Xiong Li

17.3k total citations · 3 hit papers
457 papers, 13.0k citations indexed

About

Xiong Li is a scholar working on Computer Networks and Communications, Information Systems and Artificial Intelligence. According to data from OpenAlex, Xiong Li has authored 457 papers receiving a total of 13.0k indexed citations (citations by other indexed papers that have themselves been cited), including 165 papers in Computer Networks and Communications, 146 papers in Information Systems and 141 papers in Artificial Intelligence. Recurrent topics in Xiong Li's work include Advanced Authentication Protocols Security (111 papers), User Authentication and Security Systems (96 papers) and Cryptography and Data Security (73 papers). Xiong Li is often cited by papers focused on Advanced Authentication Protocols Security (111 papers), User Authentication and Security Systems (96 papers) and Cryptography and Data Security (73 papers). Xiong Li collaborates with scholars based in China, India and United States. Xiong Li's co-authors include Saru Kumari, Fan Wu, Jianwei Niu, Arun Kumar Sangaiah, Muhammad Khurram Khan, Lili Xu, Ashok Kumar Das, Kim‐Kwang Raymond Choo, Marimuthu Karuppiah and Junguo Liao and has published in prestigious journals such as SHILAP Revista de lepidopterología, PLoS ONE and Advanced Functional Materials.

In The Last Decade

Xiong Li

421 papers receiving 12.6k citations

Hit Papers

A Robust ECC-Based Provable Secure Authentication Protoco... 2017 2026 2020 2023 2017 2017 2022 100 200 300

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Xiong Li China 66 6.9k 6.0k 3.8k 2.3k 1.6k 457 13.0k
Yang Xiao United States 62 11.1k 1.6× 2.1k 0.4× 2.8k 0.7× 7.1k 3.1× 1.1k 0.7× 805 17.4k
Richard P. Lippmann United States 37 3.0k 0.4× 1.9k 0.3× 7.5k 2.0× 1.3k 0.6× 3.7k 2.3× 103 13.7k
Ping Wang China 42 3.3k 0.5× 2.6k 0.4× 2.0k 0.5× 910 0.4× 1.1k 0.7× 318 6.9k
Muhammad Shafiq Pakistan 45 2.9k 0.4× 1.2k 0.2× 1.8k 0.5× 1.2k 0.5× 1.1k 0.7× 266 7.2k
Laurence T. Yang Canada 79 11.2k 1.6× 6.1k 1.0× 6.6k 1.7× 5.2k 2.3× 1.7k 1.1× 888 23.7k
Andreas Krause Switzerland 60 2.7k 0.4× 1.2k 0.2× 4.9k 1.3× 1.2k 0.5× 713 0.4× 270 15.3k
Albert Y. Zomaya Australia 77 14.4k 2.1× 9.9k 1.6× 6.2k 1.6× 5.4k 2.4× 1.5k 0.9× 936 26.6k
Arindam Banerjee United States 35 3.6k 0.5× 1.3k 0.2× 8.8k 2.3× 774 0.3× 2.6k 1.6× 141 13.6k
Ning Zhang China 75 10.6k 1.5× 4.3k 0.7× 4.9k 1.3× 9.3k 4.1× 1.3k 0.8× 834 23.8k
Qian Wang China 61 3.7k 0.5× 7.8k 1.3× 10.6k 2.8× 2.6k 1.1× 1.3k 0.8× 623 19.9k

Countries citing papers authored by Xiong Li

Since Specialization
Citations

This map shows the geographic impact of Xiong Li's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Xiong Li with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Xiong Li more than expected).

Fields of papers citing papers by Xiong Li

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Xiong Li. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Xiong Li. The network helps show where Xiong Li may publish in the future.

