Xuyun Nie

722 total citations
26 papers, 461 citations indexed

About

Xuyun Nie is a scholar working on Artificial Intelligence, Information Systems and Computational Theory and Mathematics. According to data from OpenAlex, Xuyun Nie has authored 26 papers receiving a total of 461 indexed citations (citations by other indexed papers that have themselves been cited), including 22 papers in Artificial Intelligence, 13 papers in Information Systems and 7 papers in Computational Theory and Mathematics. Recurrent topics in Xuyun Nie's work include Cryptography and Data Security (16 papers), Privacy-Preserving Technologies in Data (12 papers) and Cloud Data Security Solutions (12 papers). Xuyun Nie is often cited by papers focused on Cryptography and Data Security (16 papers), Privacy-Preserving Technologies in Data (12 papers) and Cloud Data Security Solutions (12 papers). Xuyun Nie collaborates with scholars based in China, Pakistan and Canada. Xuyun Nie's co-authors include Jianfei Sun, Hu Xiong, Yangyang Bao, Fagen Li, Yinghui Zhang, Muhammad Umar Aftab, Xingbing Fu, Robert H. Deng, Ximeng Liu and MingJian Tang and has published in prestigious journals such as IEEE Access, IEEE Transactions on Industrial Informatics and Neurocomputing.

In The Last Decade

Xuyun Nie

21 papers receiving 443 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Xuyun Nie China 11 352 253 134 43 41 26 461
Zhibin Zhou United States 9 379 1.1× 303 1.2× 229 1.7× 27 0.6× 62 1.5× 16 543
Meixia Miao China 13 413 1.2× 265 1.0× 149 1.1× 36 0.8× 24 0.6× 36 506
Angelo De Switzerland 5 490 1.4× 352 1.4× 154 1.1× 34 0.8× 67 1.6× 9 587
Anish Mathuria India 5 246 0.7× 231 0.9× 339 2.5× 29 0.7× 20 0.5× 16 450
Qinlong Huang China 14 427 1.2× 352 1.4× 166 1.2× 29 0.7× 31 0.8× 38 577
Isaac Agudo Spain 11 223 0.6× 179 0.7× 202 1.5× 97 2.3× 17 0.4× 33 432
Matthew W. Pagano United States 7 509 1.4× 367 1.5× 143 1.1× 32 0.7× 80 2.0× 9 633
Syam Kumar Pasupuleti India 14 439 1.2× 435 1.7× 152 1.1× 19 0.4× 45 1.1× 42 585
Jorge Cuéllar Germany 9 213 0.6× 235 0.9× 308 2.3× 59 1.4× 36 0.9× 28 454

Countries citing papers authored by Xuyun Nie

Since Specialization
Citations

This map shows the geographic impact of Xuyun Nie's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Xuyun Nie with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Xuyun Nie more than expected).

Fields of papers citing papers by Xuyun Nie

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Xuyun Nie. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Xuyun Nie. The network helps show where Xuyun Nie may publish in the future.

Co-authorship network of co-authors of Xuyun Nie

This figure shows the co-authorship network connecting the top 25 collaborators of Xuyun Nie. A scholar is included among the top collaborators of Xuyun Nie based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Xuyun Nie. Xuyun Nie is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
2.
Aftab, Muhammad Umar, et al.. (2022). Traditional and Hybrid Access Control Models: A Detailed Survey. Security and Communication Networks. 2022. 1–12. 10 indexed citations
3.
Chen, Dajiang, Ning Zhang, Xuyun Nie, et al.. (2022). Privacy-Preserving Encrypted Traffic Inspection With Symmetric Cryptographic Techniques in IoT. IEEE Internet of Things Journal. 9(18). 17265–17279. 33 indexed citations
4.
Liu, Mengjuan, et al.. (2022). Bid optimization using maximum entropy reinforcement learning. Neurocomputing. 501. 529–543. 3 indexed citations
5.
Sun, Jianfei, Dajiang Chen, Ning Zhang, et al.. (2021). A Privacy-Aware and Traceable Fine-Grained Data Delivery System in Cloud-Assisted Healthcare IIoT. IEEE Internet of Things Journal. 8(12). 10034–10046. 15 indexed citations
6.
Sun, Jianfei, Yu Yuan, MingJian Tang, et al.. (2021). Privacy-Preserving Bilateral Fine-Grained Access Control for Cloud-Enabled Industrial IoT Healthcare. IEEE Transactions on Industrial Informatics. 18(9). 6483–6493. 64 indexed citations
7.
Liu, Mengjuan, et al.. (2020). A Dynamic Bidding Strategy Based on Model-Free Reinforcement Learning in Display Advertising. IEEE Access. 8. 213587–213601. 8 indexed citations
8.
Sun, Jianfei, Hu Xiong, Ximeng Liu, et al.. (2020). Lightweight and Privacy-Aware Fine-Grained Access Control for IoT-Oriented Smart Health. IEEE Internet of Things Journal. 7(7). 6566–6575. 78 indexed citations
9.
Sun, Jianfei, et al.. (2019). Efficient Ranked Multi-Keyword Retrieval With Privacy Protection for Multiple Data Owners in Cloud Computing. IEEE Systems Journal. 14(2). 1728–1739. 29 indexed citations
10.
Liao, Yongjian, et al.. (2019). Revisit of Certificateless Signature Scheme Used to Remote Authentication Schemes for Wireless Body Area Networks. IEEE Internet of Things Journal. 7(3). 2160–2168. 17 indexed citations
11.
Sun, Jianfei, et al.. (2019). Fine-Grained Ranked Multi-Keyword Search Over Hierarchical Data for IoT-Oriented Health System. IEEE Access. 7. 101969–101980. 5 indexed citations
12.
Aftab, Muhammad Umar, et al.. (2019). Role-Based ABAC Model for Implementing Least Privileges. 467–471. 9 indexed citations
13.
Sun, Jianfei, Hu Xiong, Xuyun Nie, Yinghui Zhang, & Pengfei Wu. (2019). On the Security of Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting. IEEE Transactions on Dependable and Secure Computing. 1–1. 11 indexed citations
14.
Lü, Gang, et al.. (2018). Cryptanalysis of Novel Extended Multivariate Public Key Cryptosystem with Invertible Cycle.. Int. J. Netw. Secur.. 20. 509–514. 1 indexed citations
15.
Sun, Jianfei, et al.. (2017). Revocable ABE with Bounded Ciphertext in Cloud Computing.. Int. J. Netw. Secur.. 19. 973–983. 1 indexed citations
16.
Fu, Xingbing, Xuyun Nie, Ting Wu, & Fagen Li. (2017). Large universe attribute based access control with efficient decryption in cloud storage system. Journal of Systems and Software. 135. 157–164. 48 indexed citations
17.
Nie, Xuyun, et al.. (2016). Analysis of Second Order Matrices Construction in MFE Public Key Cryptosystem. International journal of network security. 18(1). 158–164. 1 indexed citations
18.
Nie, Xuyun, Albrecht Petzoldt, Johannes Buchmann, & Fagen Li. (2014). Linearization Equation Attack on 2-Layer Nonlinear Piece in Hand Method. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. E97.A(9). 1952–1961. 2 indexed citations
19.
Li, Fagen, Hu Xiong, & Xuyun Nie. (2009). A new multi-receiver ID-based signcryption scheme for group communications. 296–300. 10 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026