Yongbin Zhou

1.3k total citations
91 papers, 522 citations indexed

About

Yongbin Zhou is a scholar working on Artificial Intelligence, Hardware and Architecture and Computer Vision and Pattern Recognition. According to data from OpenAlex, Yongbin Zhou has authored 91 papers receiving a total of 522 indexed citations (citations by other indexed papers that have themselves been cited), including 61 papers in Artificial Intelligence, 30 papers in Hardware and Architecture and 27 papers in Computer Vision and Pattern Recognition. Recurrent topics in Yongbin Zhou's work include Cryptographic Implementations and Security (42 papers), Chaos-based Image/Signal Encryption (25 papers) and Physical Unclonable Functions (PUFs) and Hardware Security (24 papers). Yongbin Zhou is often cited by papers focused on Cryptographic Implementations and Security (42 papers), Chaos-based Image/Signal Encryption (25 papers) and Physical Unclonable Functions (PUFs) and Hardware Security (24 papers). Yongbin Zhou collaborates with scholars based in China, France and Australia. Yongbin Zhou's co-authors include Jiaojiao Deng, Wenxu Zhu, Yong Jiang, Shijun Wu, Xiye Guo, Changshui Liu, Hailong Zhang, Rui Zhang, Huizhong Li and Yiwen Gao and has published in prestigious journals such as Proceedings of the National Academy of Sciences, Information Sciences and Planta.

In The Last Decade

Yongbin Zhou

79 papers receiving 506 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Yongbin Zhou China 12 222 108 104 91 80 91 522
Ali Akoglu United States 12 116 0.5× 211 2.0× 58 0.6× 181 2.0× 220 2.8× 95 609
Alicia Morales-Reyes Mexico 10 150 0.7× 28 0.3× 68 0.7× 48 0.5× 34 0.4× 41 320
Wiebe Van Ranst Belgium 6 310 1.4× 36 0.3× 222 2.1× 30 0.3× 24 0.3× 11 472
Seongmin Hong South Korea 10 122 0.5× 34 0.3× 66 0.6× 67 0.7× 83 1.0× 50 431
Shaoteng Liu China 10 162 0.7× 57 0.5× 436 4.2× 72 0.8× 117 1.5× 34 779
T. Bretschneider Singapore 10 42 0.2× 34 0.3× 238 2.3× 29 0.3× 44 0.6× 44 383
Benjamin Bornstein United States 12 108 0.5× 16 0.1× 86 0.8× 24 0.3× 56 0.7× 32 702
Mingzhe Li China 13 53 0.2× 30 0.3× 104 1.0× 120 1.3× 240 3.0× 49 519
Bing Yang China 11 91 0.4× 9 0.1× 123 1.2× 53 0.6× 62 0.8× 68 423

Countries citing papers authored by Yongbin Zhou

Since Specialization
Citations

This map shows the geographic impact of Yongbin Zhou's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Yongbin Zhou with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Yongbin Zhou more than expected).

Fields of papers citing papers by Yongbin Zhou

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Yongbin Zhou. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Yongbin Zhou. The network helps show where Yongbin Zhou may publish in the future.

Co-authorship network of co-authors of Yongbin Zhou

This figure shows the co-authorship network connecting the top 25 collaborators of Yongbin Zhou. A scholar is included among the top collaborators of Yongbin Zhou based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Yongbin Zhou. Yongbin Zhou is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Xiao, Yuting, et al.. (2025). Fully-incremental public key encryption with adjustable timed-release keyword search. Information Sciences. 702. 121887–121887.
2.
Pang, Shuchao, et al.. (2025). PriDM: Effective and Universal Private Data Recovery via Diffusion Models. IEEE Transactions on Dependable and Secure Computing. 22(4). 3259–3274. 1 indexed citations
4.
Zhou, Yongbin, et al.. (2024). New partial key exposure attacks on RSA with additive exponent blinding. Cybersecurity. 7(1).
5.
Zhou, Yongbin, et al.. (2024). Pairwise and Parallel: Enhancing the Key Mismatch Attacks on Kyber and Beyond. 548–559. 1 indexed citations
6.
Li, Jun, et al.. (2022). Entanglement-assisted concatenated quantum codes. Proceedings of the National Academy of Sciences. 119(24). e2202235119–e2202235119. 5 indexed citations
7.
Zhou, Yongbin, et al.. (2021). APT: Efficient Side-Channel Analysis Framework against Inner Product Masking Scheme. SPIRE - Sciences Po Institutional REpository. 575–582. 1 indexed citations
9.
Zhou, Yongbin, et al.. (2021). Understanding Offline Password-Cracking Methods: A Large-Scale Empirical Study. Security and Communication Networks. 2021. 1–16. 2 indexed citations
10.
Zhang, Qian, et al.. (2020). Land-Use Types Combined with Plant SpeciesAlter Soil Fungal Community and FunctionalGuilds in the Eastern Mountainous Regionof Liaoning Province, China. Polish Journal of Environmental Studies. 30(1). 477–495. 5 indexed citations
11.
Gao, Yiwen, et al.. (2020). Efficient electro-magnetic analysis of a GPU bitsliced AES implementation. Cybersecurity. 3(1). 3 indexed citations
12.
Gao, Yiwen & Yongbin Zhou. (2020). Side-Channel Attacks With Multi-Thread Mixed Leakage. IEEE Transactions on Information Forensics and Security. 16. 770–785. 8 indexed citations
13.
Zhou, Yongbin, et al.. (2019). Cooperative Localization Based on Efficient Covariance Intersection. IEEE Communications Letters. 23(5). 871–874. 11 indexed citations
14.
Zhou, Yongbin, et al.. (2019). Onboard distributed autonomous orbit determination based on state caching approach. Advances in Space Research. 64(8). 1518–1526. 1 indexed citations
15.
Zhang, Rui, et al.. (2019). Predicate encryption against master-key tampering attacks. Cybersecurity. 2(1).
16.
Guo, Xiye, et al.. (2018). Precise point positioning for ground-based navigation systems without accurate time synchronization. GPS Solutions. 22(2). 40 indexed citations
17.
Gao, Yiwen, et al.. (2018). Cache-Collision Attacks on GPU-Based AES Implementation with Electro-Magnetic Leakages. 300–306. 7 indexed citations
18.
Zhou, Yongbin, et al.. (2009). Differential Fault Attack on Camellia. Chinese Journal of Electronics. 18(1). 13–19. 7 indexed citations
20.
Feng, Dengguo, et al.. (2008). A Fuzzy-Based Randomness Evaluation Model for Block Cipher. 45(12). 2095. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026