Yannick Chevalier

3.1k total citations
39 papers, 339 citations indexed

About

Yannick Chevalier is a scholar working on Computer Networks and Communications, Artificial Intelligence and Information Systems. According to data from OpenAlex, Yannick Chevalier has authored 39 papers receiving a total of 339 indexed citations (citations by other indexed papers that have themselves been cited), including 22 papers in Computer Networks and Communications, 17 papers in Artificial Intelligence and 16 papers in Information Systems. Recurrent topics in Yannick Chevalier's work include Advanced Authentication Protocols Security (17 papers), User Authentication and Security Systems (12 papers) and Cryptography and Data Security (10 papers). Yannick Chevalier is often cited by papers focused on Advanced Authentication Protocols Security (17 papers), User Authentication and Security Systems (12 papers) and Cryptography and Data Security (10 papers). Yannick Chevalier collaborates with scholars based in France, Germany and Russia. Yannick Chevalier's co-authors include Michaël Rusinowitch, Mathieu Turuani, Ralf Küsters, Laurent Vigneron, M. Rusinowitch, Paul Drielsma, Jacopo Mantovani, Jorge Cuéllar, Luca Compagna and Igor Kotenko and has published in prestigious journals such as SHILAP Revista de lepidopterología, Journal of Network and Computer Applications and Theoretical Computer Science.

In The Last Decade

Yannick Chevalier

38 papers receiving 314 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Yannick Chevalier France 11 227 185 157 47 42 39 339
Anish Mathuria India 5 339 1.5× 231 1.2× 246 1.6× 56 1.2× 20 0.5× 16 450
Sisi Duan China 14 303 1.3× 231 1.2× 152 1.0× 26 0.6× 18 0.4× 51 491
Lucca Hirschi France 7 293 1.3× 190 1.0× 135 0.9× 105 2.2× 13 0.3× 9 384
Shuming Qiu China 6 245 1.1× 235 1.3× 161 1.0× 61 1.3× 11 0.3× 10 386
Hsin‐Wen Wei Taiwan 11 573 2.5× 339 1.8× 87 0.6× 71 1.5× 51 1.2× 81 685
Qinlong Huang China 14 166 0.7× 352 1.9× 427 2.7× 64 1.4× 31 0.7× 38 577
Myrto Arapinis United Kingdom 9 197 0.9× 159 0.9× 181 1.2× 86 1.8× 25 0.6× 23 335
Liming Wang China 9 148 0.7× 76 0.4× 115 0.7× 51 1.1× 14 0.3× 65 298
Shinjo Park Germany 9 189 0.8× 93 0.5× 116 0.7× 121 2.6× 9 0.2× 9 298
Angelo De Switzerland 5 154 0.7× 352 1.9× 490 3.1× 51 1.1× 67 1.6× 9 587

Countries citing papers authored by Yannick Chevalier

Since Specialization
Citations

This map shows the geographic impact of Yannick Chevalier's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Yannick Chevalier with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Yannick Chevalier more than expected).

Fields of papers citing papers by Yannick Chevalier

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Yannick Chevalier. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Yannick Chevalier. The network helps show where Yannick Chevalier may publish in the future.

Co-authorship network of co-authors of Yannick Chevalier

This figure shows the co-authorship network connecting the top 25 collaborators of Yannick Chevalier. A scholar is included among the top collaborators of Yannick Chevalier based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Yannick Chevalier. Yannick Chevalier is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Chevalier, Yannick, et al.. (2021). Cyberattack detection in vehicles using characteristic functions, artificial neural networks, and visual analysis. SHILAP Revista de lepidopterología. 20(4). 845–868. 3 indexed citations
2.
Rieke, Roland, et al.. (2020). Continuous fields: Enhanced in-vehicle anomaly detection using machine learning models. Simulation Modelling Practice and Theory. 105. 102143–102143. 13 indexed citations
3.
Chevalier, Yannick, et al.. (2020). Design and verification of a mobile robot based on the integrated model of cyber-Physical systems. Simulation Modelling Practice and Theory. 105. 102151–102151. 13 indexed citations
4.
Chevalier, Yannick, et al.. (2017). Bases linguistiques de l’émancipation : système anglais, système français. Mots. 113. 9–36. 6 indexed citations
5.
Chevalier, Yannick, et al.. (2016). Intruder deducibility constraints with negation. Decidability and application to secured service compositions. Journal of Symbolic Computation. 80. 4–26. 2 indexed citations
6.
Chevalier, Yannick, et al.. (2016). Satisfiability of general intruder constraints with and without a set constructor. Journal of Symbolic Computation. 80. 27–61. 1 indexed citations
7.
Chevalier, Yannick. (2016). Enseigner la grammaire du genre : à propos du traitement idéologique de la langue dans les manuels scolaires de CE1. Le Français aujourd hui. N° 193(2). 33–44. 2 indexed citations
8.
Chevalier, Yannick, et al.. (2014). Parametrized automata simulation and application to service composition. Journal of Symbolic Computation. 69. 40–60. 1 indexed citations
9.
Tounsi, Wiem, Nora Cuppens-Boulahia, Joaquín García-Alfaro, Yannick Chevalier, & Frédéric Cuppens. (2013). KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems. Journal of Network and Computer Applications. 39. 152–166. 5 indexed citations
10.
Chevalier, Yannick, et al.. (2010). Le Chantier littéraire. HAL (Le Centre pour la Communication Scientifique Directe). 1 indexed citations
11.
Chevalier, Yannick & Michaël Rusinowitch. (2009). Symbolic protocol analysis in the union of disjoint intruder theories: Combining decision procedures. Theoretical Computer Science. 411(10). 1261–1282. 3 indexed citations
12.
Chevalier, Yannick, Ralf Küsters, Michaël Rusinowitch, & Mathieu Turuani. (2008). Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption. ACM Transactions on Computational Logic. 9(4). 1–52. 7 indexed citations
13.
Chevalier, Yannick & Michaël Rusinowitch. (2007). Hierarchical combination of intruder theories. Information and Computation. 206(2-4). 352–377. 5 indexed citations
14.
Rousseau, François, Fabrice Heitz, Yannick Chevalier, et al.. (2007). An A Contrario Approach for Change Detection in 3D Multimodal Images: Application to Multiple Sclerosis in MRI. Conference proceedings. 2007. 2069–2072. 10 indexed citations
15.
Chevalier, Yannick, Ralf Küsters, Michaël Rusinowitch, & Mathieu Turuani. (2005). An NP decision procedure for protocol insecurity with XOR. Theoretical Computer Science. 338(1-3). 247–274. 16 indexed citations
16.
Chevalier, Yannick, Ralf Küsters, Michaël Rusinowitch, & Mathieu Turuani. (2004). Deciding the Security of Protocols with Commuting Public Key Encryption.. HAL (Le Centre pour la Communication Scientifique Directe). 78. 1 indexed citations
17.
Chevalier, Yannick & Laurent Vigneron. (2001). Towards Efficient Automated Verification of Security Protocols. HAL (Le Centre pour la Communication Scientifique Directe). 2 indexed citations
18.
Chevalier, Yannick, et al.. (1997). Technique combining the finite-difference time domain and the uniform theory of diffraction. Microwave and Optical Technology Letters. 16(1). 21–23. 3 indexed citations
19.
Chevalier, Yannick, et al.. (1996). Electromagnetic "zoom" in FDTD. ap 14. 435–439. 1 indexed citations
20.
Chevalier, Yannick, et al.. (1978). A novel photovoltaic panel for low cost power. pvsp. 738–743. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026