Xixiang Lv

413 total citations
24 papers, 251 citations indexed

About

Xixiang Lv is a scholar working on Artificial Intelligence, Computer Networks and Communications and Computer Vision and Pattern Recognition. According to data from OpenAlex, Xixiang Lv has authored 24 papers receiving a total of 251 indexed citations (citations by other indexed papers that have themselves been cited), including 18 papers in Artificial Intelligence, 14 papers in Computer Networks and Communications and 7 papers in Computer Vision and Pattern Recognition. Recurrent topics in Xixiang Lv's work include Cryptography and Data Security (14 papers), Security in Wireless Sensor Networks (8 papers) and Chaos-based Image/Signal Encryption (5 papers). Xixiang Lv is often cited by papers focused on Cryptography and Data Security (14 papers), Security in Wireless Sensor Networks (8 papers) and Chaos-based Image/Signal Encryption (5 papers). Xixiang Lv collaborates with scholars based in China, Australia and United States. Xixiang Lv's co-authors include Hui Li, Baocang Wang, Yi Mu, Ronghui Hou, Wenbin Dong, Yinghui Zhang, Jin Cao, Ruhui Ma, Bo Sun and Li Yang and has published in prestigious journals such as IEEE Internet of Things Journal, IEEE Transactions on Information Forensics and Security and Information Processing & Management.

In The Last Decade

Xixiang Lv

23 papers receiving 237 citations

Peers

Xixiang Lv
Frank Cangialosi United States
Oliver Michel United States
Anwar Hithnawi Switzerland
Aleksandra Mileva North Macedonia
Frank Cangialosi United States
Xixiang Lv
Citations per year, relative to Xixiang Lv Xixiang Lv (= 1×) peers Frank Cangialosi

Countries citing papers authored by Xixiang Lv

Since Specialization
Citations

This map shows the geographic impact of Xixiang Lv's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Xixiang Lv with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Xixiang Lv more than expected).

Fields of papers citing papers by Xixiang Lv

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Xixiang Lv. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Xixiang Lv. The network helps show where Xixiang Lv may publish in the future.

Co-authorship network of co-authors of Xixiang Lv

This figure shows the co-authorship network connecting the top 25 collaborators of Xixiang Lv. A scholar is included among the top collaborators of Xixiang Lv based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Xixiang Lv. Xixiang Lv is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Lv, Xixiang, et al.. (2023). VerFHS: Verifiable Image Retrieval on Forward Privacy in Blockchain-Enabled IoT. IEEE Internet of Things Journal. 10(19). 17465–17478. 4 indexed citations
2.
Chen, Hao, Xixiang Lv, & Wei Zheng. (2023). AFL: Attention-Based Byzantine-Robust Federated Learning with Vector Filter. 595–600. 1 indexed citations
3.
Lv, Xixiang, et al.. (2021). SPChain: Blockchain-based medical data sharing and privacy-preserving eHealth system. Information Processing & Management. 58(4). 102604–102604. 87 indexed citations
4.
Tondi, Benedetta, et al.. (2020). Challenging the Adversarial Robustness of DNNs Based on Error-Correcting Output Codes. Security and Communication Networks. 2020. 1–11. 6 indexed citations
5.
Yang, Guomin, et al.. (2020). Message-Locked Searchable Encryption: A New Versatile Tool for Secure Cloud Storage. IEEE Transactions on Services Computing. 15(3). 1664–1677. 5 indexed citations
6.
Hou, Ronghui, et al.. (2020). Beam Management for Cellular-Connected UAVs: A Fast Link Recovery Approach. 758–763. 1 indexed citations
7.
Hou, Ronghui, et al.. (2019). Physical Layer Security of OFDM Communication Using Artificial Pilot Noise. 11. 1–6. 3 indexed citations
8.
Dong, Wenbin, Li Yang, Ronghui Hou, et al.. (2019). A Blockchain-Based Hierarchical Reputation Management Scheme in Vehicular Network. 1–6. 15 indexed citations
9.
Lv, Xixiang, et al.. (2019). Blockchain-based photo forensics with permissible transformations. Computers & Security. 87. 101567–101567. 12 indexed citations
10.
Ma, Ruhui, Jin Cao, Dengguo Feng, et al.. (2018). PPSHA: Privacy preserving secure handover authentication scheme for all application scenarios in LTE-A networks. Ad Hoc Networks. 87. 49–60. 18 indexed citations
11.
Lv, Xixiang, Yi Mu, & Hui Li. (2014). Loss-Tolerant Bundle Fragment Authentication for Space-Based DTNs. IEEE Transactions on Dependable and Secure Computing. 12(6). 615–625. 3 indexed citations
12.
Lv, Xixiang, Yi Mu, & Hui Li. (2014). Key management for Smart Grid based on asymmetric key-wrapping. International Journal of Computer Mathematics. 92(3). 498–512. 1 indexed citations
13.
Lv, Xixiang, Yi Mu, & Hui Li. (2013). Key distribution for heterogeneous public-key cryptosystems. Journal of Communications and Networks. 15(5). 464–468. 2 indexed citations
14.
Lv, Xixiang & Hui Li. (2013). Secure group communication with both confidentiality and non‐repudiation for mobile ad‐hoc networks. IET Information Security. 7(2). 61–66. 9 indexed citations
15.
Lv, Xixiang, Hui Li, & Baocang Wang. (2013). Authenticated asymmetric group key agreement based on certificateless cryptosystem. International Journal of Computer Mathematics. 91(3). 447–460. 20 indexed citations
16.
Lv, Xixiang, Yi Mu, & Hui Li. (2013). Non-Interactive Key Establishment for Bundle Security Protocol of Space DTNs. IEEE Transactions on Information Forensics and Security. 9(1). 5–13. 16 indexed citations
17.
Lv, Xixiang. (2012). Group Key Agreement From Signcryption. KSII Transactions on Internet and Information Systems. 2 indexed citations
18.
Lv, Xixiang, Hui Li, & Baocang Wang. (2012). Virtual private key generator based escrow‐free certificateless public key cryptosystem for mobile ad hoc networks. Security and Communication Networks. 6(1). 49–57. 2 indexed citations
19.
Lv, Xixiang, Hui Li, & Baocang Wang. (2011). Identity-based key distribution for mobile Ad Hoc networks. Frontiers of Computer Science in China. 5(4). 442–447. 6 indexed citations
20.
Lv, Xixiang & Hui Li. (2009). ID-based authenticated group key agreement from bilinear maps. Frontiers of Computer Science in China. 4(2). 302–307. 2 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026