Ziqing Wang

527 total citations
19 papers, 358 citations indexed

About

Ziqing Wang is a scholar working on Artificial Intelligence, Computer Networks and Communications and Computer Vision and Pattern Recognition. According to data from OpenAlex, Ziqing Wang has authored 19 papers receiving a total of 358 indexed citations (citations by other indexed papers that have themselves been cited), including 11 papers in Artificial Intelligence, 7 papers in Computer Networks and Communications and 4 papers in Computer Vision and Pattern Recognition. Recurrent topics in Ziqing Wang's work include Cryptography and Data Security (9 papers), Advanced Authentication Protocols Security (4 papers) and Security in Wireless Sensor Networks (4 papers). Ziqing Wang is often cited by papers focused on Cryptography and Data Security (9 papers), Advanced Authentication Protocols Security (4 papers) and Security in Wireless Sensor Networks (4 papers). Ziqing Wang collaborates with scholars based in China. Ziqing Wang's co-authors include Fagen Li, Gaoping Li, Chunhua Jin, Dazhuan Xu, Xiaofei Zhang, Xiaoguang Liu, Yalan Ye, Zhongpeng Wang, Fei Qiu and Yi Ding and has published in prestigious journals such as IEEE Access, Sustainability and IEEE Internet of Things Journal.

In The Last Decade

Ziqing Wang

18 papers receiving 333 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Ziqing Wang China 8 186 130 126 74 72 19 358
Paul W. McBurney United States 10 524 2.8× 129 1.0× 321 2.5× 66 0.9× 92 1.3× 25 674
Gelei Deng Singapore 10 103 0.6× 80 0.6× 137 1.1× 61 0.8× 20 0.3× 22 303
Liming Wang China 9 76 0.4× 148 1.1× 115 0.9× 53 0.7× 12 0.2× 65 298
Emmanuel Conchon France 8 90 0.5× 127 1.0× 63 0.5× 48 0.6× 15 0.2× 21 231
Hussein Abulkasim Egypt 12 95 0.5× 108 0.8× 210 1.7× 10 0.1× 50 0.7× 27 382
Gökhan Dalkılıç Türkiye 10 252 1.4× 152 1.2× 219 1.7× 49 0.7× 18 0.3× 54 438
Yizhou Shen China 11 105 0.6× 256 2.0× 115 0.9× 78 1.1× 19 0.3× 24 362
Durbadal Chattaraj India 7 265 1.4× 246 1.9× 126 1.0× 34 0.5× 63 0.9× 13 386

Countries citing papers authored by Ziqing Wang

Since Specialization
Citations

This map shows the geographic impact of Ziqing Wang's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Ziqing Wang with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Ziqing Wang more than expected).

Fields of papers citing papers by Ziqing Wang

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Ziqing Wang. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Ziqing Wang. The network helps show where Ziqing Wang may publish in the future.

Co-authorship network of co-authors of Ziqing Wang

This figure shows the co-authorship network connecting the top 25 collaborators of Ziqing Wang. A scholar is included among the top collaborators of Ziqing Wang based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Ziqing Wang. Ziqing Wang is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

19 of 19 papers shown
2.
Wang, Ziqing, et al.. (2024). A new construction of public key authenticated encryption with keyword search based on LWE. Telecommunication Systems. 86(2). 229–240.
4.
Wang, Yuping, et al.. (2022). A centerline symmetry and double-line transformation based algorithm for large-scale multi-objective optimization. Connection Science. 34(1). 1454–1481. 1 indexed citations
5.
Wang, Ziqing, et al.. (2022). A group key agreement protocol based on ECDH and short signature. Journal of Information Security and Applications. 72. 103388–103388. 13 indexed citations
6.
Wang, Ziqing, et al.. (2022). A two rounds dynamic authenticated group key agreement protocol based on LWE. Journal of Systems Architecture. 133. 102756–102756. 5 indexed citations
7.
Wang, Ziqing, et al.. (2022). A Pairing-Free Heterogeneous Signcryption Scheme for Unmanned Aerial Vehicles. IEEE Internet of Things Journal. 9(19). 19426–19437. 26 indexed citations
8.
Liu, Xiaoguang, et al.. (2021). A Blockchain‐Based Auto Insurance Data Sharing Scheme. Wireless Communications and Mobile Computing. 2021(1). 7 indexed citations
9.
Wang, Ziqing, et al.. (2021). A public key encryption scheme based on a new variant of LWE with small cipher size. Journal of Systems Architecture. 117. 102165–102165. 3 indexed citations
10.
Guo, Jiye, Huayan Chen, Zhengwei Shen, & Ziqing Wang. (2021). Image denoising based on global image similar patches searching and HOSVD to patches tensor. EURASIP Journal on Advances in Signal Processing. 2022(1). 4 indexed citations
11.
Wang, Ziqing, et al.. (2021). Digital signature with cryptographic reverse firewalls. Journal of Systems Architecture. 116. 102029–102029. 9 indexed citations
12.
Liu, Xiaoguang, Ziqing Wang, Yalan Ye, & Fagen Li. (2020). An efficient and practical certificateless signcryption scheme for wireless body area networks. Computer Communications. 162. 169–178. 26 indexed citations
13.
Wang, Ziqing, et al.. (2019). A Blockchain-Based Medical Data Sharing and Protection Scheme. IEEE Access. 7. 118943–118953. 154 indexed citations
14.
Wang, Zhongpeng, Zhongpeng Wang, Ziqing Wang, Ziqing Wang, & Shoufa Chen. (2018). Encrypted image transmission in OFDM-based VLC systems using symbol scrambling and chaotic DFT precoding. Optics Communications. 431. 229–237. 11 indexed citations
15.
Wang, Ziqing, et al.. (2018). Physical Intrusion Detection System Based on Behavioral Sign Recognition. 41. 505–510. 1 indexed citations
16.
Wang, Xu An, et al.. (2011). Proxy Re-encryption with Keyword Search from Anonymous Conditional Proxy Re-encryption. 969–973. 7 indexed citations
17.
Wang, Xu An, et al.. (2011). K-times Proxy Re-encryption. 5735. 949–953. 1 indexed citations
18.
Zhang, Xiaofei, et al.. (2009). On the MUSIC-derived Approaches of Angle Estimation for Bistatic MIMO Radar. 343–346. 65 indexed citations
19.
Wang, Ziqing, et al.. (2009). BLIND PARALIND MULTIUSER DETECTION FOR SMART ANTENNA CDMA SYSTEM OVER MULTIPATH FADING CHANNEL. Electromagnetic waves. 89. 23–38. 17 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026