Xiangyan Tang

908 total citations
45 papers, 476 citations indexed

About

Xiangyan Tang is a scholar working on Artificial Intelligence, Computer Networks and Communications and Information Systems. According to data from OpenAlex, Xiangyan Tang has authored 45 papers receiving a total of 476 indexed citations (citations by other indexed papers that have themselves been cited), including 26 papers in Artificial Intelligence, 17 papers in Computer Networks and Communications and 11 papers in Information Systems. Recurrent topics in Xiangyan Tang's work include Network Security and Intrusion Detection (16 papers), Internet Traffic Analysis and Secure E-voting (10 papers) and Anomaly Detection Techniques and Applications (8 papers). Xiangyan Tang is often cited by papers focused on Network Security and Intrusion Detection (16 papers), Internet Traffic Analysis and Secure E-voting (10 papers) and Anomaly Detection Techniques and Applications (8 papers). Xiangyan Tang collaborates with scholars based in China, United States and New Zealand. Xiangyan Tang's co-authors include Jieren Cheng, Naixue Xiong, Victor S. Sheng, Wenxuan Tu, Boyi Liu, Yue Yang, Keqiu Li, Jun‐Qi Li, Lang Li and Shan Ai and has published in prestigious journals such as Information Sciences, IEEE Transactions on Neural Networks and Learning Systems and IEEE Internet of Things Journal.

In The Last Decade

Xiangyan Tang

41 papers receiving 447 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Xiangyan Tang China 13 228 138 101 87 80 45 476
Chengming Zou China 9 147 0.6× 159 1.2× 86 0.9× 108 1.2× 45 0.6× 39 456
Tian Huang China 14 193 0.8× 179 1.3× 62 0.6× 106 1.2× 76 0.9× 49 543
Haifeng Chen United States 13 383 1.7× 148 1.1× 126 1.2× 164 1.9× 190 2.4× 47 674
Lixing Yu United States 12 330 1.4× 207 1.5× 50 0.5× 105 1.2× 77 1.0× 20 605
Boris Chidlovskii France 16 261 1.1× 144 1.0× 237 2.3× 163 1.9× 81 1.0× 57 622
Vasileios A. Memos Greece 10 101 0.4× 237 1.7× 124 1.2× 98 1.1× 73 0.9× 20 482
Donglin Wang China 11 361 1.6× 51 0.4× 153 1.5× 90 1.0× 84 1.1× 43 601
Masud Moshtaghi Australia 14 370 1.6× 218 1.6× 99 1.0× 34 0.4× 103 1.3× 35 548
Paweł Wawrzyński Poland 9 204 0.9× 83 0.6× 56 0.6× 56 0.6× 37 0.5× 27 417

Countries citing papers authored by Xiangyan Tang

Since Specialization
Citations

This map shows the geographic impact of Xiangyan Tang's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Xiangyan Tang with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Xiangyan Tang more than expected).

Fields of papers citing papers by Xiangyan Tang

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Xiangyan Tang. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Xiangyan Tang. The network helps show where Xiangyan Tang may publish in the future.

Co-authorship network of co-authors of Xiangyan Tang

This figure shows the co-authorship network connecting the top 25 collaborators of Xiangyan Tang. A scholar is included among the top collaborators of Xiangyan Tang based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Xiangyan Tang. Xiangyan Tang is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Tang, Xiangyan, et al.. (2025). Diff-IDS: A Network Intrusion Detection Model Based on Diffusion Model for Imbalanced Data Samples. Computers, materials & continua/Computers, materials & continua (Print). 82(3). 4389–4408. 1 indexed citations
2.
Tang, Xiangyan, et al.. (2025). IIM-ARE: An Effective Interactive Incentive Mechanism Based on Adaptive Reputation Evaluation for Mobile Crowd Sensing. IEEE Internet of Things Journal. 12(11). 16181–16191. 1 indexed citations
3.
Tang, Xiangyan, et al.. (2024). PIAENet: Pyramid integration and attention enhanced network for object detection. Information Sciences. 670. 120576–120576. 5 indexed citations
4.
Tang, Xiangyan, Hongyu Li, Xin-Yi Cao, et al.. (2024). TabSec: A Collaborative Framework for Novel Insider Threat Detection. 2030–2037. 1 indexed citations
5.
Cheng, Jieren, et al.. (2023). Blockchain Security Threats and Collaborative Defense: A Literature Review. Computers, materials & continua/Computers, materials & continua (Print). 76(3). 2597–2629. 3 indexed citations
6.
Cheng, Jieren, et al.. (2023). A Modified PointNet-Based DDoS Attack Classification and Segmentation in Blockchain. Computer Systems Science and Engineering. 47(1). 975–992. 2 indexed citations
7.
Cheng, Jieren, et al.. (2023). Multi-view graph imputation network. Information Fusion. 102. 102024–102024. 11 indexed citations
8.
Cheng, Jieren, et al.. (2023). Dual Contrastive Learning Network for Graph Clustering. IEEE Transactions on Neural Networks and Learning Systems. 35(8). 10846–10856. 18 indexed citations
9.
Cheng, Jieren, et al.. (2023). An Adaptive DDoS Detection and Classification Method in Blockchain Using an Integrated Multi-Models. Computers, materials & continua/Computers, materials & continua (Print). 77(3). 3265–3288. 4 indexed citations
10.
Cheng, Jieren, et al.. (2021). MIFNet: A lightweight multiscale information fusion network. International Journal of Intelligent Systems. 37(9). 5617–5642. 19 indexed citations
11.
Cheng, Jieren, et al.. (2021). Cyberspace Safety and Security. Lecture notes in computer science. 4 indexed citations
12.
Cheng, Jieren, et al.. (2020). A survey of security threats and defense on Blockchain. Multimedia Tools and Applications. 80(20). 30623–30652. 33 indexed citations
13.
Cheng, Jieren, et al.. (2020). Generative Adversarial Networks: A Literature Review. KSII Transactions on Internet and Information Systems. 61 indexed citations
14.
Cheng, Jieren, et al.. (2020). A DDoS Attack Information Fusion Method based on CNN for Multi-element Data. Computers, materials & continua/Computers, materials & continua (Print). 62(3). 131–150. 8 indexed citations
15.
Li, Jing, Xiangyan Tang, Zhijun Wei, et al.. (2020). Correction to: Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT. Mobile Networks and Applications. 26(4). 1551–1551. 1 indexed citations
16.
Liu, Boyi, et al.. (2020). Traffic flow combination forecasting method based on improved LSTM and ARIMA. International Journal of Embedded Systems. 12(1). 22–22. 22 indexed citations
17.
Cheng, Jieren, et al.. (2018). Adaptive DDoS Attack Detection Method Based on Multiple-Kernel Learning. Security and Communication Networks. 2018. 1–19. 19 indexed citations
18.
Cheng, Jieren, et al.. (2018). Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing. Security and Communication Networks. 2018. 1–14. 20 indexed citations
19.
Cheng, Jieren, Boyi Liu, & Xiangyan Tang. (2018). An automatic traffic-congestion detection method for bad weather based on traffic video. International Journal of High Performance Computing and Networking. 11(3). 251–251. 1 indexed citations
20.
Yuan, Xia, et al.. (2015). Obstacle detection based on image and laser points fusion for a small ground robot. 31. 386–391. 4 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026