Zhen Han

1.4k total citations · 1 hit paper
96 papers, 915 citations indexed

About

Zhen Han is a scholar working on Artificial Intelligence, Information Systems and Computer Networks and Communications. According to data from OpenAlex, Zhen Han has authored 96 papers receiving a total of 915 indexed citations (citations by other indexed papers that have themselves been cited), including 57 papers in Artificial Intelligence, 32 papers in Information Systems and 31 papers in Computer Networks and Communications. Recurrent topics in Zhen Han's work include Security and Verification in Computing (21 papers), Cryptography and Data Security (20 papers) and Cloud Data Security Solutions (14 papers). Zhen Han is often cited by papers focused on Security and Verification in Computing (21 papers), Cryptography and Data Security (20 papers) and Cloud Data Security Solutions (14 papers). Zhen Han collaborates with scholars based in China, United States and Singapore. Zhen Han's co-authors include Jiqiang Liu, Wei Wang, Xing Wang, Xiangliang Zhang, Dawei Feng, Yongzhong He, Xiaolin Chang, Qingji Zheng, Wenjia Niu and Endong Tong and has published in prestigious journals such as PLoS ONE, IEEE Access and Information Sciences.

In The Last Decade

Zhen Han

81 papers receiving 863 citations

Hit Papers

Exploring Permission-Induced Risk in Android Applications... 2014 2026 2018 2022 2014 50 100 150 200 250

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Zhen Han China 14 455 383 369 366 131 96 915
Jim Alves-Foss United States 17 473 1.0× 528 1.4× 212 0.6× 323 0.9× 93 0.7× 91 892
Baojiang Cui China 17 518 1.1× 496 1.3× 424 1.1× 566 1.5× 164 1.3× 109 1.1k
Martín Ochoa Singapore 15 630 1.4× 490 1.3× 538 1.5× 408 1.1× 57 0.4× 51 1.0k
Andrii Shalaginov Norway 10 378 0.8× 221 0.6× 338 0.9× 314 0.9× 56 0.4× 47 640
Tao Ban Japan 17 492 1.1× 455 1.2× 416 1.1× 234 0.6× 49 0.4× 96 840
Kangbin Yim South Korea 18 818 1.8× 365 1.0× 720 2.0× 533 1.5× 127 1.0× 111 1.3k
Vittoria Nardone Italy 15 282 0.6× 231 0.6× 323 0.9× 222 0.6× 175 1.3× 45 755
Wenchao Zhou United States 19 783 1.7× 462 1.2× 228 0.6× 382 1.0× 41 0.3× 87 1.2k
Seung-Hyun Seo South Korea 17 436 1.0× 340 0.9× 168 0.5× 357 1.0× 47 0.4× 53 889

Countries citing papers authored by Zhen Han

Since Specialization
Citations

This map shows the geographic impact of Zhen Han's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Zhen Han with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Zhen Han more than expected).

Fields of papers citing papers by Zhen Han

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Zhen Han. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Zhen Han. The network helps show where Zhen Han may publish in the future.

