Xingbing Fu

434 total citations
23 papers, 287 citations indexed

About

Xingbing Fu is a scholar working on Artificial Intelligence, Computational Theory and Mathematics and Computer Networks and Communications. According to data from OpenAlex, Xingbing Fu has authored 23 papers receiving a total of 287 indexed citations (citations by other indexed papers that have themselves been cited), including 21 papers in Artificial Intelligence, 8 papers in Computational Theory and Mathematics and 7 papers in Computer Networks and Communications. Recurrent topics in Xingbing Fu's work include Cryptography and Data Security (16 papers), Privacy-Preserving Technologies in Data (11 papers) and Complexity and Algorithms in Graphs (8 papers). Xingbing Fu is often cited by papers focused on Cryptography and Data Security (16 papers), Privacy-Preserving Technologies in Data (11 papers) and Complexity and Algorithms in Graphs (8 papers). Xingbing Fu collaborates with scholars based in China, United Kingdom and Macao. Xingbing Fu's co-authors include Fagen Li, Jianwu Zhang, Ting Wu, Gang Xiong, Rui Zhang, Yu Ling, Xuyun Nie, Haifeng Li, Libin Jiao and Nan Zhou and has published in prestigious journals such as Expert Systems with Applications, Sensors and Information Sciences.

In The Last Decade

Xingbing Fu

20 papers receiving 269 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Xingbing Fu China 9 233 155 93 88 28 23 287
Yoshiaki Shiraishi Japan 9 142 0.6× 136 0.9× 105 1.1× 51 0.6× 15 0.5× 55 268
Benjamin Beurdouche France 3 182 0.8× 105 0.7× 94 1.0× 99 1.1× 17 0.6× 3 249
Syh‐Yuan Tan Malaysia 8 152 0.7× 86 0.6× 115 1.2× 44 0.5× 27 1.0× 38 253
Changhee Hahn South Korea 11 249 1.1× 90 0.6× 177 1.9× 30 0.3× 11 0.4× 37 323
M.H. Kang United States 8 206 0.9× 116 0.7× 49 0.5× 92 1.0× 16 0.6× 18 264
Yi‐Fan Tseng Taiwan 10 247 1.1× 125 0.8× 162 1.7× 55 0.6× 48 1.7× 52 343
Yufeng Li China 4 218 0.9× 121 0.8× 30 0.3× 103 1.2× 5 0.2× 7 263
Jean‐Louis Lanet France 8 109 0.5× 117 0.8× 97 1.0× 148 1.7× 10 0.4× 35 225
Walter Guttmann New Zealand 5 62 0.3× 110 0.7× 77 0.8× 56 0.6× 31 1.1× 23 170
Nadia Tawbi Canada 9 148 0.6× 155 1.0× 111 1.2× 139 1.6× 37 1.3× 32 267

Countries citing papers authored by Xingbing Fu

Since Specialization
Citations

This map shows the geographic impact of Xingbing Fu's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Xingbing Fu with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Xingbing Fu more than expected).

Fields of papers citing papers by Xingbing Fu

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Xingbing Fu. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Xingbing Fu. The network helps show where Xingbing Fu may publish in the future.

Co-authorship network of co-authors of Xingbing Fu

This figure shows the co-authorship network connecting the top 25 collaborators of Xingbing Fu. A scholar is included among the top collaborators of Xingbing Fu based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Xingbing Fu. Xingbing Fu is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Fu, Xingbing, Shenghan Lou, Jiaming Zheng, et al.. (2025). Deep learning techniques for DDoS attack detection: Concepts, analyses, challenges, and future directions. Expert Systems with Applications. 291. 128469–128469.
2.
Fu, Xingbing, Chaofan Jiang, Chaorong Li, et al.. (2024). A hybrid approach for Android malware detection using improved multi-scale convolutional neural networks and residual networks. Expert Systems with Applications. 249. 123675–123675. 8 indexed citations
3.
Fu, Xingbing, et al.. (2024). Multi-Scale Convolutional Neural Networks optimized by elite strategy dung beetle optimization algorithm for encrypted traffic classification. Expert Systems with Applications. 264. 125729–125729. 2 indexed citations
4.
Fu, Xingbing, et al.. (2023). Deep metric learning based approach for network intrusion detection. Journal of Physics Conference Series. 2504(1). 12037–12037.
5.
Fu, Xingbing, et al.. (2022). Offline/Online lattice-based ciphertext policy attribute-based encryption. Journal of Systems Architecture. 130. 102684–102684. 14 indexed citations
6.
Li, Ni, et al.. (2022). Complementary set encryption for privacy-preserving data consolidation. Information Sciences. 593. 271–288. 1 indexed citations
7.
Huang, Peng, et al.. (2022). GPLFR—Global perspective and local flow registration-for forward-looking sonar images. Neural Computing and Applications. 34(15). 12663–12679. 1 indexed citations
8.
Li, Haifeng, et al.. (2021). PSCPAC: Post-quantum secure certificateless public auditing scheme in cloud storage. Journal of Information Security and Applications. 61. 102927–102927. 7 indexed citations
9.
Fu, Xingbing, Yong Ding, Haifeng Li, et al.. (2021). A survey of lattice based expressive attribute based encryption. Computer Science Review. 43. 100438–100438. 12 indexed citations
10.
Fu, Xingbing, Nan Zhou, Libin Jiao, Haifeng Li, & Jianwu Zhang. (2021). The robust deep learning–based schemes for intrusion detection in Internet of Things environments. Annals of Telecommunications. 76(5-6). 273–285. 35 indexed citations
11.
Yang, Kang, et al.. (2020). Attribute Based Encryption with Efficient Revocation from Lattices.. Int. J. Netw. Secur.. 22. 161–170. 13 indexed citations
12.
Li, Haifeng, et al.. (2020). A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing. Sensors. 20(17). 4720–4720. 17 indexed citations
13.
Fu, Xingbing, et al.. (2018). Public key encryption with conjunctive keyword search secure against keyword guessing attack from lattices. Transactions on Emerging Telecommunications Technologies. 30(11). 14 indexed citations
14.
Fu, Xingbing, et al.. (2018). Multi-User Searchable Symmetric Encryption with Dynamic Updates for Cloud Computing. Information. 9(10). 242–242. 4 indexed citations
15.
Fu, Xingbing, et al.. (2017). Outsource the Ciphertext Decryption of Inner Product Predicate Encryption Scheme Based on Prime Order Bilinear Map.. International journal of network security. 19. 313–322. 1 indexed citations
16.
Fu, Xingbing, Xuyun Nie, Ting Wu, & Fagen Li. (2017). Large universe attribute based access control with efficient decryption in cloud storage system. Journal of Systems and Software. 135. 157–164. 48 indexed citations
17.
Fu, Xingbing, et al.. (2015). Blind Expressive Ciphertext Policy Attribute Based Encryption for Fine Grained Access Control on the Encrypted Data.. International journal of network security. 17. 661–671. 1 indexed citations
18.
Fu, Xingbing. (2015). Unidirectional Proxy Re-Encryption for Access Structure Transformation in Attribute-based Encryption Schemes.. International journal of network security. 17. 142–149. 2 indexed citations
19.
Fu, Xingbing, Xuyun Nie, & Fagen Li. (2015). Black Box Traceable Ciphertext Policy Attribute-Based Encryption Scheme. Information. 6(3). 481–493. 4 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026