Xuehui Du

776 total citations
53 papers, 463 citations indexed

About

Xuehui Du is a scholar working on Computer Networks and Communications, Artificial Intelligence and Information Systems. According to data from OpenAlex, Xuehui Du has authored 53 papers receiving a total of 463 indexed citations (citations by other indexed papers that have themselves been cited), including 34 papers in Computer Networks and Communications, 26 papers in Artificial Intelligence and 14 papers in Information Systems. Recurrent topics in Xuehui Du's work include Network Security and Intrusion Detection (15 papers), Opportunistic and Delay-Tolerant Networks (11 papers) and Advanced Malware Detection Techniques (10 papers). Xuehui Du is often cited by papers focused on Network Security and Intrusion Detection (15 papers), Opportunistic and Delay-Tolerant Networks (11 papers) and Advanced Malware Detection Techniques (10 papers). Xuehui Du collaborates with scholars based in China, Hong Kong and Japan. Xuehui Du's co-authors include Wenjuan Wang, Na Wang, Xingyuan Chen, Ruoxi Qin, Xing Liu, Hongqi Zhang, Chuanfu Zhang, Zhen Wang, Feng Li and Xiangyu Wu and has published in prestigious journals such as IEEE Access, Information Sciences and IEEE Transactions on Information Forensics and Security.

In The Last Decade

Xuehui Du

45 papers receiving 430 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Xuehui Du China 10 323 265 157 119 32 53 463
Basil AsSadhan Saudi Arabia 14 317 1.0× 284 1.1× 173 1.1× 99 0.8× 45 1.4× 34 451
Richard Zuech United States 8 326 1.0× 267 1.0× 167 1.1× 105 0.9× 30 0.9× 15 423
Μάριος Αναγνωστόπουλος Greece 9 215 0.7× 155 0.6× 155 1.0× 142 1.2× 29 0.9× 18 339
Abdulghani Ali Ahmed Malaysia 12 238 0.7× 205 0.8× 173 1.1× 233 2.0× 31 1.0× 34 459
A. Malathi India 9 330 1.0× 342 1.3× 173 1.1× 67 0.6× 18 0.6× 30 491
Chun-Jen Chung United States 8 352 1.1× 203 0.8× 139 0.9× 189 1.6× 20 0.6× 16 475
Flavio Lombardi Italy 10 287 0.9× 222 0.8× 119 0.8× 422 3.5× 41 1.3× 31 593
Raed Alharthi United States 7 231 0.7× 189 0.7× 147 0.9× 72 0.6× 29 0.9× 25 355
Ariana Mirian United States 8 335 1.0× 281 1.1× 219 1.4× 219 1.8× 45 1.4× 17 515
Massimo Merro Italy 13 278 0.9× 256 1.0× 54 0.3× 78 0.7× 37 1.2× 45 485

Countries citing papers authored by Xuehui Du

Since Specialization
Citations

This map shows the geographic impact of Xuehui Du's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Xuehui Du with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Xuehui Du more than expected).

Fields of papers citing papers by Xuehui Du

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Xuehui Du. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Xuehui Du. The network helps show where Xuehui Du may publish in the future.

Co-authorship network of co-authors of Xuehui Du

This figure shows the co-authorship network connecting the top 25 collaborators of Xuehui Du. A scholar is included among the top collaborators of Xuehui Du based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Xuehui Du. Xuehui Du is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
2.
Du, Xuehui, et al.. (2025). ABAC policy mining method for heterogeneous access control system. The Journal of Supercomputing. 81(9).
4.
Du, Xuehui, et al.. (2024). Dynamic fine-grained access control for smart contracts based on improved attribute-based signature. The Journal of Supercomputing. 81(1). 1 indexed citations
5.
Wu, Xiangyu, et al.. (2024). CRBFT: A Byzantine Fault-Tolerant Consensus Protocol Based on Collaborative Filtering Recommendation for Blockchains. Computers, materials & continua/Computers, materials & continua (Print). 80(1). 1491–1519. 1 indexed citations
6.
Du, Xuehui, et al.. (2023). Redactable consortium blockchain based on verifiable distributed chameleon hash functions. Journal of Parallel and Distributed Computing. 183. 104777–104777. 5 indexed citations
7.
Du, Xuehui, et al.. (2023). AdaSTopk: Adaptive federated shuffle model based on differential privacy. Information Sciences. 642. 119186–119186. 6 indexed citations
8.
Wu, Xiangyu, et al.. (2023). TaintGuard: Preventing implicit privilege leakage in smart contract based on taint tracking at abstract syntax tree level. Journal of Systems Architecture. 141. 102925–102925. 5 indexed citations
9.
Li, Feng, et al.. (2023). Image Feature Fusion Method Based on Edge Detection. Information Technology And Control. 52(1). 5–24. 9 indexed citations
10.
Qin, Ruoxi, et al.. (2023). Adversarial robustness in deep neural networks based on variable attributes of the stochastic ensemble model. Frontiers in Neurorobotics. 17. 1205370–1205370.
11.
Du, Xuehui, et al.. (2023). KPI-HGNN: Key provenance identification based on a heterogeneous graph neural network for big data access control. Information Sciences. 659. 120059–120059. 7 indexed citations
12.
Du, Xuehui, et al.. (2022). GNN-based Method for Predicting Access Control Relationships for Big Data. 342–346. 2 indexed citations
13.
Wang, Na, et al.. (2021). Deep Learning based Privacy Information Identification approach for Unstructured Text. Journal of Physics Conference Series. 1848(1). 12032–12032. 1 indexed citations
14.
Chen, Xingyuan, et al.. (2020). A Big Data Provenance Model for Data Security Supervision Based on PROV-DM Model. IEEE Access. 8. 38742–38752. 18 indexed citations
15.
Wang, Wenjuan, et al.. (2020). Cloud Intrusion Detection Method Based on Stacked Contractive Auto-Encoder and Support Vector Machine. IEEE Transactions on Cloud Computing. 10(3). 1634–1646. 108 indexed citations
16.
Du, Xuehui, et al.. (2020). Dynamic Control Method for Tenants’ Sensitive Information Flow Based on Virtual Boundary Recognition. IEEE Access. 8. 162548–162568. 3 indexed citations
18.
Du, Xuehui, et al.. (2018). Data streams anomaly detection algorithm based on self-set threshold. 18–26. 3 indexed citations
19.
Du, Xuehui, et al.. (2010). A DTN congestion mechanism based on Distributed Storage. 385–389. 6 indexed citations
20.
Du, Xuehui, et al.. (2010). A DTN congestion avoidance strategy based on path avoidance. V1–855. 8 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026