Yiqiao Cai

1.9k total citations
91 papers, 1.5k citations indexed

About

Yiqiao Cai is a scholar working on Artificial Intelligence, Computational Theory and Mathematics and Computer Networks and Communications. According to data from OpenAlex, Yiqiao Cai has authored 91 papers receiving a total of 1.5k indexed citations (citations by other indexed papers that have themselves been cited), including 68 papers in Artificial Intelligence, 37 papers in Computational Theory and Mathematics and 19 papers in Computer Networks and Communications. Recurrent topics in Yiqiao Cai's work include Metaheuristic Optimization Algorithms Research (44 papers), Advanced Multi-Objective Optimization Algorithms (37 papers) and Evolutionary Algorithms and Applications (33 papers). Yiqiao Cai is often cited by papers focused on Metaheuristic Optimization Algorithms Research (44 papers), Advanced Multi-Objective Optimization Algorithms (37 papers) and Evolutionary Algorithms and Applications (33 papers). Yiqiao Cai collaborates with scholars based in China, Taiwan and Australia. Yiqiao Cai's co-authors include Jiahai Wang, Tian Wang, Yonghong Chen, Hui Tian, Ying Zhou, Jiandian Zeng, Baowei Wang, Jian Yin, Jin Gou and Md Zakirul Alam Bhuiyan and has published in prestigious journals such as Expert Systems with Applications, IEEE Access and Sensors.

In The Last Decade

Yiqiao Cai

89 papers receiving 1.5k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Yiqiao Cai China 22 914 547 392 242 219 91 1.5k
M. R. Meybodi Iran 20 629 0.7× 356 0.7× 821 2.1× 279 1.2× 97 0.4× 77 1.5k
Vahid Khatibi Bardsiri Iran 12 666 0.7× 308 0.6× 204 0.5× 185 0.8× 110 0.5× 33 1.3k
Bilal H. Abed-alguni Jordan 21 618 0.7× 233 0.4× 243 0.6× 111 0.5× 149 0.7× 35 1.0k
Kamal Jambi Saudi Arabia 15 697 0.8× 304 0.6× 238 0.6× 191 0.8× 137 0.6× 62 1.2k
Xuewen Xia China 20 993 1.1× 569 1.0× 161 0.4× 105 0.4× 168 0.8× 78 1.5k
Huỳnh Thị Thanh Bình Vietnam 19 579 0.6× 223 0.4× 878 2.2× 544 2.2× 150 0.7× 152 1.7k
Wei–Jie Yu China 17 999 1.1× 696 1.3× 119 0.3× 169 0.7× 110 0.5× 52 1.5k
Huangke Chen China 19 1.2k 1.3× 898 1.6× 748 1.9× 168 0.7× 109 0.5× 45 2.2k
Zhenyu Meng China 22 1.4k 1.5× 880 1.6× 109 0.3× 171 0.7× 111 0.5× 67 1.8k
Changhe Li China 19 1.3k 1.4× 984 1.8× 139 0.4× 165 0.7× 133 0.6× 67 1.8k

Countries citing papers authored by Yiqiao Cai

Since Specialization
Citations

This map shows the geographic impact of Yiqiao Cai's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Yiqiao Cai with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Yiqiao Cai more than expected).

Fields of papers citing papers by Yiqiao Cai

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Yiqiao Cai. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Yiqiao Cai. The network helps show where Yiqiao Cai may publish in the future.

