Xiyong Zhang

443 total citations
25 papers, 295 citations indexed

About

Xiyong Zhang is a scholar working on Artificial Intelligence, Computer Networks and Communications and Electrical and Electronic Engineering. According to data from OpenAlex, Xiyong Zhang has authored 25 papers receiving a total of 295 indexed citations (citations by other indexed papers that have themselves been cited), including 14 papers in Artificial Intelligence, 8 papers in Computer Networks and Communications and 8 papers in Electrical and Electronic Engineering. Recurrent topics in Xiyong Zhang's work include Coding theory and cryptography (8 papers), graph theory and CDMA systems (7 papers) and Cryptography and Data Security (6 papers). Xiyong Zhang is often cited by papers focused on Coding theory and cryptography (8 papers), graph theory and CDMA systems (7 papers) and Cryptography and Data Security (6 papers). Xiyong Zhang collaborates with scholars based in China, Australia and France. Xiyong Zhang's co-authors include Hua Guo, Zhoujun Li, Yi Mu, Claude Carlet, Tongge Xu, Yueqin Zheng, Rensen Zeng, Yuanyuan Song, Xin Liu and Jian Liu and has published in prestigious journals such as PLoS ONE, IEEE Transactions on Information Theory and Plant Cell & Environment.

In The Last Decade

Xiyong Zhang

20 papers receiving 275 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Xiyong Zhang China 10 149 132 105 76 33 25 295
Muhammad Altaf Khan Pakistan 11 73 0.5× 193 1.5× 60 0.6× 84 1.1× 11 0.3× 20 320
Suparna Bhattacharya United States 11 63 0.4× 152 1.2× 66 0.6× 47 0.6× 23 0.7× 39 280
Yifei Shen China 8 87 0.6× 75 0.6× 53 0.5× 128 1.7× 78 2.4× 22 417
Shilpi Sharma India 8 48 0.3× 54 0.4× 40 0.4× 35 0.5× 41 1.2× 38 194
P. Ravi Kiran Varma India 11 108 0.7× 176 1.3× 82 0.8× 22 0.3× 20 0.6× 26 320
Reinhard Gentz United States 9 42 0.3× 110 0.8× 16 0.2× 76 1.0× 12 0.4× 14 377
Udai Shanker India 10 51 0.3× 248 1.9× 89 0.8× 16 0.2× 16 0.5× 55 329
V. Lakshmi Narasimhan Australia 9 72 0.5× 112 0.8× 150 1.4× 24 0.3× 18 0.5× 50 317
Divakar Singh India 10 94 0.6× 25 0.2× 75 0.7× 7 0.1× 41 1.2× 52 260

Countries citing papers authored by Xiyong Zhang

Since Specialization
Citations

This map shows the geographic impact of Xiyong Zhang's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Xiyong Zhang with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Xiyong Zhang more than expected).

Fields of papers citing papers by Xiyong Zhang

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Xiyong Zhang. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Xiyong Zhang. The network helps show where Xiyong Zhang may publish in the future.

