Zheng Qin

4.9k total citations
170 papers, 3.5k citations indexed

About

Zheng Qin is a scholar working on Artificial Intelligence, Computer Networks and Communications and Computer Vision and Pattern Recognition. According to data from OpenAlex, Zheng Qin has authored 170 papers receiving a total of 3.5k indexed citations (citations by other indexed papers that have themselves been cited), including 83 papers in Artificial Intelligence, 57 papers in Computer Networks and Communications and 39 papers in Computer Vision and Pattern Recognition. Recurrent topics in Zheng Qin's work include Privacy-Preserving Technologies in Data (35 papers), Cryptography and Data Security (33 papers) and Network Security and Intrusion Detection (27 papers). Zheng Qin is often cited by papers focused on Privacy-Preserving Technologies in Data (35 papers), Cryptography and Data Security (33 papers) and Network Security and Intrusion Detection (27 papers). Zheng Qin collaborates with scholars based in China, United States and Canada. Zheng Qin's co-authors include Xin Liao, Lu Ou, Hui Yin, Jixin Zhang, Jinwen Liang, Xiaodong Lin, Hua Deng, Yingbo Yu, Bin Li and Mingliang Chen and has published in prestigious journals such as SHILAP Revista de lepidopterología, Expert Systems with Applications and IEEE Access.

In The Last Decade

Zheng Qin

155 papers receiving 3.4k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Zheng Qin China 32 1.5k 1.2k 936 848 492 170 3.5k
Zhan Qin China 31 2.6k 1.8× 993 0.8× 686 0.7× 960 1.1× 559 1.1× 101 4.1k
Ke Yang China 14 1.9k 1.3× 1.2k 1.0× 863 0.9× 519 0.6× 661 1.3× 62 3.4k
Zhiguang Qin China 34 1.8k 1.2× 1.2k 1.0× 1.1k 1.1× 1.1k 1.2× 344 0.7× 283 4.0k
Wei Liang China 27 955 0.6× 449 0.4× 943 1.0× 882 1.0× 209 0.4× 219 2.7k
Zhiping Cai China 33 1.8k 1.2× 853 0.7× 2.3k 2.4× 713 0.8× 344 0.7× 229 4.5k
Ye Yuan China 22 1.1k 0.7× 830 0.7× 631 0.7× 311 0.4× 451 0.9× 210 2.4k
Shanika Karunasekera Australia 26 1.4k 1.0× 480 0.4× 1.5k 1.6× 952 1.1× 664 1.3× 158 3.3k
Huanlai Xing China 29 1.2k 0.8× 536 0.4× 1.4k 1.5× 416 0.5× 265 0.5× 145 3.2k
Howon Kim South Korea 23 1.3k 0.9× 305 0.2× 1.1k 1.1× 496 0.6× 547 1.1× 175 2.4k
Zhangjie Fu China 30 2.0k 1.4× 1.1k 0.9× 1.1k 1.2× 1.5k 1.8× 243 0.5× 155 4.2k

Countries citing papers authored by Zheng Qin

Since Specialization
Citations

This map shows the geographic impact of Zheng Qin's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Zheng Qin with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Zheng Qin more than expected).

Fields of papers citing papers by Zheng Qin

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Zheng Qin. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Zheng Qin. The network helps show where Zheng Qin may publish in the future.

