Zhe Xia

1.5k total citations
92 papers, 848 citations indexed

About

Zhe Xia is a scholar working on Artificial Intelligence, Computer Networks and Communications and Information Systems. According to data from OpenAlex, Zhe Xia has authored 92 papers receiving a total of 848 indexed citations (citations by other indexed papers that have themselves been cited), including 75 papers in Artificial Intelligence, 39 papers in Computer Networks and Communications and 24 papers in Information Systems. Recurrent topics in Zhe Xia's work include Cryptography and Data Security (64 papers), Advanced Authentication Protocols Security (26 papers) and Privacy-Preserving Technologies in Data (24 papers). Zhe Xia is often cited by papers focused on Cryptography and Data Security (64 papers), Advanced Authentication Protocols Security (26 papers) and Privacy-Preserving Technologies in Data (24 papers). Zhe Xia collaborates with scholars based in China, United States and United Kingdom. Zhe Xia's co-authors include Mingwu Zhang, Ching-Fang Hsu, Lein Harn, Yanwei Zhou, Bo Yang, Yining Liu, Steve Schneider, James Heather, Peter Y. A. Ryan and Zirui Qiao and has published in prestigious journals such as Expert Systems with Applications, IEEE Access and Information Sciences.

In The Last Decade

Zhe Xia

84 papers receiving 813 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Zhe Xia China 15 571 351 312 132 113 92 848
Tianqi Zhou China 16 464 0.8× 438 1.2× 541 1.7× 169 1.3× 123 1.1× 40 976
Jan Hajný Czechia 12 334 0.6× 227 0.6× 269 0.9× 120 0.9× 82 0.7× 88 636
Charlie Kaufman United States 11 415 0.7× 502 1.4× 314 1.0× 161 1.2× 106 0.9× 18 840
Miguel Soriano Spain 16 262 0.5× 430 1.2× 123 0.4× 257 1.9× 75 0.7× 78 719
Bei Gong China 15 393 0.7× 481 1.4× 246 0.8× 108 0.8× 41 0.4× 63 783
João P. Vilela Portugal 13 342 0.6× 415 1.2× 131 0.4× 441 3.3× 94 0.8× 65 827
Longfei Qiu United States 9 288 0.5× 360 1.0× 437 1.4× 122 0.9× 81 0.7× 9 786
Liang Xue Canada 16 436 0.8× 198 0.6× 435 1.4× 64 0.5× 57 0.5× 36 682
Yasuo Okabe Japan 15 458 0.8× 659 1.9× 129 0.4× 157 1.2× 68 0.6× 110 911

Countries citing papers authored by Zhe Xia

Since Specialization
Citations

This map shows the geographic impact of Zhe Xia's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Zhe Xia with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Zhe Xia more than expected).

Fields of papers citing papers by Zhe Xia

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Zhe Xia. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Zhe Xia. The network helps show where Zhe Xia may publish in the future.

Co-authorship network of co-authors of Zhe Xia

This figure shows the co-authorship network connecting the top 25 collaborators of Zhe Xia. A scholar is included among the top collaborators of Zhe Xia based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Zhe Xia. Zhe Xia is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Zhou, Yanwei, et al.. (2025). A novel construction of certificateless aggregate signcryption scheme for smart healthcare. Expert Systems with Applications. 285. 127963–127963.
2.
Zhou, Yanwei, Lei Cao, Zirui Qiao, et al.. (2024). A Novel Cloud-Assisted Authentication Key Agreement Protocol for VANET. IEEE Transactions on Vehicular Technology. 73(9). 13526–13541. 4 indexed citations
3.
Hsu, Ching-Fang, et al.. (2024). Lightweight ring-neighbor-based user authentication and group-key agreement for internet of drones. Cybersecurity. 7(1). 2 indexed citations
4.
Hsu, Ching-Fang, et al.. (2023). Ideal dynamic threshold Multi-secret data sharing in smart environments for sustainable cities. Information Sciences. 647. 119488–119488. 3 indexed citations
5.
6.
Xia, Zhe, Tao Liu, Jingjing Wang, & Shi Chen. (2023). A secure and efficient authenticated key exchange scheme for smart grid. Heliyon. 9(7). e17240–e17240. 12 indexed citations
7.
Qiao, Zirui, et al.. (2023). An Anonymous and Efficient Certificate-Based Identity Authentication Protocol for VANET. IEEE Internet of Things Journal. 11(7). 11232–11245. 20 indexed citations
8.
Zhou, Yanwei, et al.. (2023). An Anonymous and Efficient Multimessage and Multireceiver Certificateless Signcryption Scheme for VANET. IEEE Internet of Things Journal. 10(24). 22823–22835. 10 indexed citations
9.
Zhou, Yanwei, et al.. (2023). An Efficient and Secure Lightweight Certificateless Hybrid Signcryption Scheme. IEEE Internet of Things Journal. 11(7). 12252–12265. 3 indexed citations
10.
Qiao, Zirui, Yanwei Zhou, Bo Yang, et al.. (2022). An Efficient Certificate-Based Aggregate Signature Scheme With Provable Security for Industrial Internet of Things. IEEE Systems Journal. 17(1). 72–82. 17 indexed citations
11.
Hsu, Ching-Fang, et al.. (2020). Symmetric-bivariate-polynomial-based Lightweight Authenticated Group Key Agreement for Industrial Internet of Things. 網際網路技術學刊. 21(7). 1969–1979. 4 indexed citations
12.
Shen, Hua, et al.. (2020). An efficient aggregation scheme resisting on malicious data mining attacks for smart grid. Information Sciences. 526. 289–300. 62 indexed citations
13.
Zhou, Yanwei, et al.. (2018). Anonymous and Updatable Identity-Based Hash Proof System. IEEE Systems Journal. 13(3). 2818–2829. 9 indexed citations
14.
Zhang, Dongsheng, Jie Gao, Zhe Xia, et al.. (2018). Altered spontaneous brain activity in type 2 diabetes mellitus: an activation likelihood estimation Meta-analysis. Zhonghua fangshexian yixue zazhi. 52(4). 241–246. 3 indexed citations
15.
Culnane, Chris, et al.. (2013). Software Design for VEC vVote System. Surrey Research Insight Open Access (The University of Surrey).
16.
Schneider, Steve, et al.. (2013). Testing Voters' Understanding of a Security Mechanism Used in Verifiable Voting. Surrey Research Insight Open Access (The University of Surrey). 1(1). 4 indexed citations
17.
Culnane, Chris, James Heather, Peter Y. A. Ryan, et al.. (2012). Using Prêt à Voter in Victorian state elections. Surrey Research Insight Open Access (The University of Surrey). 1–1. 8 indexed citations
18.
Culnane, Chris, et al.. (2011). Authentication codes. Surrey Research Insight Open Access (The University of Surrey). 9–9. 1 indexed citations
19.
Xia, Zhe, Steve Schneider, James Heather, & Jacques Traoré. (2008). Analysis, improvement and simplification of Prêt à voter with Paillier encryption. Surrey Research Insight Open Access (The University of Surrey). 13. 13 indexed citations
20.
Treharne, Helen, et al.. (2007). Tear and Destroy: Chain voting and destruction problems shared by Pret a Voter and Punchscan and a solution using Visual Encryption. View. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026