Co-authorship network of co-authors of Xiong Li

This figure shows the co-authorship network connecting the top 25 collaborators of Xiong Li. A scholar is included among the top collaborators of Xiong Li based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Xiong Li. Xiong Li is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Liu, Zhengqi, et al.. (2024). Improved gradient leakage attack against compressed gradients in federated learning. Neurocomputing. 608. 128349–128349.
2.
Ye, Yang, et al.. (2024). Revealing urban greenspace accessibility inequity using the carrying capacity-based 3SFCA method and location big data. Sustainable Cities and Society. 108. 105513–105513. 24 indexed citations
3.
Li, Mingyu, Chong Dong, Wenjiang Ye, et al.. (2024). π–π Stacking at the Perovskite/C60 Interface Enables High‐Efficiency Wide‐Bandgap Perovskite Solar Cells. Small. 20(35). e2401197–e2401197. 20 indexed citations
4.
Ma, Tianjun, Xuke Yang, Jun Yan, et al.. (2024). Inhibiting Ion Migration and Oxidation in Sn–Pb Perovskite by Multidentate Chelating Additive Strategy. Advanced Functional Materials. 35(4). 10 indexed citations
5.
Zhang, Wenqi, et al.. (2024). Towards Efficient Delegated Private Set Intersection Cardinality Protocol. 729–734. 1 indexed citations
6.
Li, Xiong, et al.. (2024). Graph Sparsification-Based Secure Federated Learning for Consumer-Driven Internet of Things. IEEE Transactions on Consumer Electronics. 70(3). 5188–5200. 9 indexed citations
7.
Xu, Zisang, et al.. (2024). A Privacy-Preserving Data Aggregation Protocol for Internet of Vehicles With Federated Learning. IEEE Transactions on Intelligent Vehicles. 10(1). 217–227. 4 indexed citations
8.
Li, Xiong, et al.. (2023). Ultrasonic pretreatment-solvent extraction process for separating zinc from pickling waste liquid. Journal of environmental chemical engineering. 11(6). 111160–111160. 6 indexed citations
9.
Li, Fangzheng, Wei Liu, Cheng‐Yang Hu, et al.. (2023). Global association of greenness exposure with risk of nervous system disease: A systematic review and meta-analysis. The Science of The Total Environment. 877. 162773–162773. 7 indexed citations
10.
Zhang, Hongbin, et al.. (2023). BCU-Net: Bridging ConvNeXt and U-Net for medical image segmentation. Computers in Biology and Medicine. 159. 106960–106960. 44 indexed citations
11.
Li, Xiong, et al.. (2023). A Robust Privacy-Preserving Data Aggregation Scheme for Edge-Supported IIoT. IEEE Transactions on Industrial Informatics. 20(3). 4305–4316. 16 indexed citations
12.
Xie, Songyou, Lijun Xiao, Dezhi Han, et al.. (2023). HCVC: A High-Capacity Off-Chain Virtual Channel Scheme Based on Bidirectional Locking Mechanism. IEEE Transactions on Network Science and Engineering. 11(5). 3995–4006. 6 indexed citations
13.
Niu, Weina, et al.. (2023). GCDroid: Android Malware Detection Based on Graph Compression With Reachability Relationship Extraction for IoT Devices. IEEE Internet of Things Journal. 10(13). 11343–11356. 19 indexed citations
14.
Gu, Ke, et al.. (2023). Dual Attribute-Based Auditing Scheme for Fog Computing-Based Data Dynamic Storage With Distributed Collaborative Verification. IEEE Transactions on Network and Service Management. 20(4). 4982–4999. 7 indexed citations
15.
Li, Dongfen, Ruijin Wang, Xiong Li, et al.. (2023). Ubiquitous intelligent federated learning privacy-preserving scheme under edge computing. Future Generation Computer Systems. 144. 205–218. 29 indexed citations
16.
Zhang, Shiwen, Mengling Li, Wei Liang, Arthur Sandor Voundi Koe, & Xiong Li. (2022). A Survey of Dummy-Based Location Privacy Protection Techniques for Location-Based Services. Sensors. 22(16). 6141–6141. 10 indexed citations
17.
Gu, Ke, et al.. (2021). Multi-Fogs-Based Traceable Privacy-Preserving Scheme for Vehicular Identity in Internet of Vehicles. IEEE Transactions on Intelligent Transportation Systems. 23(8). 12544–12561. 13 indexed citations
18.
Li, Xiong, et al.. (2019). A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems. IEEE Systems Journal. 14(1). 39–50. 166 indexed citations
19.
Shu, Ting, Wei Liu, Tian Wang, et al.. (2019). Broadcast Based Code Dissemination Scheme for Duty Cycle Based Wireless Sensor Networks. IEEE Access. 7. 105258–105286. 27 indexed citations
20.
Kumari, Saru, Marimuthu Karuppiah, Xiong Li, et al.. (2016). An enhanced and secure trust‐extended authentication mechanism for vehicular ad‐hoc networks. Security and Communication Networks. 9(17). 4255–4271. 38 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026