Xianhui Lu

656 total citations
35 papers, 195 citations indexed

About

Xianhui Lu is a scholar working on Artificial Intelligence, Computer Networks and Communications and Computer Vision and Pattern Recognition. According to data from OpenAlex, Xianhui Lu has authored 35 papers receiving a total of 195 indexed citations (citations by other indexed papers that have themselves been cited), including 25 papers in Artificial Intelligence, 8 papers in Computer Networks and Communications and 6 papers in Computer Vision and Pattern Recognition. Recurrent topics in Xianhui Lu's work include Cryptography and Data Security (20 papers), Coding theory and cryptography (11 papers) and Cryptographic Implementations and Security (10 papers). Xianhui Lu is often cited by papers focused on Cryptography and Data Security (20 papers), Coding theory and cryptography (11 papers) and Cryptographic Implementations and Security (10 papers). Xianhui Lu collaborates with scholars based in China, Singapore and South Korea. Xianhui Lu's co-authors include Fang Liu, Wei Yang, Xin Chang, Jinjin Lu, Chaocheng Zhao, Kunpeng Wang, Chaocheng Zhao, Li Zhang, Ying Liu and Duhyeong Kim and has published in prestigious journals such as Corrosion Science, Desalination and IEEE Communications Letters.

In The Last Decade

Xianhui Lu

30 papers receiving 188 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Xianhui Lu China 5 67 56 43 37 24 35 195
Jie Tong China 8 58 0.9× 53 0.9× 15 0.3× 8 0.2× 17 0.7× 47 258
Haitao Lin China 9 18 0.3× 21 0.4× 22 0.5× 9 0.2× 15 0.6× 38 246
Xu Jin China 9 33 0.5× 18 0.3× 13 0.3× 11 0.3× 63 2.6× 36 293
Ahmed Abotaleb Qatar 10 42 0.6× 19 0.3× 8 0.2× 10 0.3× 53 2.2× 32 303
Ching‐Huei Huang Taiwan 7 19 0.3× 28 0.5× 95 2.2× 13 0.4× 32 1.3× 17 384
Michaël Rao France 15 23 0.3× 77 1.4× 7 0.2× 13 0.4× 206 8.6× 42 576
Shufang Zhu China 8 6 0.1× 74 1.3× 23 0.5× 6 0.2× 16 0.7× 34 220

Countries citing papers authored by Xianhui Lu

Since Specialization
Citations

This map shows the geographic impact of Xianhui Lu's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Xianhui Lu with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Xianhui Lu more than expected).

Fields of papers citing papers by Xianhui Lu

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Xianhui Lu. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Xianhui Lu. The network helps show where Xianhui Lu may publish in the future.

Co-authorship network of co-authors of Xianhui Lu

This figure shows the co-authorship network connecting the top 25 collaborators of Xianhui Lu. A scholar is included among the top collaborators of Xianhui Lu based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Xianhui Lu. Xianhui Lu is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Shen, Xuan, et al.. (2025). Refined TFHE Leveled Homomorphic Evaluation and Its Application. 2309–2323.
2.
Bossuat, Jean-Philippe, Rosario Cammarota, Ilaria Chillotti, et al.. (2025). Security Guidelines for Implementing Homomorphic Encryption. 1(4). 11 indexed citations
3.
Liu, Zhe, et al.. (2025). VeloFHE: GPU Acceleration for FHEW and TFHE Bootstrapping. IACR Transactions on Cryptographic Hardware and Embedded Systems. 2025(3). 81–114.
4.
Lu, Xianhui, et al.. (2024). Faster NTRU-based Bootstrapping in less than 4 ms. IACR Transactions on Cryptographic Hardware and Embedded Systems. 2024(3). 418–451. 1 indexed citations
5.
Lu, Xianhui, et al.. (2024). Key derivable signature and its application in blockchain stealth address. Cybersecurity. 7(1).
6.
Lu, Xianhui, et al.. (2024). Physical-Layer Public Key Encryption Through Massive MIMO. 353–365. 1 indexed citations
7.
Lu, Xianhui, et al.. (2024). Thunderbird: Efficient Homomorphic Evaluation of Symmetric Ciphers in 3GPP by combining two modes of TFHE. IACR Transactions on Cryptographic Hardware and Embedded Systems. 2024(3). 530–573. 3 indexed citations
8.
Huang, Mengjie, et al.. (2024). Key Exchange for Two-Way Untrusted Relaying Systems Through Constellation Overlapping. IEEE Communications Letters. 28(3). 478–482. 1 indexed citations
9.
Wang, Zhongfeng, et al.. (2024). ALT: Area-Efficient and Low-Latency FPGA Design for Torus Fully Homomorphic Encryption. IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 32(4). 645–657. 1 indexed citations
10.
Li, Zhihao, et al.. (2023). Faster Bootstrapping via Modulus Raising and Composite NTT. IACR Transactions on Cryptographic Hardware and Embedded Systems. 2024(1). 563–591. 2 indexed citations
11.
Lu, Xianhui, et al.. (2023). Security estimation of LWE via BKW algorithms. Cybersecurity. 6(1). 1 indexed citations
12.
Lu, Xianhui, et al.. (2023). eBiBa: A Post-Quantum Hash-Based Signature With Small Signature Size in the Continuous Communication of Large-Scale Data. The Computer Journal. 67(4). 1405–1424. 1 indexed citations
13.
Zhang, Yuge, Hui‐Ming Wang, Peng Liu, & Xianhui Lu. (2022). A Robust Joint Sensing and Communications Waveform against Eavesdropping and Spoofing. 2022 IEEE 95th Vehicular Technology Conference: (VTC2022-Spring). 1–6. 3 indexed citations
14.
Lu, Xianhui, et al.. (2022). Hash-based signature revisited. Cybersecurity. 5(1). 14 indexed citations
15.
Lu, Xianhui, et al.. (2022). Hybrid dual attack on LWE with arbitrary secrets. Cybersecurity. 5(1). 4 indexed citations
16.
Lu, Xianhui, et al.. (2020). SecureBP from Homomorphic Encryption. Security and Communication Networks. 2020. 1–9. 1 indexed citations
17.
18.
Lu, Xianhui. (2009). Abuse-free fair exchange protocol without TTP. Jisuanji yingyong yanjiu. 2 indexed citations
19.
Lu, Xianhui, Xuejia Lai, & Dake He. (2009). Improved efficiency of Kiltz07-KEM. Information Processing Letters. 109(18). 1093–1096. 1 indexed citations
20.
Lu, Xianhui. (2005). An Efficient Scheme for GPS Data Compression. Zhongguo tiedao kexue. 2 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026