Zhengan Huang

1.8k total citations · 2 hit papers
29 papers, 1.3k citations indexed

About

Zhengan Huang is a scholar working on Artificial Intelligence, Information Systems and Computational Theory and Mathematics. According to data from OpenAlex, Zhengan Huang has authored 29 papers receiving a total of 1.3k indexed citations (citations by other indexed papers that have themselves been cited), including 27 papers in Artificial Intelligence, 13 papers in Information Systems and 7 papers in Computational Theory and Mathematics. Recurrent topics in Zhengan Huang's work include Cryptography and Data Security (26 papers), Privacy-Preserving Technologies in Data (12 papers) and Cloud Data Security Solutions (11 papers). Zhengan Huang is often cited by papers focused on Cryptography and Data Security (26 papers), Privacy-Preserving Technologies in Data (12 papers) and Cloud Data Security Solutions (11 papers). Zhengan Huang collaborates with scholars based in China, Hong Kong and Australia. Zhengan Huang's co-authors include Jin Li, Chong Gao, Ping Li, Kai Chen, Wenbin Chen, Tong Li, Siu‐Ming Yiu, Hongyang Yan, Jian Shen and Qun Lin and has published in prestigious journals such as IEEE Access, Information Sciences and Future Generation Computer Systems.

In The Last Decade

Zhengan Huang

26 papers receiving 1.3k citations

Hit Papers

Multi-key privacy-preserving deep learning in cloud compu... 2017 2026 2020 2023 2017 2017 100 200 300

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Zhengan Huang China 13 863 541 419 198 120 29 1.3k
Youwen Zhu China 17 615 0.7× 382 0.7× 211 0.5× 190 1.0× 59 0.5× 82 963
Chaowen Guan China 11 785 0.9× 564 1.0× 389 0.9× 141 0.7× 152 1.3× 21 1.2k
Yupeng Zhang United States 14 1.4k 1.7× 391 0.7× 243 0.6× 254 1.3× 112 0.9× 41 1.7k
Jianfeng Wang China 19 1.0k 1.2× 819 1.5× 451 1.1× 253 1.3× 245 2.0× 105 1.6k
Baocang Wang China 20 899 1.0× 584 1.1× 362 0.9× 154 0.8× 111 0.9× 133 1.2k
Atsuko Miyaji Japan 14 881 1.0× 570 1.1× 296 0.7× 138 0.7× 132 1.1× 162 1.1k
John Wernsing United States 8 781 0.9× 223 0.4× 252 0.6× 216 1.1× 70 0.6× 13 1.1k
Wen-Guey Tzeng Taiwan 19 773 0.9× 371 0.7× 547 1.3× 260 1.3× 165 1.4× 54 1.2k
Boyang Wang United States 23 1.7k 2.0× 1.3k 2.3× 321 0.8× 116 0.6× 96 0.8× 73 2.0k

Countries citing papers authored by Zhengan Huang

Since Specialization
Citations

This map shows the geographic impact of Zhengan Huang's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Zhengan Huang with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Zhengan Huang more than expected).

Fields of papers citing papers by Zhengan Huang

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Zhengan Huang. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Zhengan Huang. The network helps show where Zhengan Huang may publish in the future.

