Yu‐an Tan

3.1k total citations · 1 hit paper
138 papers, 2.1k citations indexed

About

Yu‐an Tan is a scholar working on Artificial Intelligence, Computer Networks and Communications and Information Systems. According to data from OpenAlex, Yu‐an Tan has authored 138 papers receiving a total of 2.1k indexed citations (citations by other indexed papers that have themselves been cited), including 82 papers in Artificial Intelligence, 51 papers in Computer Networks and Communications and 36 papers in Information Systems. Recurrent topics in Yu‐an Tan's work include Adversarial Robustness in Machine Learning (29 papers), Advanced Malware Detection Techniques (28 papers) and Advanced Data Storage Technologies (21 papers). Yu‐an Tan is often cited by papers focused on Adversarial Robustness in Machine Learning (29 papers), Advanced Malware Detection Techniques (28 papers) and Advanced Data Storage Technologies (21 papers). Yu‐an Tan collaborates with scholars based in China, United Kingdom and United Arab Emirates. Yu‐an Tan's co-authors include Quanxin Zhang, Yuanzhang Li, Liehuang Zhu, Xiaosong Zhang, Liang Chen, Xiaohui Kuang, Xianmin Wang, Jun Zheng, Zhenxiang Chen and Shengnan Zhao and has published in prestigious journals such as IEEE Access, Sensors and Applied Surface Science.

In The Last Decade

Yu‐an Tan

123 papers receiving 2.0k citations

Hit Papers

Secure Multi-Party Computation: Theory, practice and appl... 2018 2026 2020 2023 2018 50 100 150 200 250

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Yu‐an Tan China 26 1.4k 776 610 416 391 138 2.1k
Seong Oun Hwang South Korea 22 804 0.6× 409 0.5× 491 0.8× 146 0.4× 772 2.0× 155 1.8k
Jui‐Lin Lai Taiwan 16 612 0.5× 414 0.5× 299 0.5× 481 1.2× 503 1.3× 53 1.7k
Rong‐Jian Chen Taiwan 17 613 0.5× 403 0.5× 307 0.5× 456 1.1× 609 1.6× 59 1.7k
G. P. Biswas India 25 1.1k 0.8× 1.5k 2.0× 1.4k 2.4× 259 0.6× 175 0.4× 69 2.1k
Guohui Li China 19 523 0.4× 460 0.6× 477 0.8× 252 0.6× 347 0.9× 187 1.6k
Alin Dobra United States 18 668 0.5× 1.4k 1.8× 289 0.5× 570 1.4× 164 0.4× 51 1.9k
Lejla Batina Netherlands 23 1.5k 1.1× 435 0.6× 720 1.2× 240 0.6× 349 0.9× 124 2.0k
Huaxiong Wang Singapore 24 1.5k 1.1× 628 0.8× 858 1.4× 126 0.3× 381 1.0× 144 2.0k
Nicolas Sklavos Greece 24 1.0k 0.7× 702 0.9× 419 0.7× 265 0.6× 621 1.6× 138 1.9k
Christian Cachin Switzerland 29 1.2k 0.8× 1.4k 1.8× 1.1k 1.7× 108 0.3× 350 0.9× 79 2.4k

Countries citing papers authored by Yu‐an Tan

Since Specialization
Citations

This map shows the geographic impact of Yu‐an Tan's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Yu‐an Tan with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Yu‐an Tan more than expected).

Fields of papers citing papers by Yu‐an Tan

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Yu‐an Tan. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Yu‐an Tan. The network helps show where Yu‐an Tan may publish in the future.

