Yan Ke

716 total citations
34 papers, 370 citations indexed

About

Yan Ke is a scholar working on Computer Vision and Pattern Recognition, Artificial Intelligence and Mechanical Engineering. According to data from OpenAlex, Yan Ke has authored 34 papers receiving a total of 370 indexed citations (citations by other indexed papers that have themselves been cited), including 20 papers in Computer Vision and Pattern Recognition, 7 papers in Artificial Intelligence and 4 papers in Mechanical Engineering. Recurrent topics in Yan Ke's work include Advanced Steganography and Watermarking Techniques (19 papers), Chaos-based Image/Signal Encryption (14 papers) and Digital Media Forensic Detection (14 papers). Yan Ke is often cited by papers focused on Advanced Steganography and Watermarking Techniques (19 papers), Chaos-based Image/Signal Encryption (14 papers) and Digital Media Forensic Detection (14 papers). Yan Ke collaborates with scholars based in China, United States and Australia. Yan Ke's co-authors include Minqing Zhang, Jia Liu, Xiaoyuan Yang, Tingting Su, Lei Yu, Zhuo Zhang, Jun Li, Xinpeng Zhang, Xiaoyuan Yang and Qunsheng Peng and has published in prestigious journals such as SHILAP Revista de lepidopterología, Applied Catalysis B: Environmental and Chemical Engineering Journal.

In The Last Decade

Yan Ke

27 papers receiving 352 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Yan Ke China 10 287 61 29 20 18 34 370
Chen Shen China 6 288 1.0× 109 1.8× 10 0.3× 31 1.6× 11 0.6× 20 347
Zhuoran Shen Hong Kong 3 97 0.3× 40 0.7× 23 0.8× 11 0.6× 3 0.2× 3 150
Kailash J. Karande India 8 75 0.3× 41 0.7× 12 0.4× 35 1.8× 10 0.6× 36 200
Jianhua Yang China 7 215 0.7× 39 0.6× 15 0.5× 10 0.5× 2 0.1× 14 277
Junjie Ke United States 7 159 0.6× 84 1.4× 32 1.1× 12 0.6× 4 0.2× 16 258
Jiawang Bai China 6 34 0.1× 62 1.0× 8 0.3× 16 0.8× 3 0.2× 11 135
Dehua Song China 6 175 0.6× 33 0.5× 71 2.4× 63 3.1× 3 0.2× 9 228
Miaohua Zhang Australia 8 110 0.4× 42 0.7× 56 1.9× 15 0.8× 2 0.1× 17 182
Brandon Yang United States 4 96 0.3× 61 1.0× 14 0.5× 4 0.2× 4 0.2× 5 161
Niv Giladi Israel 2 73 0.3× 76 1.2× 6 0.2× 6 0.3× 20 1.1× 3 162

Countries citing papers authored by Yan Ke

Since Specialization
Citations

This map shows the geographic impact of Yan Ke's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Yan Ke with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Yan Ke more than expected).

Fields of papers citing papers by Yan Ke

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Yan Ke. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Yan Ke. The network helps show where Yan Ke may publish in the future.

Co-authorship network of co-authors of Yan Ke

This figure shows the co-authorship network connecting the top 25 collaborators of Yan Ke. A scholar is included among the top collaborators of Yan Ke based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Yan Ke. Yan Ke is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
2.
Ke, Yan, Jia Liu, & Yiliang Han. (2025). Two-stage reversible data hiding in encrypted domain with public key embedding mechanism. Signal Processing. 233. 109918–109918.
3.
Ke, Yan, et al.. (2025). Federated Learning With Security Authentication and Traceability of Poisoning by Embedded Message Authentication Code. IEEE Transactions on Dependable and Secure Computing. 22(5). 4927–4941. 1 indexed citations
4.
Zhang, Yimin, Yonglin Ren, Yun Zu, et al.. (2024). Disassembly-reassembly-phosphating strategy to fabricate hydrothermally-stable hierarchical P@ZSM-5 zeolite for efficient methanol-to-propylene. Chemical Engineering Journal. 497. 154755–154755. 8 indexed citations
5.
Ke, Yan, et al.. (2024). Research on three-dimensional perception and protection technology for power construction safety operations. International Journal of Wireless and Mobile Computing. 27(2). 133–140.
6.
Zhang, Yimin, Yun Zu, Yan Ke, et al.. (2024). Reinforcement and reconfiguration of framework Al in P@ZSM-5 zeolite via in-situ phosphating strategy for efficient methanol-to-propylene. Applied Catalysis B: Environmental. 357. 124292–124292. 6 indexed citations
7.
Liu, Jia, et al.. (2024). StegaINR4MIH: steganography by implicit neural representation for multi-image hiding. Journal of Electronic Imaging. 33(6).
8.
Zhang, Minqing, et al.. (2024). General secure encryption algorithm for separable reversible data hiding in encrypted domain. Journal of King Saud University - Computer and Information Sciences. 36(9). 102217–102217. 1 indexed citations
9.
Pan, Jing, Wenxia Xu, Yingying Zhang, et al.. (2024). Osmotic energy-based systems for self-powered sensing. Nano Energy. 132. 110412–110412. 8 indexed citations
10.
Zhu, Yongsheng, et al.. (2023). A robust FOD acoustic detection method for rocket tank final assembly process. Applied Acoustics. 211. 109479–109479.
11.
Zhang, Minqing, et al.. (2022). Reversible Data Hiding in Encrypted Domain Based on the Error-Correction Redundancy of Encryption Process. Security and Communication Networks. 2022. 1–17. 2 indexed citations
12.
Zhang, Liancheng, et al.. (2022). Experimental study of multi-bubble hydraulic efficiency of spark-generated bubbles. AIP Advances. 12(9). 5 indexed citations
13.
Zhang, Minqing, et al.. (2020). Separable Reversible Data Hiding Scheme in Homomorphic Encrypted Domain Based on NTRU. IEEE Access. 8. 81412–81424. 15 indexed citations
14.
Ke, Yan, Minqing Zhang, Jia Liu, Tingting Su, & Xiaoyuan Yang. (2020). Fully Homomorphic Encryption Encapsulated Difference Expansion for Reversible Data Hiding in Encrypted Domain. IEEE Transactions on Circuits and Systems for Video Technology. 30(8). 2353–2365. 63 indexed citations
15.
Zhang, Minqing, et al.. (2019). Reversible Data Hiding Scheme in Homomorphic Encrypted Image Based on EC-EG. Applied Sciences. 9(14). 2910–2910. 3 indexed citations
16.
Zhang, Zhuo, Jia Liu, Yan Ke, et al.. (2019). Generative Steganography by Sampling. IEEE Access. 7. 118586–118597. 29 indexed citations
17.
Ke, Yan, et al.. (2018). A multilevel reversible data hiding scheme in encrypted domain based on LWE. Journal of Visual Communication and Image Representation. 54. 133–144. 16 indexed citations
18.
Liu, Jia, et al.. (2018). Digital Cardan Grille. 441–446. 7 indexed citations
19.
Ke, Yan, Minqing Zhang, Jia Liu, Tingting Su, & Xiaoyuan Yang. (2018). Generative steganography with Kerckhoffs’ principle. Multimedia Tools and Applications. 78(10). 13805–13818. 22 indexed citations
20.
Zhang, Yanwei, Yan Ke, Kunzan Qiu, et al.. (2015). Catalyst for Lithium Perchlorate Decomposition. Journal of Propulsion and Power. 31(5). 1445–1451. 4 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026