Co-authorship network of co-authors of Zheng Qin

This figure shows the co-authorship network connecting the top 25 collaborators of Zheng Qin. A scholar is included among the top collaborators of Zheng Qin based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Zheng Qin. Zheng Qin is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Jin, Wenqiang, et al.. (2025). A Secure Medical Image Encryption Scheme Based on Cross-Ring Josephus Scrambling and Two-Dimensional Cellular Automata. IEEE Transactions on Circuits and Systems for Video Technology. 35(12). 12125–12137. 1 indexed citations
2.
Tang, Dan, et al.. (2025). DNSGreen: A Comprehensive Defense System Against Bounce-Style DNS DDoS Attacks With P4. IEEE Transactions on Computers. 75(1). 247–260. 1 indexed citations
3.
Yin, Hui, et al.. (2024). Privacy-Preservation Enhanced and Efficient Attribute-Based Access Control for Smart Health in Cloud-Assisted Internet of Things. IEEE Internet of Things Journal. 1–1. 2 indexed citations
4.
Xia, Beihao, Zhu Xiao, Hongbo Jiang, et al.. (2024). Pedestrian Trajectory Prediction Based on Social Interactions Learning With Random Weights. IEEE Transactions on Multimedia. 26. 7503–7515. 12 indexed citations
5.
Xiao, Zhu, Hongbo Jiang, Yong Xiong, et al.. (2024). Learning Semantic Behavior for Human Mobility Trajectory Recovery. IEEE Transactions on Intelligent Transportation Systems. 25(8). 8849–8864. 6 indexed citations
6.
Qin, Zheng, et al.. (2024). TouchAccess: Unlock IoT Devices on Touching by Leveraging Human-Induced EM Emanations. IEEE Transactions on Mobile Computing. 23(12). 12587–12602.
7.
Tang, Dan, et al.. (2023). FTODefender: An efficient flow table overflow attacks defending system in SDN. Expert Systems with Applications. 237. 121460–121460. 10 indexed citations
8.
Chen, Jiaxin, Xin Liao, Wei Wang, & Zheng Qin. (2023). Identification of image global processing operator chain based on feature decoupling. Information Sciences. 637. 118961–118961. 5 indexed citations
9.
Ou, Lu, Shaolin Liao, Zheng Qin, et al.. (2023). FaceIDP: Face Identification Differential Privacy via Dictionary Learning Neural Networks. IEEE Access. 11. 31829–31841. 1 indexed citations
10.
Deng, Hua, Zheng Qin, Qianhong Wu, et al.. (2022). Achieving Fine-Grained Data Sharing for Hierarchical Organizations in Clouds. IEEE Transactions on Dependable and Secure Computing. 20(2). 1364–1377. 13 indexed citations
11.
Liang, Jinwen, Zheng Qin, Liang Xue, Xiaodong Lin, & Xuemin Shen. (2021). Verifiable and Secure SVM Classification for Cloud-Based Health Monitoring Services. IEEE Internet of Things Journal. 8(23). 17029–17042. 17 indexed citations
12.
Liang, Jinwen, Zheng Qin, Liang Xue, Xiaodong Lin, & Xuemin Shen. (2021). Efficient and Privacy-Preserving Decision Tree Classification for Health Monitoring Systems. IEEE Internet of Things Journal. 8(16). 12528–12539. 25 indexed citations
13.
Qin, Zheng, et al.. (2021). Privacy-Preserving Task Matching With Threshold Similarity Search via Vehicular Crowdsourcing. IEEE Transactions on Vehicular Technology. 70(7). 7161–7175. 30 indexed citations
14.
Qin, Zheng, et al.. (2021). Privacy-Preserving Keyword Similarity Search Over Encrypted Spatial Data in Cloud Computing. IEEE Internet of Things Journal. 9(8). 6184–6198. 34 indexed citations
15.
Liang, Jinwen, Zheng Qin, Jianbing Ni, Xiaodong Lin, & Xuemin Shen. (2020). Practical and Secure SVM Classification for Cloud-Based Remote Clinical Decision Services. IEEE Transactions on Computers. 70(10). 1612–1625. 27 indexed citations
16.
Deng, Hua, et al.. (2020). A Flexible Privacy-Preserving Data Sharing Scheme in Cloud-Assisted IoT. IEEE Internet of Things Journal. 7(12). 11601–11611. 43 indexed citations
17.
Zhang, Jixin, Zheng Qin, Hui Yin, Lu Ou, & Kehuan Zhang. (2019). A feature-hybrid malware variants detection using CNN based opcode embedding and BPNN based API embedding. Computers & Security. 84. 376–392. 81 indexed citations
18.
Qin, Zheng, et al.. (2019). A Novel Approach to Rule Placement in Software-Defined Networks Based on OPTree. IEEE Access. 7. 8689–8700. 7 indexed citations
19.
Ou, Lu, et al.. (2018). An Efficient and Privacy-Preserving Multiuser Cloud-Based LBS Query Scheme. Security and Communication Networks. 2018. 1–11. 15 indexed citations
20.
Yin, Hui, Zheng Qin, Jixin Zhang, Lu Ou, & Keqin Li. (2017). Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme Over Encrypted Cloud Data. IEEE Transactions on Cloud Computing. 9(1). 27–39. 24 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026