Hit papers significantly outperform the citation benchmark for their cohort. A paper qualifies
if it has ≥500 total citations, achieves ≥1.5× the top-1% citation threshold for papers in the
same subfield and year (this is the minimum needed to enter the top 1%, not the average
within it), or reaches the top citation threshold in at least one of its specific research
topics.
Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior
This map shows the geographic impact of Xiaohong Yuan's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Xiaohong Yuan with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Xiaohong Yuan more than expected).
This network shows the impact of papers produced by Xiaohong Yuan. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Xiaohong Yuan. The network helps show where Xiaohong Yuan may publish in the future.
Co-authorship network of co-authors of Xiaohong Yuan
This figure shows the co-authorship network connecting the top 25 collaborators of Xiaohong Yuan.
A scholar is included among the top collaborators of Xiaohong Yuan based on the total number of
citations received by their joint publications. Widths of edges
represent the number of papers authors have co-authored together.
Node borders
signify the number of papers an author published with Xiaohong Yuan. Xiaohong Yuan is excluded from
the visualization to improve readability, since they are connected to all nodes in the network.
Yuan, Xiaohong, et al.. (2020). A Survey of Serious Games for Cybersecurity Education and Training. DigitalCommons - Kennesaw State University (Kennesaw State University).8 indexed citations
He, Wu, Mohd Anwar, Ivan K. Ash, et al.. (2019). Effects of Evidence-Based Malware Cybersecurity Training on Employees.. Journal of the Association for Information Systems.1 indexed citations
7.
Yuan, Xiaohong, et al.. (2017). Semi-supervised Random Forest for Intrusion Detection Network.. 181–185.5 indexed citations
8.
Yuan, Xiaohong, Kenneth Williams, Huiming Yu, et al.. (2017). Faculty Workshops for Teaching Information Assurance through Hands-On Exercises and Case Studies.. Journal of the Association for Information Systems. 28(1). 11–20.4 indexed citations
9.
Yuan, Xiaohong, et al.. (2017). Evaluating hands-on labs for teaching SQL injection: a comparative study. Journal of computing sciences in colleges. 32(4). 33–39.5 indexed citations
10.
Bryant, Kelvin & Xiaohong Yuan. (2016). A course module on mobile programming. Journal of computing sciences in colleges. 31(5). 5–11.2 indexed citations
11.
Yuan, Xiaohong. (2015). Research and development of intelligent healthy community system based on mobile Internet. Journal of Computer Applications.
12.
Yuan, Xiaohong, et al.. (2015). Testing the security vulnerabilities of OpenEMR 4.1.1: a case study. Journal of computing sciences in colleges. 30(3). 26–35.5 indexed citations
13.
Williams, Kenneth, Xiaohong Yuan, Huiming Yu, & Kelvin Bryant. (2014). Teaching secure coding for beginning programmers. Journal of computing sciences in colleges. 29(5). 91–99.11 indexed citations
14.
He, Wu, et al.. (2013). Supporting Case-based Learning in Information Security with Web-based Technology. Journal of the Association for Information Systems. 24(1). 31–40.19 indexed citations
15.
Yuan, Xiaohong, et al.. (2009). Using Elluminate Live to assist distance learning of information assurance capstone seminar. Journal of computing sciences in colleges. 24(4). 68–73.
16.
Yuan, Xiaohong, et al.. (2007). An animated learning tool for Kerberos authentication architecture. Journal of computing sciences in colleges. 22(6). 147–155.7 indexed citations
17.
Yuan, Xiaohong, et al.. (2005). A Personal Software Process Tool for Eclipse Environment.. Software Engineering Research and Practice. 717–723.2 indexed citations
18.
Yuan, Xiaohong & Eduardo B. Fernández. (2003). An Analysis Pattern for Course Management.. European Conference on Pattern Languages of Programs. 899–912.3 indexed citations
19.
Fernández, Eduardo B., et al.. (2000). Analysis Patterns for the Order and Shipment of a Product. The Medical Journal of Australia. 1(8). 242–242.9 indexed citations
Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive
bibliographic database. While OpenAlex provides broad and valuable coverage of the global
research landscape, it—like all bibliographic datasets—has inherent limitations. These include
incomplete records, variations in author disambiguation, differences in journal indexing, and
delays in data updates. As a result, some metrics and network relationships displayed in
Rankless may not fully capture the entirety of a scholar's output or impact.