Zhiyi Tian

534 total citations · 1 hit paper
27 papers, 281 citations indexed

About

Zhiyi Tian is a scholar working on Artificial Intelligence, Computer Vision and Pattern Recognition and Computer Networks and Communications. According to data from OpenAlex, Zhiyi Tian has authored 27 papers receiving a total of 281 indexed citations (citations by other indexed papers that have themselves been cited), including 21 papers in Artificial Intelligence, 11 papers in Computer Vision and Pattern Recognition and 7 papers in Computer Networks and Communications. Recurrent topics in Zhiyi Tian's work include Adversarial Robustness in Machine Learning (7 papers), Advanced Malware Detection Techniques (6 papers) and Network Security and Intrusion Detection (5 papers). Zhiyi Tian is often cited by papers focused on Adversarial Robustness in Machine Learning (7 papers), Advanced Malware Detection Techniques (6 papers) and Network Security and Intrusion Detection (5 papers). Zhiyi Tian collaborates with scholars based in Australia, China and United Kingdom. Zhiyi Tian's co-authors include Shui Yu, Lei Cui, Jie Liang, Chenhan Zhang, Liang Liu, Weiqi Wang, James J. Q. Yu, Gang Xie, Xiaoxiong Zhong and Tom H. Luan and has published in prestigious journals such as Journal of the American Statistical Association, PLoS ONE and IEEE Communications Surveys & Tutorials.

In The Last Decade

Zhiyi Tian

18 papers receiving 276 citations

Hit Papers

A Comprehensive Survey on Poisoning Attacks and Counterme... 2022 2026 2023 2024 2022 40 80 120

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Zhiyi Tian Australia 9 192 99 68 46 29 27 281
Andrea Paudice Italy 4 276 1.4× 95 1.0× 89 1.3× 47 1.0× 31 1.1× 5 336
Xueluan Gong China 13 326 1.7× 124 1.3× 92 1.4× 44 1.0× 62 2.1× 30 407
Benjamin Zi Hao Zhao Australia 8 274 1.4× 66 0.7× 103 1.5× 39 0.8× 77 2.7× 16 345
Harry Chandra Tanuwidjaja South Korea 8 279 1.5× 238 2.4× 117 1.7× 48 1.0× 36 1.2× 14 379
Vera Rimmer Belgium 5 246 1.3× 204 2.1× 66 1.0× 88 1.9× 12 0.4× 7 312
Jan Spooren Belgium 6 202 1.1× 158 1.6× 67 1.0× 114 2.5× 14 0.5× 10 288
Arif Jamal Malik Pakistan 9 143 0.7× 171 1.7× 95 1.4× 37 0.8× 20 0.7× 15 244
Syed Raheel Hassan Pakistan 9 100 0.5× 177 1.8× 95 1.4× 83 1.8× 28 1.0× 31 281
Najwa Aaraj United States 8 160 0.8× 39 0.4× 41 0.6× 93 2.0× 40 1.4× 12 234
Xixiang Lyu China 3 305 1.6× 121 1.2× 42 0.6× 50 1.1× 15 0.5× 5 361

Countries citing papers authored by Zhiyi Tian

Since Specialization
Citations

This map shows the geographic impact of Zhiyi Tian's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Zhiyi Tian with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Zhiyi Tian more than expected).

Fields of papers citing papers by Zhiyi Tian

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Zhiyi Tian. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Zhiyi Tian. The network helps show where Zhiyi Tian may publish in the future.