Co-authorship network of co-authors of Yiqiao Cai

This figure shows the co-authorship network connecting the top 25 collaborators of Yiqiao Cai. A scholar is included among the top collaborators of Yiqiao Cai based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Yiqiao Cai. Yiqiao Cai is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
2.
Tian, Hui, et al.. (2022). Towards blind detection of steganography in low‐bit‐rate speech streams. International Journal of Intelligent Systems. 37(12). 12085–12112. 2 indexed citations
3.
Tian, Hui, Chin‐Chen Chang, Yewang Chen, et al.. (2020). Steganalysis of Adaptive Multi-Rate Speech Based on Extreme Gradient Boosting. Electronics. 9(3). 522–522. 4 indexed citations
4.
Zhou, Ying, Lingjing Kong, Yiqiao Cai, et al.. (2020). A Decomposition-Based Local Search for Large-Scale Many-Objective Vehicle Routing Problems With Simultaneous Delivery and Pickup and Time Windows. IEEE Systems Journal. 14(4). 5253–5264. 15 indexed citations
5.
Cai, Yiqiao, et al.. (2020). Enhancing Differential Evolution on Continuous Optimization Problems by Detecting Promising Leaders. IEEE Access. 8. 226557–226578. 1 indexed citations
6.
Tian, Hui, et al.. (2019). Detecting Steganography in Inactive Voice-Over-IP Frames Based on Statistic Characteristics of Fundamental Frequency. IEEE Access. 8. 6117–6129. 3 indexed citations
7.
Cai, Yiqiao, et al.. (2019). A Neighborhood-Assisted Framework for Differential Evolution. IEEE Access. 7. 44338–44358. 2 indexed citations
8.
Cai, Yiqiao, et al.. (2019). Differential Evolution With Adaptive Guiding Mechanism Based on Heuristic Rules. IEEE Access. 7. 58023–58040. 6 indexed citations
9.
Chen, Yonghong, et al.. (2019). A Secure and Reliable Data Transmission Scheme in Wireless Body Area Network.. Int. J. Netw. Secur.. 21. 648–660.
10.
Zhu, Bowen, Yonghong Chen, & Yiqiao Cai. (2019). Three Kinds of Network Security Situation Awareness Model Based on Big Data.. Int. J. Netw. Secur.. 21. 115–121. 5 indexed citations
11.
Liu, Jie, Hui Tian, Chin‐Chen Chang, et al.. (2018). Steganalysis of Inactive Voice-Over-IP Frames Based on Poker Test. Symmetry. 10(8). 336–336. 2 indexed citations
12.
Tian, Hui, Zhaoyi Chen, Chin‐Chen Chang, et al.. (2018). Public audit for operation behavior logs with error locating in cloud storage. Soft Computing. 23(11). 3779–3792. 26 indexed citations
13.
Wang, Tian, Jiandian Zeng, Md Zakirul Alam Bhuiyan, et al.. (2018). Energy-efficient relay tracking with multiple mobile camera sensors. Computer Networks. 133. 130–140. 13 indexed citations
14.
Cai, Yiqiao, et al.. (2018). An enhanced utilization mechanism of population information for Differential evolution. Evolutionary Intelligence. 15(4). 2247–2259. 1 indexed citations
15.
Gou, Jin, et al.. (2018). A knowledge fusion pattern and its evolution processes in a decision support system. Filomat. 32(5). 1589–1605. 2 indexed citations
16.
Wang, Tian, Li Yang, Yonghong Chen, et al.. (2017). Fog-Based Evaluation Approach for Trustworthy Communication in Sensor-Cloud System. IEEE Communications Letters. 21(11). 2532–2535. 21 indexed citations
17.
Tian, Hui, Jun Sun, Yongfeng Huang, et al.. (2017). Detecting Steganography of Adaptive Multirate Speech with Unknown Embedding Rate. Mobile Information Systems. 2017. 1–18. 6 indexed citations
18.
Wang, Tian, Qun Wu, Sheng Wen, et al.. (2017). Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless Sensor and Actuator Networks. Sensors. 17(1). 139–139. 44 indexed citations
19.
Wang, Tian, Qun Wu, Sheng Wen, et al.. (2016). The Inhibition and Clearup of the Mobile Worm in Wireless Sensor Networks. Swinburne Research Bank (Swinburne University of Technology). 38(9). 2202–2207. 1 indexed citations
20.
Tian, Hui, Jie Qin, Yongfeng Huang, et al.. (2015). Improved adaptive partial-matching steganography for Voice over IP. Computer Communications. 70. 95–108. 10 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026