Co-authorship network of co-authors of Xiyong Zhang

This figure shows the co-authorship network connecting the top 25 collaborators of Xiyong Zhang. A scholar is included among the top collaborators of Xiyong Zhang based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Xiyong Zhang. Xiyong Zhang is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Guo, Hua, et al.. (2025). East: Efficient and Accurate Secure Inference Framework for Transformer. IEEE Transactions on Services Computing. 18(4). 2038–2046.
2.
You, Qiang, et al.. (2025). Forensic Support for Abraham et al.’s BB Protocol. Entropy. 27(5). 504–504.
3.
Guo, Hua, et al.. (2023). Some New Methods to Generate Short Addition Chains. IACR Transactions on Cryptographic Hardware and Embedded Systems. 270–285.
4.
Liu, Jian, et al.. (2023). Dynamic nitrogen reallocation in rice plants upon insect herbivory by a generalist lepidopteran pest Spodoptera litura (Fabricius). Plant Cell & Environment. 47(1). 294–307. 3 indexed citations
5.
Chen, Shuqin, et al.. (2023). Occupant-centric dynamic heating and cooling loads simplified prediction model for urban community at energy planning stage. Sustainable Cities and Society. 90. 104406–104406. 12 indexed citations
6.
Guo, Hua, et al.. (2023). A New Method of Construction of Permutation Trinomials with Coefficients 1. 40–44. 1 indexed citations
7.
Zheng, Yueqin, Xiyong Zhang, Xin Liu, et al.. (2021). Nitrogen Supply Alters Rice Defense Against the Striped Stem Borer Chilo suppressalis. Frontiers in Plant Science. 12. 691292–691292. 29 indexed citations
8.
Zhang, Huiying, Xin Liu, Xiyong Zhang, et al.. (2020). Phosphoinositide 3-Kinase Promotes Oxidative Burst, Stomatal Closure and Plant Immunity in Bacterial Invasion. Frontiers in Plant Science. 10. 9 indexed citations
9.
Chen, Shuqin, Xiyong Zhang, Shen Wei, et al.. (2019). An energy planning oriented method for analyzing spatial-temporal characteristics of electric loads for heating/cooling in district buildings with a case study of one university campus. Sustainable Cities and Society. 51. 101629–101629. 24 indexed citations
10.
Guo, Hua, Pei Wang, Xiyong Zhang, Yuanfei Huang, & Fangchao Ma. (2017). A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments. PLoS ONE. 12(11). e0187403–e0187403. 8 indexed citations
11.
Guo, Hua, Yandong Zheng, Xiyong Zhang, & Zhoujun Li. (2016). Exponential Arithmetic Based Self-Healing Group Key Distribution Scheme with Backward Secrecy under the Resource-Constrained Wireless Networks. Sensors. 16(5). 609–609. 5 indexed citations
12.
Zhang, Xiyong, Rongquan Feng, Qunying Liao, & Xuhong Gao. (2014). Finding normal bases over finite fields with prescribed trace self-orthogonal relations. Finite Fields and Their Applications. 28. 1–21.
13.
Zhang, Xiyong, Xiwang Cao, & Rongquan Feng. (2012). A method of evaluation of exponential sum of binary quadratic functions. Finite Fields and Their Applications. 18(6). 1089–1103. 1 indexed citations
14.
Zhang, Xiyong, et al.. (2012). Constructions of Quadratic and Cubic Rotation Symmetric Bent Functions. IEEE Transactions on Information Theory. 58(7). 4908–4913. 35 indexed citations
15.
Zhang, Xiyong, et al.. (2011). Proof of a conjecture about rotation symmetric functions. Discrete Mathematics. 311(14). 1281–1289. 9 indexed citations
16.
Zhang, Xiyong, et al.. (2011). The Degree of Balanced Elementary Symmetric Boolean Functions of <formula formulatype="inline"> <tex Notation="TeX">${{\bf 4k}+{\bf 3}}$</tex> </formula> Variables. IEEE Transactions on Information Theory. 57(7). 4822–4825. 10 indexed citations
17.
Guo, Hua, Yi Mu, Xiyong Zhang, & Zhoujun Li. (2010). Authenticated key exchange protocol with selectable identities. Wireless Communications and Mobile Computing. 11(2). 226–239. 3 indexed citations
18.
Guo, Hua, Xiyong Zhang, Yi Mu, & Zhoujun Li. (2009). An Efficient Certificateless Encryption Scheme in the Standard Model. 3958. 302–309. 4 indexed citations
19.
Guo, Hua, Zhoujun Li, Yi Mu, & Xiyong Zhang. (2008). Cryptanalysis of simple three-party key exchange protocol. Computers & Security. 27(1-2). 16–21. 62 indexed citations
20.
Fan, Shuqin, Wenbao Han, Keqin Feng, & Xiyong Zhang. (2005). Primitive normal polynomials with the first two coefficients prescribed: A revised p-adic method. Finite Fields and Their Applications. 13(3). 577–604. 8 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026