Xiaofang Xia

757 total citations
36 papers, 475 citations indexed

About

Xiaofang Xia is a scholar working on Electrical and Electronic Engineering, Control and Systems Engineering and Artificial Intelligence. According to data from OpenAlex, Xiaofang Xia has authored 36 papers receiving a total of 475 indexed citations (citations by other indexed papers that have themselves been cited), including 17 papers in Electrical and Electronic Engineering, 13 papers in Control and Systems Engineering and 12 papers in Artificial Intelligence. Recurrent topics in Xiaofang Xia's work include Electricity Theft Detection Techniques (12 papers), Smart Grid Security and Resilience (11 papers) and Adversarial Robustness in Machine Learning (4 papers). Xiaofang Xia is often cited by papers focused on Electricity Theft Detection Techniques (12 papers), Smart Grid Security and Resilience (11 papers) and Adversarial Robustness in Machine Learning (4 papers). Xiaofang Xia collaborates with scholars based in China, United States and Sweden. Xiaofang Xia's co-authors include Wei Liang, Yang Xiao, Jiangtao Cui, Meng Zheng, Bo Yang, Jian Lin, Huaguang Shi, Chaofan Ma, Buhong Wang and Chao Shen and has published in prestigious journals such as Proceedings of the IEEE, Expert Systems with Applications and IEEE Access.

In The Last Decade

Xiaofang Xia

32 papers receiving 453 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Xiaofang Xia China 13 283 213 105 69 69 36 475
U. Qasim Pakistan 10 233 0.8× 118 0.6× 84 0.8× 184 2.7× 66 1.0× 32 502
Sangho Choe South Korea 7 503 1.8× 173 0.8× 128 1.2× 111 1.6× 81 1.2× 42 603
Yukun Fang China 10 116 0.4× 187 0.9× 102 1.0× 73 1.1× 15 0.2× 19 432
V. Sankaranarayanan India 12 107 0.4× 312 1.5× 55 0.5× 90 1.3× 83 1.2× 42 701
Shuo Xiao China 12 178 0.6× 197 0.9× 114 1.1× 262 3.8× 55 0.8× 38 654
Iury Bessa Brazil 13 109 0.4× 356 1.7× 80 0.8× 74 1.1× 23 0.3× 62 537
Xingzhen Bai China 13 261 0.9× 239 1.1× 99 0.9× 221 3.2× 17 0.2× 71 592
Jin Xie China 14 116 0.4× 106 0.5× 63 0.6× 140 2.0× 31 0.4× 45 702
Jaouad Boumhidi Morocco 14 186 0.7× 182 0.9× 162 1.5× 32 0.5× 12 0.2× 61 474

Countries citing papers authored by Xiaofang Xia

Since Specialization
Citations

This map shows the geographic impact of Xiaofang Xia's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Xiaofang Xia with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Xiaofang Xia more than expected).

Fields of papers citing papers by Xiaofang Xia

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Xiaofang Xia. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Xiaofang Xia. The network helps show where Xiaofang Xia may publish in the future.