Co-authorship network of co-authors of Zhen Han

This figure shows the co-authorship network connecting the top 25 collaborators of Zhen Han. A scholar is included among the top collaborators of Zhen Han based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Zhen Han. Zhen Han is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Zhang, Tao, Jian Wang, Zhen Han, et al.. (2025). Achieving Network Resilience Through Graph Neural Network-Enabled Deep Reinforcement Learning. IEEE Network. 39(6). 279–287. 3 indexed citations
2.
Zhang, Tao, Jian Wang, Zhen Han, et al.. (2025). Protect NTN-IoT Security by Malicious Traffic Detection: A Multidimensional Hypergraph Learning Approach. IEEE Internet of Things Journal. 13(3). 3594–3607.
3.
Han, Zhen, et al.. (2024). A rapid approach to urban traffic noise mapping with a generative adversarial network. Applied Acoustics. 228. 110268–110268. 4 indexed citations
4.
Tong, Endong, et al.. (2024). Improving the Robustness of Pedestrian Detection in Autonomous Driving With Generative Data Augmentation. IEEE Network. 38(3). 63–69. 6 indexed citations
5.
Baker, Thar, Endong Tong, Ye Zhu, et al.. (2024). Collaborative Attack Sequence Generation Model Based on Multiagent Reinforcement Learning for Intelligent Traffic Signal System. International Journal of Intelligent Systems. 2024(1). 1 indexed citations
6.
Liu, Gang, et al.. (2024). Hybrid model-based predictive HVAC control through fast prediction of transient indoor temperature fields. Building and Environment. 267. 112253–112253. 7 indexed citations
7.
Wang, Wei, Chongsheng Zhang, Weiping Ding, et al.. (2024). Neighbor-Enhanced Representation Learning for Link Prediction in Dynamic Heterogeneous Attributed Networks. ACM Transactions on Knowledge Discovery from Data. 18(8). 1–25. 3 indexed citations
8.
Wang, Wei, et al.. (2024). Finding the PISTE: Towards Understanding Privacy Leaks in Vertical Federated Learning Systems. IEEE Transactions on Dependable and Secure Computing. 22(2). 1537–1550. 3 indexed citations
9.
Zhao, Yiwen, Wei Wang, Yongsheng Zhu, et al.. (2024). Enhancing Privacy in Distributed Intelligent Vehicles With Information Bottleneck Theory. IEEE Internet of Things Journal. 12(5). 4914–4921. 1 indexed citations
10.
Chang, Xiaolin, et al.. (2022). Impact of Service Function Aging on the Dependability for MEC Service Function Chain. IEEE Transactions on Dependable and Secure Computing. 20(4). 2811–2824. 27 indexed citations
11.
Wang, Bin, et al.. (2022). CCUBI: A cross‐chain based premium competition scheme with privacy preservation for usage‐based insurance. International Journal of Intelligent Systems. 37(12). 11522–11546. 4 indexed citations
12.
Wang, Wei, et al.. (2022). CGIR: Conditional Generative Instance Reconstruction Attacks Against Federated Learning. IEEE Transactions on Dependable and Secure Computing. 20(6). 4551–4563. 19 indexed citations
13.
Li, Lin, et al.. (2021). BOPE: Boundary Order-Preserving Encryption Scheme in Relational Database System. IEEE Access. 9. 30124–30134. 1 indexed citations
14.
Chang, Xiaolin, et al.. (2021). Resilience-Driven Quantitative Analysis of Vehicle Platooning Service. IEEE Transactions on Vehicular Technology. 70(6). 5378–5389. 10 indexed citations
15.
He, Xudong, et al.. (2021). Smart Grid Nontechnical Loss Detection Based on Power Gateway Consortium Blockchain. Security and Communication Networks. 2021. 1–20. 1 indexed citations
16.
He, Xudong, Jian Wang, Jiqiang Liu, et al.. (2021). DNS Rebinding Threat Modeling and Security Analysis for Local Area Network of Maritime Transportation Systems. IEEE Transactions on Intelligent Transportation Systems. 1–13. 13 indexed citations
17.
Zhou, Xiaojun, et al.. (2020). Machine Learning Methods for Industrial Protocol Security Analysis: Issues, Taxonomy, and Directions. IEEE Access. 8. 83842–83857. 15 indexed citations
18.
Chang, Xiaolin, et al.. (2020). Numerical Evaluation of Job Finish Time Under MTD Environment. IEEE Access. 8. 11437–11446. 12 indexed citations
19.
Chang, Xiaolin, et al.. (2020). Analyzing Software Rejuvenation Techniques in a Virtualized System: Service Provider and User Views. IEEE Access. 8. 6448–6459. 16 indexed citations
20.
Han, Zhen. (1990). MULTI-LEVEL RECURSIVE PREDICTION OF SYSTEM WITH RANDOM-VARYING STRUCTURE. Acta Automatica Sinica.

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026