Shijie Zhou

2.3k total citations
123 papers, 1.4k citations indexed

About

Shijie Zhou is a scholar working on Artificial Intelligence, Computer Networks and Communications and Information Systems. According to data from OpenAlex, Shijie Zhou has authored 123 papers receiving a total of 1.4k indexed citations (citations by other indexed papers that have themselves been cited), including 57 papers in Artificial Intelligence, 52 papers in Computer Networks and Communications and 29 papers in Information Systems. Recurrent topics in Shijie Zhou's work include Cryptography and Data Security (31 papers), Privacy-Preserving Technologies in Data (22 papers) and Network Security and Intrusion Detection (14 papers). Shijie Zhou is often cited by papers focused on Cryptography and Data Security (31 papers), Privacy-Preserving Technologies in Data (22 papers) and Network Security and Intrusion Detection (14 papers). Shijie Zhou collaborates with scholars based in China, Hong Kong and Pakistan. Shijie Zhou's co-authors include Qihe Liu, Yongjian Liao, Shilin Qiu, Chunjiang Wu, Ashir Javeed, Ihsan H. Abdulqadder, Redhwan Nour, Adeeb Noor, Fagen Li and Muhammad Asim Saleem and has published in prestigious journals such as Nano Letters, Scientific Reports and IEEE Access.

In The Last Decade

Shijie Zhou

103 papers receiving 1.3k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Shijie Zhou China 21 709 523 295 245 224 123 1.4k
Muhammad Attique South Korea 20 436 0.6× 304 0.6× 202 0.7× 111 0.5× 122 0.5× 46 1.2k
Omar A. Alzubi Jordan 23 616 0.9× 503 1.0× 293 1.0× 240 1.0× 210 0.9× 50 1.3k
Sk. Md. Mizanur Rahman Saudi Arabia 23 521 0.7× 798 1.5× 681 2.3× 191 0.8× 213 1.0× 74 1.7k
Mangal Sain South Korea 18 503 0.7× 556 1.1× 496 1.7× 193 0.8× 162 0.7× 107 1.6k
Gurjot Singh Gaba India 23 402 0.6× 634 1.2× 513 1.7× 440 1.8× 184 0.8× 85 1.7k
Wenjie Ruan United Kingdom 19 743 1.0× 150 0.3× 124 0.4× 345 1.4× 178 0.8× 78 1.5k
Agostino Forestiero Italy 22 516 0.7× 545 1.0× 246 0.8× 103 0.4× 144 0.6× 91 1.3k
Ravinder Kumar India 16 357 0.5× 263 0.5× 150 0.5× 156 0.6× 52 0.2× 67 984
S. Velliangiri India 16 378 0.5× 456 0.9× 292 1.0× 132 0.5× 154 0.7× 97 1.1k
Helmi Md Rais Malaysia 11 620 0.9× 237 0.5× 277 0.9× 95 0.4× 191 0.9× 32 1.2k

Countries citing papers authored by Shijie Zhou

Since Specialization
Citations

This map shows the geographic impact of Shijie Zhou's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Shijie Zhou with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Shijie Zhou more than expected).

Fields of papers citing papers by Shijie Zhou

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Shijie Zhou. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Shijie Zhou. The network helps show where Shijie Zhou may publish in the future.

Co-authorship network of co-authors of Shijie Zhou

This figure shows the co-authorship network connecting the top 25 collaborators of Shijie Zhou. A scholar is included among the top collaborators of Shijie Zhou based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Shijie Zhou. Shijie Zhou is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Wang, Hongwei, et al.. (2025). Lattice-Based Revocable IBEET Scheme for Mobile Cloud Computing. IEEE Transactions on Cloud Computing. 13(3). 807–820.
2.
Wang, Peng, et al.. (2025). A downhole migration-based location method based on cross-correlation-weighted semblance for microseismic events. Journal of Geophysics and Engineering. 22(3). 697–708. 3 indexed citations
3.
Saleem, Muhammad Asim, Shijie Zhou, Fengli Zhang, et al.. (2025). Delay, Energy, and Outage Considerations in GenAI-Enhanced MEC-NOMA-Enabled Vehicular Networks. IEEE Transactions on Intelligent Transportation Systems. 1–15. 4 indexed citations
4.
Yang, Bing, Ying Qiu, Yurui Li, et al.. (2024). Unveiling the neglected impacts of halide ions on phenol removal in UV/H2O2 system: Light shielding and oxidant utilization efficiency. Journal of Water Process Engineering. 69. 106682–106682. 2 indexed citations
5.
Eltayieb, Nabeil, Rashad Elhabob, Yongjian Liao, Fagen Li, & Shijie Zhou. (2024). A heterogeneous signcryption scheme with Cryptographic Reverse Firewalls for IoT and its application. Journal of Information Security and Applications. 83. 103763–103763. 4 indexed citations
6.
Zhou, Shijie, et al.. (2024). Enhanced privacy-preserving distributed deep learning with application to fog-based IoT. Internet of Things. 26. 101183–101183. 1 indexed citations
7.
Eltayieb, Nabeil, Rashad Elhabob, Abdeldime M. S. Abdelgader, et al.. (2024). Certificateless Proxy Re-encryption with Cryptographic Reverse Firewalls for Secure Cloud Data Sharing. Future Generation Computer Systems. 162. 107478–107478. 3 indexed citations
9.
Huang, Ying, et al.. (2024). A Domain Isolated Tripartite Authenticated Key Agreement Protocol With Dynamic Revocation and Online Public Identity Updating for IIoT. IEEE Internet of Things Journal. 11(9). 15616–15632. 3 indexed citations
10.
Zhou, Shijie, et al.. (2023). Research on Positioning Accuracy of Mobile Robot in Indoor Environment Based on Improved RTABMAP Algorithm. Sensors. 23(23). 9468–9468. 2 indexed citations
11.
Zhou, Shijie, et al.. (2023). Privacy-preserving distributed deep learning via LWE-based Certificateless Additively Homomorphic Encryption (CAHE). Journal of Information Security and Applications. 74. 103462–103462. 5 indexed citations
12.
Zhou, Shijie, et al.. (2023). Mobile Payment Protocol with Deniably Authenticated Property. Sensors. 23(8). 3927–3927. 4 indexed citations
14.
Zhou, Shijie, et al.. (2022). A High-Utility Differentially Private Mechanism for Space Information Networks. Remote Sensing. 14(22). 5844–5844. 2 indexed citations
15.
Zhou, Shijie, et al.. (2021). Privately Publishing Internet of Things Data: Bring Personalized Sampling Into Differentially Private Mechanisms. IEEE Internet of Things Journal. 9(1). 80–91. 7 indexed citations
16.
Zhou, Shijie, et al.. (2020). Erasure Coding-Oriented Data Update for Cloud Storage: A Survey. IEEE Access. 8. 227982–227998. 7 indexed citations
17.
Liao, Yongjian, et al.. (2020). Identity-Based Signature With Server-Aided Verification Scheme for 5G Mobile Systems. IEEE Access. 8. 51810–51820. 8 indexed citations
18.
Zhou, Shijie, et al.. (2020). Dynamic Path Planning Based on Improved Ant Colony Algorithm in Traffic Congestion. IEEE Access. 8. 180773–180783. 34 indexed citations
19.
Zhou, Shijie, et al.. (2019). Optimizing Query Times for Multiple Users Scenario of Differential Privacy. IEEE Access. 7. 183292–183299. 4 indexed citations
20.
Zhou, Shijie. (2011). Thinking on Training of Computer Engineering Capability.

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026