Xianping Mao

406 total citations
14 papers, 292 citations indexed

About

Xianping Mao is a scholar working on Artificial Intelligence, Information Systems and Computational Theory and Mathematics. According to data from OpenAlex, Xianping Mao has authored 14 papers receiving a total of 292 indexed citations (citations by other indexed papers that have themselves been cited), including 13 papers in Artificial Intelligence, 8 papers in Information Systems and 6 papers in Computational Theory and Mathematics. Recurrent topics in Xianping Mao's work include Cryptography and Data Security (13 papers), Privacy-Preserving Technologies in Data (6 papers) and Complexity and Algorithms in Graphs (6 papers). Xianping Mao is often cited by papers focused on Cryptography and Data Security (13 papers), Privacy-Preserving Technologies in Data (6 papers) and Complexity and Algorithms in Graphs (6 papers). Xianping Mao collaborates with scholars based in China and Hong Kong. Xianping Mao's co-authors include Kefei Chen, Zhengan Huang, Jin Li, Shengli Liu, Junzuo Lai, Qixiang Mei, Jian Weng, Liangliang Wang, Yu Long and Yongtao Wang and has published in prestigious journals such as Information Sciences, Theoretical Computer Science and IEEE Transactions on Dependable and Secure Computing.

In The Last Decade

Xianping Mao

12 papers receiving 283 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Xianping Mao China 5 227 144 96 40 35 14 292
Damien Vergnaud France 8 243 1.1× 124 0.9× 65 0.7× 46 1.1× 35 1.0× 26 280
Baodian Wei China 9 222 1.0× 91 0.6× 82 0.9× 38 0.9× 80 2.3× 49 288
Ik Rae Jeong South Korea 10 274 1.2× 160 1.1× 93 1.0× 82 2.0× 69 2.0× 48 339
Yi‐Fan Tseng Taiwan 10 247 1.1× 162 1.1× 125 1.3× 48 1.2× 56 1.6× 52 343
Anand Desai India 2 269 1.2× 83 0.6× 108 1.1× 26 0.7× 108 3.1× 2 331
Qi Chai Canada 7 249 1.1× 216 1.5× 82 0.9× 24 0.6× 60 1.7× 12 335
Xinrui Ge China 10 231 1.0× 150 1.0× 56 0.6× 47 1.2× 67 1.9× 19 281
Hua Ma China 9 319 1.4× 197 1.4× 78 0.8× 84 2.1× 49 1.4× 25 363
Yinxia Sun China 11 280 1.2× 144 1.0× 90 0.9× 60 1.5× 40 1.1× 30 324

Countries citing papers authored by Xianping Mao

Since Specialization
Citations

This map shows the geographic impact of Xianping Mao's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Xianping Mao with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Xianping Mao more than expected).

Fields of papers citing papers by Xianping Mao

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Xianping Mao. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Xianping Mao. The network helps show where Xianping Mao may publish in the future.

Co-authorship network of co-authors of Xianping Mao

This figure shows the co-authorship network connecting the top 25 collaborators of Xianping Mao. A scholar is included among the top collaborators of Xianping Mao based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Xianping Mao. Xianping Mao is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

14 of 14 papers shown
1.
Lai, Junzuo, Zhengan Huang, Man Ho Au, & Xianping Mao. (2020). Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation. Theoretical Computer Science. 847. 1–16. 3 indexed citations
2.
Huang, Zhengan, Shengli Liu, Xianping Mao, Kefei Chen, & Jin Li. (2017). Insight of the protection for data security under selective opening attacks. Information Sciences. 412-413. 223–241. 137 indexed citations
3.
Wang, Liangliang, Kefei Chen, Xianping Mao, & Yongtao Wang. (2015). On the Security of a Forward-Backward Secure Signature Scheme. International journal of network security. 17(3). 307–310. 3 indexed citations
4.
Wang, Liangliang, et al.. (2015). A Modified Efficient Certificateless Signature Scheme without Bilinear Pairings. 82–85. 19 indexed citations
5.
Mao, Xianping, Junzuo Lai, Qixiang Mei, Kefei Chen, & Jian Weng. (2015). Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption. IEEE Transactions on Dependable and Secure Computing. 13(5). 533–546. 96 indexed citations
6.
Mao, Xianping, Junzuo Lai, Kefei Chen, Jian Weng, & Qixiang Mei. (2015). Efficient revocable identity‐based encryption from multilinear maps. Security and Communication Networks. 8(18). 3511–3522. 4 indexed citations
7.
Wang, Liangliang, Kefei Chen, Xianping Mao, & Yongtao Wang. (2014). Efficient and provably-secure certificateless proxy re-encryption scheme for secure cloud data sharing. Journal of Shanghai Jiaotong University (Science). 19(4). 398–405. 13 indexed citations
8.
Mao, Xianping, Kefei Chen, Liangliang Wang, & Yu Long. (2014). On the Security of a Lattice-Based Multi-party Concurrent Signature Scheme. 181. 91–95. 1 indexed citations
9.
Mao, Xianping, Kefei Chen, Yu Long, & Liangliang Wang. (2014). Attribute-based signature on lattices. Journal of Shanghai Jiaotong University (Science). 19(4). 406–411. 9 indexed citations
10.
Long, Yu, Kefei Chen, & Xianping Mao. (2014). New constructions of dynamic threshold cryptosystem. Journal of Shanghai Jiaotong University (Science). 19(4). 431–435.
11.
Mao, Xianping. (2012). Research on TPM-based Strong ID Authentication Protocol. Jisuanji gongcheng. 1 indexed citations
13.
Cao, Tianjie & Xianping Mao. (2007). Original Signer's Forgery Attacks on Discrete Logarithm Based Proxy Signature Schemes. International journal of network security. 4. 355–360. 2 indexed citations
14.
Cao, Tianjie & Xianping Mao. (2006). Collusion Attack on a Server-Aided Unbalanced RSA Key Generation Protocol. 1. 1–3. 2 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026