Co-authorship network of co-authors of Zhiyi Tian

This figure shows the co-authorship network connecting the top 25 collaborators of Zhiyi Tian. A scholar is included among the top collaborators of Zhiyi Tian based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Zhiyi Tian. Zhiyi Tian is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Wang, Weiqi, et al.. (2025). CRFU: Compressive Representation Forgetting Against Privacy Leakage on Machine Unlearning. IEEE Transactions on Dependable and Secure Computing. 22(4). 3916–3929.
2.
Wang, Weiqi, Zhiyi Tian, An Liu, & Shui Yu. (2025). TAPE: Tailored Posterior Difference for Auditing of Machine Unlearning. 3061–3072.
3.
Tian, Zhiyi, Weiqi Wang, Chenhan Zhang, & Shui Yu. (2025). Model-Enabled Task-Oriented Semantic Communications Through Knowledge Synchronization. IEEE Transactions on Cognitive Communications and Networking. 11(5). 3371–3383. 1 indexed citations
4.
Wang, Yuntao, Ning Zhang, Zhou Su, et al.. (2024). A Survey on Semantic Communication Networks: Architecture, Security, and Privacy. IEEE Communications Surveys & Tutorials. 27(5). 2860–2894. 19 indexed citations
5.
Tian, Zhiyi, Chenhan Zhang, Weiqi Wang, Hanna Bogucka, & Shui Yu. (2024). ROSE: A Receiver-Oriented Semantic Communication Framework. IEEE Network. 39(2). 216–223.
6.
Zhang, Chenhan, Weiqi Wang, Zhiyi Tian, & Shui Yu. (2024). Forgetting and Remembering Are Both You Need: Balanced Graph Structure Unlearning. IEEE Transactions on Information Forensics and Security. 19. 6751–6763.
7.
Asiri, Abdullah M., Feng Wu, Zhiyi Tian, & Shui Yu. (2024). From the Perspective of AI Safety: Analyzing the Impact of XAI Performance on Adversarial Attack. 4982–4987. 1 indexed citations
8.
Zhou, Zhengchun, et al.. (2024). CRCGAN: Toward robust feature extraction in finger vein recognition. Pattern Recognition. 158. 111064–111064. 2 indexed citations
9.
Tian, Zhiyi, Jiaming Xu, & Jen Tang. (2024). Clustering High-Dimensional Noisy Categorical Data. Journal of the American Statistical Association. 119(548). 3008–3019. 1 indexed citations
10.
Wang, Weiqi, Zhiyi Tian, Chenhan Zhang, & Shui Yu. (2024). SCU: An Efficient Machine Unlearning Scheme for Deep Learning Enabled Semantic Communications. IEEE Transactions on Information Forensics and Security. 20. 547–558. 1 indexed citations
11.
Wang, Weiqi, Chenhan Zhang, Zhiyi Tian, & Shui Yu. (2024). FedU: Federated Unlearning via User-Side Influence Approximation Forgetting. IEEE Transactions on Dependable and Secure Computing. 22(3). 2550–2562.
12.
Zhang, Chenhan, Zhiyi Tian, Weiqi Wang, & Shui Yu. (2024). Semantic Communications Toward Graph Data. IEEE Wireless Communications. 31(6). 178–185.
13.
Wang, Weiqi, Zhiyi Tian, Chenhan Zhang, An Liu, & Shui Yu. (2023). BFU: Bayesian Federated Unlearning with Parameter Self-Sharing. 567–578. 12 indexed citations
14.
Tian, Zhiyi, et al.. (2023). The Role of Class Information in Model Inversion Attacks Against Image Deep Learning Classifiers. IEEE Transactions on Dependable and Secure Computing. 21(4). 2407–2420. 6 indexed citations
15.
Tian, Zhiyi, et al.. (2023). An Asynchronous Multi-Task Semantic Communication Method. IEEE Network. 38(4). 275–283. 5 indexed citations
16.
Guo, Shaolong, Zhou Su, Zhiyi Tian, & Shui Yu. (2022). Utility-Aware Privacy-Preserving Federated Learning through Information Bottleneck. 680–686.
17.
Zhong, Xiaoxiong, et al.. (2022). Sneaking Through Security: Mutating Live Network Traffic to Evade Learning-Based NIDS. IEEE Transactions on Network and Service Management. 19(3). 2295–2308. 14 indexed citations
18.
Tian, Zhiyi, Lei Cui, Jie Liang, & Shui Yu. (2022). A Comprehensive Survey on Poisoning Attacks and Countermeasures in Machine Learning. ACM Computing Surveys. 55(8). 1–35. 130 indexed citations breakdown →
20.
Liu, Liang, Shan Liao, Kai Li, et al.. (2020). Two-layer detection framework with a high accuracy and efficiency for a malware family over the TLS protocol. PLoS ONE. 15(5). e0232696–e0232696. 8 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026