Co-authorship network of co-authors of Zhengan Huang

This figure shows the co-authorship network connecting the top 25 collaborators of Zhengan Huang. A scholar is included among the top collaborators of Zhengan Huang based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Zhengan Huang. Zhengan Huang is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Zeng, Wei, et al.. (2025). Dual-targeted microbubbles for atherosclerosis therapy: Inducing M1 macrophage apoptosis by inhibiting telomerase activity. Materials Today Bio. 32. 101675–101675. 2 indexed citations
2.
Chen, Wenbin & Zhengan Huang. (2024). Towards tightly secure short linearly homomorphic signatures. Theoretical Computer Science. 1014. 114758–114758.
3.
Mu, Xin, et al.. (2024). EncryIP: A Practical Encryption-Based Framework for Model Intellectual Property Protection. Proceedings of the AAAI Conference on Artificial Intelligence. 38(19). 21438–21445. 3 indexed citations
4.
Yiu, Siu Ming, et al.. (2023). Self–Tallying Electronic Voting Based on Blockchain. ITNOW. 65(1). 66–66. 1 indexed citations
5.
Huang, Zhengan, et al.. (2022). Receiver selective opening security for identity-based encryption in the multi-challenge setting. Designs Codes and Cryptography. 91(4). 1233–1259. 1 indexed citations
6.
Huang, Zhengan, et al.. (2021). Selective-Opening Security for Public-Key Encryption in the Presence of Parameter Subversion. Security and Communication Networks. 2021. 1–16.
7.
Chen, Wenbin, Jin Li, Zhengan Huang, et al.. (2021). Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key. Journal of Computer and System Sciences. 120. 137–148. 9 indexed citations
8.
Lai, Junzuo, Zhengan Huang, Man Ho Au, & Xianping Mao. (2020). Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation. Theoretical Computer Science. 847. 1–16. 3 indexed citations
9.
Li, Jing, Xianmin Wang, Zhengan Huang, Licheng Wang, & Yang Xiang. (2019). Multi-level multi-secret sharing scheme for decentralized e-voting in cloud computing. Journal of Parallel and Distributed Computing. 130. 91–97. 33 indexed citations
10.
Lin, Qun, Jin Li, Zhengan Huang, Wenbin Chen, & Jian Shen. (2018). A Short Linearly Homomorphic Proxy Signature Scheme. IEEE Access. 6. 12966–12972. 58 indexed citations
11.
Lin, Qun, Hongyang Yan, Zhengan Huang, et al.. (2018). An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain. IEEE Access. 6. 20632–20640. 161 indexed citations
12.
Tian, Hui, Zhaoyi Chen, Chin‐Chen Chang, et al.. (2018). Public audit for operation behavior logs with error locating in cloud storage. Soft Computing. 23(11). 3779–3792. 26 indexed citations
13.
Huang, Zhengan, Junzuo Lai, Wenbin Chen, et al.. (2018). Simulation-based selective opening security for receivers under chosen-ciphertext attacks. Designs Codes and Cryptography. 87(6). 1345–1371. 6 indexed citations
14.
Li, Jing, Jing Li, Licheng Wang, et al.. (2018). Verifiable Chebyshev maps‐based chaotic encryption schemes with outsourcing computations in the cloud/fog scenarios. Concurrency and Computation Practice and Experience. 31(22). 13 indexed citations
15.
Huang, Zhengan, Junzuo Lai, Wenbin Chen, Tong Li, & Yang Xiang. (2018). Data security against receiver corruptions: SOA security for receivers from simulatable DEMs. Information Sciences. 471. 201–215. 16 indexed citations
16.
Gong, Zheng, et al.. (2017). A new efficient authorized private set intersection protocol from Schnorr signature and its applications. Cluster Computing. 21(1). 287–297. 5 indexed citations
17.
Huang, Zhengan, Shengli Liu, Xianping Mao, Kefei Chen, & Jin Li. (2017). Insight of the protection for data security under selective opening attacks. Information Sciences. 412-413. 223–241. 137 indexed citations
18.
Cai, Zhaoquan, et al.. (2017). Towards secure and flexible EHR sharing in mobile health cloud under static assumptions. Cluster Computing. 20(3). 2415–2422. 65 indexed citations
19.
Li, Ping, Jin Li, Zhengan Huang, et al.. (2017). Privacy-preserving outsourced classification in cloud computing. Cluster Computing. 21(1). 277–286. 234 indexed citations breakdown →
20.
Huang, Zhengan, Shengli Liu, Baodong Qin, & Kefei Chen. (2015). Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited. International Journal of Applied Mathematics and Computer Science. 25(2). 415–430. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026