of Pittsburgh). 1 indexed citations
12.
Xu, Runhua & James Joshi. (2020). Revisiting Secure Computation Using Functional Encryption: Opportunities and Research Directions. 226–235. 5 indexed citations
13.
Li, Chao, Balaji Palanisamy, Runhua Xu, Jian Wang, & Jiqiang Liu. (2020). NF-Crowd: Nearly-free Blockchain-based Crowdsourcing. 151. 41–50. 5 indexed citations
14.
Xu, Runhua & James Joshi. (2020). Trustworthy and Transparent Third-party Authority. ACM Transactions on Internet Technology. 20(4). 1–23. 8 indexed citations
15.
Xu, Runhua, James Joshi, & Prashant Krishnamurthy. (2019). An Integrated Privacy Preserving Attribute-Based Access Control Framework Supporting Secure Deduplication. IEEE Transactions on Dependable and Secure Computing. 18(2). 706–721. 34 indexed citations
16.
Xu, Runhua, Balaji Palanisamy, & James Joshi. (2018). QueryGuard: Privacy-Preserving Latency-Aware Query Optimization for Edge Computing. 9 indexed citations
17.
Xu, Runhua & James Joshi. (2016). An Integrated Privacy Preserving Attribute Based Access Control Framework. 32. 68–76. 5 indexed citations
18.
Xu, Runhua & Bo Lang. (2015). A CP-ABE scheme with hidden policy and its application in cloud computing. International Journal of Cloud Computing. 4(4). 279–279. 21 indexed citations
20.
Wang, Jianlong, Yixin Zhang, Yeyao Wang, et al.. (2009). An innovative reactor-type biosensor for BOD rapid measurement. Biosensors and Bioelectronics. 25(7). 1705–1709. 35 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026