Yiliang Han

750 total citations
69 papers, 382 citations indexed

About

Yiliang Han is a scholar working on Artificial Intelligence, Information Systems and Computational Theory and Mathematics. According to data from OpenAlex, Yiliang Han has authored 69 papers receiving a total of 382 indexed citations (citations by other indexed papers that have themselves been cited), including 51 papers in Artificial Intelligence, 20 papers in Information Systems and 12 papers in Computational Theory and Mathematics. Recurrent topics in Yiliang Han's work include Cryptography and Data Security (38 papers), Privacy-Preserving Technologies in Data (21 papers) and Coding theory and cryptography (10 papers). Yiliang Han is often cited by papers focused on Cryptography and Data Security (38 papers), Privacy-Preserving Technologies in Data (21 papers) and Coding theory and cryptography (10 papers). Yiliang Han collaborates with scholars based in China, Canada and India. Yiliang Han's co-authors include Xiaoyuan Yang, Xu An Wang, Xiaolin Gui, Xiaoyuan Yang, Yupu Hu, Di Jiang, Wenchao Liu, Min Li, Dingyi Fang and Jingjing Wang and has published in prestigious journals such as Expert Systems with Applications, IEEE Access and IEEE Internet of Things Journal.

In The Last Decade

Yiliang Han

61 papers receiving 355 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Yiliang Han China 9 209 104 95 80 66 69 382
Xiaobin Rui China 11 118 0.6× 219 2.1× 43 0.5× 54 0.7× 69 1.0× 24 329
Yabing Yao China 11 141 0.7× 317 3.0× 39 0.4× 44 0.6× 50 0.8× 28 375
SangJae Moon South Korea 9 232 1.1× 58 0.6× 124 1.3× 171 2.1× 6 0.1× 59 389
Sihan Qing China 9 252 1.2× 18 0.2× 219 2.3× 265 3.3× 52 0.8× 69 427
Jianquan Liu Japan 12 140 0.7× 54 0.5× 37 0.4× 85 1.1× 18 0.3× 57 364
Adel Torkaman Rahmani Iran 8 127 0.6× 28 0.3× 58 0.6× 64 0.8× 7 0.1× 38 245
Rebecca J. Stones China 12 123 0.6× 19 0.2× 96 1.0× 163 2.0× 7 0.1× 36 353
Mostafa Haghir Chehreghani Iran 10 178 0.9× 90 0.9× 79 0.8× 35 0.4× 19 0.3× 40 294
Lotfi Ben Romdhane Tunisia 13 158 0.8× 355 3.4× 87 0.9× 100 1.3× 46 0.7× 29 471

Countries citing papers authored by Yiliang Han

Since Specialization
Citations

This map shows the geographic impact of Yiliang Han's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Yiliang Han with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Yiliang Han more than expected).

Fields of papers citing papers by Yiliang Han

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Yiliang Han. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Yiliang Han. The network helps show where Yiliang Han may publish in the future.

Co-authorship network of co-authors of Yiliang Han

This figure shows the co-authorship network connecting the top 25 collaborators of Yiliang Han. A scholar is included among the top collaborators of Yiliang Han based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Yiliang Han. Yiliang Han is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Wang, Yuanyuan, et al.. (2025). Cap: Smart Contract Assisted Privacy-Preserving Data Aggregation Scheme for IoT. IEEE Internet of Things Journal. 13(2). 2502–2516.
2.
Han, Yiliang, et al.. (2025). Survey of privacy-preserving data aggregation schemes in smart grid. Journal of King Saud University - Computer and Information Sciences. 37(9). 1 indexed citations
3.
Ke, Yan, Jia Liu, & Yiliang Han. (2025). Two-stage reversible data hiding in encrypted domain with public key embedding mechanism. Signal Processing. 233. 109918–109918.
4.
Fu, Shaojing, et al.. (2025). pNILM: Whole-process privacy preservation for non-intrusive load monitoring based on deep neural networks. Expert Systems with Applications. 272. 126689–126689. 1 indexed citations
5.
Han, Yiliang, et al.. (2024). Improved Privacy-Preserving Aggregation for Federated Learning. 272–276. 1 indexed citations
6.
Han, Yiliang, et al.. (2024). GAN-based pseudo random number generation optimized through genetic algorithms. Complex & Intelligent Systems. 11(1). 4 indexed citations
7.
Li, Min, et al.. (2023). A efficient and robust privacy-preserving framework for cross-device federated learning. Complex & Intelligent Systems. 9(5). 4923–4937. 13 indexed citations
8.
Han, Yiliang, et al.. (2022). CD‐ABSE: Attribute‐Based Searchable Encryption Scheme Supporting Cross‐Domain Sharing on Blockchain. Wireless Communications and Mobile Computing. 2022(1). 3 indexed citations
9.
Li, Min, et al.. (2022). A Homomorphic Signcryption-Based Privacy Preserving Federated Learning Framework for IoTs. Security and Communication Networks. 2022. 1–10. 3 indexed citations
10.
Han, Yiliang. (2021). Design of An Active Infrared Iris Recognition Device. 435–437. 3 indexed citations
11.
Jia, Han, et al.. (2020). Node Importance Evaluation Algorithm for Complex Network Based on Time Series and TOPSIS. 62. 786–790. 2 indexed citations
12.
Han, Yiliang, et al.. (2019). A New Group Location Privacy-Preserving Method Based on Distributed Architecture in LBS. Security and Communication Networks. 2019. 1–14. 4 indexed citations
13.
Han, Yiliang, et al.. (2018). Research on micro-blog emotional tendency based on keyword extraction and dependency syntax. 9654–9659. 1 indexed citations
14.
Han, Yiliang, et al.. (2015). Controlling Outsourcing Data in Cloud Computing with Attribute-Based Encryption. 4392. 257–261. 1 indexed citations
15.
Zhang, Minqing, et al.. (2013). Secure group communication based on distributed parallel ID-based proxy re-encryption. Chinese Control Conference. 6364–6367. 3 indexed citations
16.
Han, Yiliang, et al.. (2013). Attribute-Based Signcryption Scheme with Non-monotonic Access Structure. 7178. 796–802. 12 indexed citations
17.
Han, Yiliang, et al.. (2010). Proxy encryption based secure multicast in wireless mesh networks. Journal of Network and Computer Applications. 34(2). 469–477. 7 indexed citations
18.
Han, Yiliang & Xiaolin Gui. (2009). Multi-recipient signcryption for secure group communication. 1431. 161–165. 8 indexed citations
19.
Han, Yiliang & Xiaolin Gui. (2009). Adaptive secure multicast in wireless networks. International Journal of Communication Systems. 22(9). 1213–1239. 22 indexed citations
20.
Deng, Robert H., et al.. (2007). Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults. Singapore Management University Institutional Knowledge (InK) (Singapore Management University). 5 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026