Siyi Lv

430 total citations
13 papers, 294 citations indexed

About

Siyi Lv is a scholar working on Artificial Intelligence, Computer Vision and Pattern Recognition and Computational Theory and Mathematics. According to data from OpenAlex, Siyi Lv has authored 13 papers receiving a total of 294 indexed citations (citations by other indexed papers that have themselves been cited), including 13 papers in Artificial Intelligence, 5 papers in Computer Vision and Pattern Recognition and 3 papers in Computational Theory and Mathematics. Recurrent topics in Siyi Lv's work include Cryptography and Data Security (12 papers), Privacy-Preserving Technologies in Data (7 papers) and Chaos-based Image/Signal Encryption (5 papers). Siyi Lv is often cited by papers focused on Cryptography and Data Security (12 papers), Privacy-Preserving Technologies in Data (7 papers) and Chaos-based Image/Signal Encryption (5 papers). Siyi Lv collaborates with scholars based in China, United Kingdom and Germany. Siyi Lv's co-authors include Zheli Liu, Yanyu Huang, Jin Li, Changyu Dong, Wenjing Lou, Xiaochun Cheng, Zhi Wang, Chong Gao, Xiaojie Guo and Bo Li and has published in prestigious journals such as IEEE Access, Information Sciences and IEEE Transactions on Knowledge and Data Engineering.

In The Last Decade

Siyi Lv

13 papers receiving 289 citations

Peers

Siyi Lv
Huijia Lin United States
Jack Doerner United States
Hua Ma China
Siyi Lv
Citations per year, relative to Siyi Lv Siyi Lv (= 1×) peers Xianping Mao

Countries citing papers authored by Siyi Lv

Since Specialization
Citations

This map shows the geographic impact of Siyi Lv's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Siyi Lv with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Siyi Lv more than expected).

Fields of papers citing papers by Siyi Lv

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Siyi Lv. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Siyi Lv. The network helps show where Siyi Lv may publish in the future.

Co-authorship network of co-authors of Siyi Lv

This figure shows the co-authorship network connecting the top 25 collaborators of Siyi Lv. A scholar is included among the top collaborators of Siyi Lv based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Siyi Lv. Siyi Lv is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

13 of 13 papers shown
1.
Lv, Siyi, et al.. (2024). New approach for efficient malicious multiparty private set intersection. Information Sciences. 678. 120995–120995. 2 indexed citations
2.
Li, Tong, et al.. (2024). ABSyn: An Accurate Differentially Private Data Synthesis Scheme With Adaptive Selection and Batch Processes. IEEE Transactions on Information Forensics and Security. 19. 8338–8352. 1 indexed citations
3.
Guo, Xiaojie, et al.. (2024). Shortcut: Making MPC-based Collaborative Analytics Efficient on Dynamic Databases. 854–868. 1 indexed citations
4.
Chen, Haobin, Yue Yang, & Siyi Lv. (2024). Revisiting frequency-smoothing encryption: new security definitions and efficient construction. Cybersecurity. 7(1). 1 indexed citations
5.
Lv, Siyi, Yanyu Huang, Xinhao Li, et al.. (2023). LUNA: Efficient Backward-Private Dynamic Symmetric Searchable Encryption Scheme With Secure Deletion in Encrypted Database. IEEE Transactions on Knowledge and Data Engineering. 37(4). 1961–1974. 1 indexed citations
6.
Liu, Zhewei, et al.. (2023). Total variation distance privacy: Accurately measuring inference attacks and improving utility. Information Sciences. 626. 537–558. 2 indexed citations
7.
Lv, Siyi, et al.. (2021). Frequency-hiding order-preserving encryption with small client storage. Proceedings of the VLDB Endowment. 14(13). 3295–3307. 8 indexed citations
8.
Huang, Yanyu, Siyi Lv, Zheli Liu, et al.. (2021). Cetus: an efficient symmetric searchable encryption against file-injection attack with SGX. Science China Information Sciences. 64(8). 7 indexed citations
9.
Liu, Zheli, Siyi Lv, Jin Li, et al.. (2020). EncodeORE: Reducing Leakage and Preserving Practicality in Order-Revealing Encryption. IEEE Transactions on Dependable and Secure Computing. 19(3). 1579–1591. 17 indexed citations
10.
Lv, Siyi, et al.. (2019). FSSE: Forward secure searchable encryption with keyed-block chains. Information Sciences. 500. 113–126. 30 indexed citations
11.
Li, Jin, Yanyu Huang, Siyi Lv, et al.. (2019). Searchable Symmetric Encryption with Forward Search Privacy. IEEE Transactions on Dependable and Secure Computing. 18(1). 460–474. 155 indexed citations
12.
Lv, Siyi, Xiaochun Cheng, Feng Chen, et al.. (2019). Unbalanced private set intersection cardinality protocol with low communication cost. Future Generation Computer Systems. 102. 1054–1061. 24 indexed citations
13.
Gao, Chong, et al.. (2018). M-SSE: An Effective Searchable Symmetric Encryption With Enhanced Security for Mobile Devices. IEEE Access. 6. 38860–38869. 45 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026