Co-authorship network of co-authors of Xiaofang Xia

This figure shows the co-authorship network connecting the top 25 collaborators of Xiaofang Xia. A scholar is included among the top collaborators of Xiaofang Xia based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Xiaofang Xia. Xiaofang Xia is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Xia, Xiaofang, et al.. (2025). Insights into KPI-based performance anomaly detection in database systems: A comprehensive study. Expert Systems with Applications. 285. 127959–127959.
2.
Wang, Liang, Zhiwen Yu, Xiaofang Xia, et al.. (2025). Crowdsensing for Emergency Response in Unknown Environments: A Rapid Strategic Sensing Approach. IEEE Transactions on Mobile Computing. 24(11). 12019–12034.
3.
Wang, Meng, et al.. (2025). A new deep learning based electricity theft detection framework for smart grids in cloud computing. Computer Standards & Interfaces. 94. 104007–104007.
4.
Tian, Jiwei, Chao Shen, Chenhao Lin, et al.. (2025). ADMM-Based Adversarial False Data Injection Attacks Against Multi-Label Locational Detection. IEEE Transactions on Dependable and Secure Computing. 23(1). 263–277. 1 indexed citations
5.
Yang, Jingyuan, et al.. (2024). An artificial bee colony algorithm with an adaptive search strategy selection mechanism and its application on workload prediction. Computers & Industrial Engineering. 189. 109982–109982. 3 indexed citations
6.
Tian, Jiwei, Chao Shen, Buhong Wang, et al.. (2024). EVADE: Targeted Adversarial False Data Injection Attacks for State Estimation in Smart Grid. IEEE Transactions on Sustainable Computing. 10(3). 534–546. 9 indexed citations
7.
Xu, Chi, et al.. (2024). Digital-Twin-Assisted Intelligent Secure Task Offloading and Caching in Blockchain-Based Vehicular Edge Computing Networks. IEEE Internet of Things Journal. 12(4). 4128–4143. 17 indexed citations
8.
Qiao, Xiaotian, et al.. (2024). Deep multi-negative supervised hashing for large-scale image retrieval. Expert Systems with Applications. 264. 125795–125795. 7 indexed citations
9.
Zhang, Yinlong, et al.. (2023). 3D-SWiM: 3D vision based seam width measurement for industrial composite fiber layup in-situ inspection. Robotics and Computer-Integrated Manufacturing. 82. 102546–102546. 6 indexed citations
10.
Ma, Chaofan, Wei Liang, Meng Zheng, Xiaofang Xia, & Lin Chen. (2023). A Voronoi Diagram and Q-Learning based Relay Node Placement Method Subject to Radio Irregularity. ACM Transactions on Sensor Networks. 20(1). 1–27. 1 indexed citations
11.
Xia, Xiaofang, Jian Lin, Qiannan Jia, et al.. (2023). ETD-ConvLSTM: A Deep Learning Approach for Electricity Theft Detection in Smart Grids. IEEE Transactions on Information Forensics and Security. 18. 2553–2568. 46 indexed citations
12.
Zhang, Yinlong, et al.. (2023). GCMVF-AGV: Globally Consistent Multiview Visual–Inertial Fusion for AGV Navigation in Digital Workshops. IEEE Transactions on Instrumentation and Measurement. 72. 1–16. 8 indexed citations
13.
Xia, Xiaofang, et al.. (2023). An artificial bee colony algorithm with a cumulative covariance matrix mechanism and its application in parameter optimization for hearing loss detection models. Expert Systems with Applications. 229. 120533–120533. 6 indexed citations
14.
Xia, Xiaofang, et al.. (2022). Fuzzy Differential Privacy Theory and Its Applications in Subgraph Counting. IEEE Transactions on Fuzzy Systems. 31(2). 356–369. 7 indexed citations
15.
Xia, Xiaofang, Yang Xiao, Wei Liang, & Jiangtao Cui. (2022). Detection Methods in Smart Meters for Electricity Thefts: A Survey. Proceedings of the IEEE. 110(2). 273–319. 85 indexed citations
16.
Yang, Bo, Chaofan Ma, & Xiaofang Xia. (2021). Drone Formation Control via Belief-Correlated Imitation Learning. Autonomous Agents and Multi-Agent Systems. 1407–1415. 4 indexed citations
17.
Cui, Jiangtao, et al.. (2021). PvCT: A Publicly Verifiable Contact Tracing Algorithm in Cloud Computing. Security and Communication Networks. 2021. 1–18. 2 indexed citations
18.
Xia, Xiaofang, et al.. (2021). AdaGT: An Adaptive Group Testing Method for Improving Efficiency and Sensitivity of Large-Scale Screening Against COVID-19. IEEE Transactions on Automation Science and Engineering. 19(2). 646–662.
19.
Xia, Xiaofang, Yang Xiao, & Wei Liang. (2019). SAI: A Suspicion Assessment-Based Inspection Algorithm to Detect Malicious Users in Smart Grid. IEEE Transactions on Information Forensics and Security. 15. 361–374. 36 indexed citations
20.
Xia, Xiaofang, Yang Xiao, Wei Liang, & Meng Zheng. (2018). GTHI: A Heuristic Algorithm to Detect Malicious Users in Smart Grids. IEEE Transactions on Network Science and Engineering. 7(2). 805–816. 18 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026