Co-authorship network of co-authors of Yu‐an Tan

This figure shows the co-authorship network connecting the top 25 collaborators of Yu‐an Tan. A scholar is included among the top collaborators of Yu‐an Tan based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Yu‐an Tan. Yu‐an Tan is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Gai, Keke, et al.. (2025). Blockchain-Assisted Searchable Integrity Auditing for Large-Scale Similarity Data With Arbitration. IEEE Transactions on Dependable and Secure Computing. 22(6). 6012–6027. 1 indexed citations
2.
Zhang, Zheng, Jingfeng Xue, Thar Baker, et al.. (2024). COVER: Enhancing virtualization obfuscation through dynamic scheduling using flash controller-based secure module. Computers & Security. 146. 104038–104038.
3.
Chen, Tian, et al.. (2024). Dataflow optimization with layer-wise design variables estimation method for enflame CNN accelerators. Journal of Parallel and Distributed Computing. 189. 104869–104869. 2 indexed citations
4.
Wang, Guoyu, Ning Li, Zuo Wang, et al.. (2024). Accelerating page loads via streamlining JavaScript engine for distributed learning. Information Sciences. 675. 120713–120713. 1 indexed citations
5.
Gai, Keke, et al.. (2024). Blockchain-Empowered Keyword Searchable Provable Data Possession for Large Similar Data. IEEE Transactions on Information Forensics and Security. 20. 1374–1389. 8 indexed citations
6.
Tan, Yu‐an, et al.. (2024). Towards Transferable Adversarial Attacks with Centralized Perturbation. Proceedings of the AAAI Conference on Artificial Intelligence. 38(6). 6109–6116. 4 indexed citations
7.
Tan, Yu‐an, et al.. (2024). AI-Driven Network Security and Privacy. Electronics. 13(12). 2311–2311. 3 indexed citations
8.
Tan, Yu‐an, et al.. (2024). A Stealthy Communication Model with Blockchain Smart Contract for Bidding Systems. Electronics. 13(13). 2523–2523. 3 indexed citations
9.
Li, Yuanzhang, et al.. (2024). A Software Integrity Authentication Protocol for Zero Trust Architecture. 1–6. 1 indexed citations
10.
Li, Jiaxing, et al.. (2024). Unsupervised Adversarial Example Detection of Vision Transformers for Trustworthy Edge Computing. ACM Transactions on Multimedia Computing Communications and Applications. 21(8). 1–19. 1 indexed citations
11.
Zheng, Jun, Qikun Zhang, Tian Chen, et al.. (2024). ATT&CK-based Advanced Persistent Threat attacks risk propagation assessment model for zero trust networks. Computer Networks. 245. 110376–110376. 7 indexed citations
12.
Li, Jiaxing, Yu‐an Tan, Xinyu Liu, Weizhi Meng, & Yuanzhang Li. (2024). Interpretable adversarial example detection via high-level concept activation vector. Computers & Security. 150. 104218–104218. 1 indexed citations
13.
Zhou, Huipeng, et al.. (2023). Crafting Transferable Adversarial Examples Against Face Recognition via Gradient Eroding. IEEE Transactions on Artificial Intelligence. 5(1). 412–419. 3 indexed citations
14.
Wang, Yajie, et al.. (2022). Stealthy and Flexible Trojan in Deep Learning Framework. IEEE Transactions on Dependable and Secure Computing. 20(3). 1789–1798. 15 indexed citations
15.
Wang, Yajie, et al.. (2022). Toward feature space adversarial attack in the frequency domain. International Journal of Intelligent Systems. 37(12). 11019–11036. 4 indexed citations
16.
Chen, Liang, Thar Baker, Yuanzhang Li, Raheel Nawaz, & Yu‐an Tan. (2021). Building Covert Timing Channel of the IoT-Enabled MTS Based on Multi-Stage Verification. IEEE Transactions on Intelligent Transportation Systems. 1–18. 9 indexed citations
17.
Tan, Yu‐an, et al.. (2020). An Android Inline Hooking Framework for the Securing Transmitted Data. Sensors. 20(15). 4201–4201. 1 indexed citations
18.
Li, Yuanzhang, et al.. (2020). A feature-vector generative adversarial network for evading PDF malware classifiers. Information Sciences. 523. 38–48. 27 indexed citations
19.
Tan, Yu‐an, et al.. (2018). An Efficient Identity‐Based Proxy Blind Signature for Semioffline Services. Wireless Communications and Mobile Computing. 2018(1). 11 indexed citations
20.
Tan, Yu‐an, et al.. (2007). A hybrid genetic algorithm for unconstrained global numerical optimisation. New Zealand Journal of Agricultural Research. 50(5). 1021–1029. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026