Yilei Wang

829 total citations
43 papers, 531 citations indexed

About

Yilei Wang is a scholar working on Information Systems, Artificial Intelligence and Computer Networks and Communications. According to data from OpenAlex, Yilei Wang has authored 43 papers receiving a total of 531 indexed citations (citations by other indexed papers that have themselves been cited), including 28 papers in Information Systems, 22 papers in Artificial Intelligence and 11 papers in Computer Networks and Communications. Recurrent topics in Yilei Wang's work include Cryptography and Data Security (17 papers), Blockchain Technology Applications and Security (14 papers) and Privacy-Preserving Technologies in Data (13 papers). Yilei Wang is often cited by papers focused on Cryptography and Data Security (17 papers), Blockchain Technology Applications and Security (14 papers) and Privacy-Preserving Technologies in Data (13 papers). Yilei Wang collaborates with scholars based in China, United Kingdom and Australia. Yilei Wang's co-authors include Guoshi Wu, Huiyu Zhou, Hongchang Shi, Ruimao Hua, Mohammad R. Khosravi, Guanfeng Liu, Yuwen Liu, Guangshun Li, Lianyong Qi and Wajid Rafique and has published in prestigious journals such as SHILAP Revista de lepidopterología, Scientific Reports and Physical Chemistry Chemical Physics.

In The Last Decade

Yilei Wang

39 papers receiving 514 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Yilei Wang China 12 212 205 128 76 48 43 531
Tetsutaro Uehara Japan 10 105 0.5× 233 1.1× 161 1.3× 45 0.6× 163 3.4× 58 576
Durgesh Kumar Mishra India 10 105 0.5× 77 0.4× 106 0.8× 50 0.7× 51 1.1× 59 446
Ibragim Suleimenov Kazakhstan 14 148 0.7× 161 0.8× 73 0.6× 96 1.3× 14 0.3× 117 650
Hengwei Zhang China 17 105 0.5× 162 0.8× 265 2.1× 160 2.1× 23 0.5× 88 764
Sumit Mittal India 14 58 0.3× 109 0.5× 103 0.8× 93 1.2× 61 1.3× 73 578
Yitong Li China 10 528 2.5× 258 1.3× 137 1.1× 120 1.6× 99 2.1× 37 924
Siegfried Benkner Austria 17 134 0.6× 310 1.5× 568 4.4× 36 0.5× 54 1.1× 91 955
Yimin Guo China 15 91 0.4× 315 1.5× 255 2.0× 44 0.6× 21 0.4× 31 486
S. Siva Sathya India 11 226 1.1× 79 0.4× 198 1.5× 168 2.2× 59 1.2× 44 771
Guang Yu China 10 225 1.1× 142 0.7× 103 0.8× 14 0.2× 73 1.5× 22 389

Countries citing papers authored by Yilei Wang

Since Specialization
Citations

This map shows the geographic impact of Yilei Wang's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Yilei Wang with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Yilei Wang more than expected).

Fields of papers citing papers by Yilei Wang

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Yilei Wang. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Yilei Wang. The network helps show where Yilei Wang may publish in the future.

Co-authorship network of co-authors of Yilei Wang

This figure shows the co-authorship network connecting the top 25 collaborators of Yilei Wang. A scholar is included among the top collaborators of Yilei Wang based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Yilei Wang. Yilei Wang is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Chen, Zhenhua, et al.. (2025). A New Functional Encryption Scheme Supporting Privacy-Preserving Maximum Similarity for Web Service Platforms. IEEE Transactions on Information Forensics and Security. 20. 2621–2631.
2.
Wang, Yilei, et al.. (2025). Evaluating the ability of large language models to emulate personality. Scientific Reports. 15(1). 519–519. 7 indexed citations
3.
Li, Tao, Tao Li, Yilei Wang, et al.. (2024). HT2REP: A fair cross-chain atomic exchange protocol under UC framework based on HTLCs and TRE. Computer Standards & Interfaces. 89. 103834–103834. 1 indexed citations
4.
Wang, Yilei, et al.. (2024). A Detection Method Against Selfish Mining-Like Attacks Based on Ensemble Deep Learning in IoT. IEEE Internet of Things Journal. 11(11). 19564–19574. 1 indexed citations
5.
Li, Fengyin, et al.. (2024). SeSMR: Secure and Efficient Session-Based Multimedia Recommendation in Edge Computing. ACM Transactions on Multimedia Computing Communications and Applications. 21(8). 1–21. 1 indexed citations
6.
Chen, Zhenhua, et al.. (2024). Two Practical Attribute-Based Encryption Schemes for Privacy-Preserving Mobile Location-Sharing Applications. IEEE Internet of Things Journal. 12(5). 5148–5159.
7.
Wang, Yilei, et al.. (2023). Beyond model splitting: Preventing label inference attacks in vertical federated learning with dispersed training. World Wide Web. 26(5). 2691–2707. 6 indexed citations
8.
Li, Fengyin, et al.. (2022). A Lamus-Based Flight Data Sharing Model on Consortium Blockchain. Security and Communication Networks. 2022. 1–11. 2 indexed citations
9.
Li, Fengyin, et al.. (2022). An anonymous authentication and key agreement protocol in smart living. Computer Communications. 186. 110–120. 10 indexed citations
10.
Wang, Yilei, et al.. (2022). IIDQN: An Incentive Improved DQN Algorithm in EBSN Recommender System. Security and Communication Networks. 2022. 1–12. 4 indexed citations
11.
Wang, Fan, Guangshun Li, Yilei Wang, et al.. (2022). Privacy-Aware Traffic Flow Prediction Based on Multi-Party Sensor Data with Zero Trust in Smart City. ACM Transactions on Internet Technology. 23(3). 1–19. 89 indexed citations
12.
Li, Fengyin, et al.. (2021). An Efficient Anonymous Communication Scheme to Protect the Privacy of the Source Node Location in the Internet of Things. Security and Communication Networks. 2021. 1–16. 7 indexed citations
13.
Chen, Yuling, et al.. (2021). Dynamic Multi-Key FHE in Asymmetric Key Setting From LWE. IEEE Transactions on Information Forensics and Security. 16. 5239–5249. 48 indexed citations
14.
Wang, Yilei, et al.. (2021). ForkDec: Accurate Detection for Selfish Mining Attacks. Security and Communication Networks. 2021. 1–8. 12 indexed citations
15.
Wang, Yilei, et al.. (2018). An efficient method for autoencoder‐based collaborative filtering. Concurrency and Computation Practice and Experience. 31(23). 7 indexed citations
16.
Wang, Yilei, et al.. (2017). A Key-insulated Proxy Re-encryption Scheme for Data Sharing in a Cloud Environment.. Int. J. Netw. Secur.. 19. 623–630. 2 indexed citations
17.
Yu, Xiaomei, Hong Wang, Xiangwei Zheng, & Yilei Wang. (2016). Effective algorithms for vertical mining probabilistic frequent patterns in uncertain mobile environments. International Journal of Ad Hoc and Ubiquitous Computing. 23(3/4). 137–137. 23 indexed citations
18.
Wang, Hao, et al.. (2015). Adaptively Secure Outsourcing Ciphertext-Policy Attribute-Based Encryption. 52(10). 2270. 8 indexed citations
19.
Wang, Yilei, Zhe Liu, Hao Wang, & Qiuliang Xu. (2013). Social rational secure multi‐party computation. Concurrency and Computation Practice and Experience. 26(5). 1067–1083. 10 indexed citations
20.
Wang, Yilei, Qiuliang Xu, & Zhe Liu. (2013). Fair Computation with Tit-for-Tat Strategy. 309–314. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026