H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 32 Citations 4,041 93 World Ranking 7491 National Ranking 694

Overview

What is she best known for?

The fields of study she is best known for:

  • Cryptography
  • Algorithm
  • Artificial intelligence

Her scientific interests lie mostly in Algorithm, Theoretical computer science, Encryption, Hash function and Chaotic. In general Algorithm, her work in Cryptography is often linked to Block matrix linking many areas of study. Her Theoretical computer science research is multidisciplinary, incorporating elements of Ciphertext-only attack, Pixel, Key schedule and Integral cryptanalysis.

Her studies in Encryption integrate themes in fields like Image, Digital image, Robustness and Permutation. Her study in the fields of Cryptographic hash function, Collision resistance and Rolling hash under the domain of Hash function overlaps with other disciplines such as Password-authenticated key agreement. Her Chaotic study integrates concerns from other disciplines, such as Probabilistic encryption and CHAOS.

Her most cited work include:

  • An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules (244 citations)
  • Analysis and improvement of a chaos-based image encryption algorithm (204 citations)
  • A novel key agreement protocol based on chaotic maps (155 citations)

What are the main themes of her work throughout her whole career to date?

Her primary scientific interests are in Algorithm, Encryption, Theoretical computer science, Image and Compressed sensing. Her Algorithm research incorporates elements of Hash function and Chaotic. Her Encryption research is multidisciplinary, relying on both Information hiding, Pixel, Cryptography and Robustness.

Her Theoretical computer science study combines topics from a wide range of disciplines, such as CHAOS, Chaotic map, Chebyshev filter, Ciphertext-only attack and Probabilistic encryption. Her biological study spans a wide range of topics, including Vector quantization and Embedding. Her Compressed sensing study combines topics in areas such as Discrete cosine transform, Computational complexity theory, Decoding methods, Stream cipher and Iterative reconstruction.

She most often published in these fields:

  • Algorithm (52.43%)
  • Encryption (51.46%)
  • Theoretical computer science (38.83%)

What were the highlights of her more recent work (between 2019-2021)?

  • Encryption (51.46%)
  • Compressed sensing (26.21%)
  • Decoding methods (2.91%)

In recent papers she was focusing on the following fields of study:

Encryption, Compressed sensing, Decoding methods, Real-time computing and Algorithm are her primary areas of study. Her Encryption research incorporates themes from Information hiding and Matching. The Compressed sensing study combines topics in areas such as Computational complexity theory, Iterative reconstruction and Cipher.

Her Iterative reconstruction study incorporates themes from Multimedia, Signal processing, Image and Sample. She has included themes like Group of pictures and Data transmission in her Real-time computing study. In most of her Algorithm studies, her work intersects topics such as Image compression.

Between 2019 and 2021, her most popular works were:

  • Privacy-Assured FogCS: Chaotic Compressive Sensing for Secure Industrial Big Image Data Processing in Fog Computing (8 citations)
  • A Novel High-Capacity Data Hiding in Encrypted Images Based on Compressive Sensing Progressive Recovery (4 citations)
  • Cryptanalysis and improvement of a reversible data-hiding scheme in encrypted images by redundant space transfer (2 citations)

In her most recent research, the most cited papers focused on:

  • Artificial intelligence
  • Cryptography
  • Algorithm

Her main research concerns Information hiding, Encryption, Least significant bit, Algorithm and Cryptanalysis. The study incorporates disciplines such as Image quality, Decoding methods and Image processing in addition to Information hiding. Her Encryption research includes elements of Computer vision and Compressed sensing.

Least significant bit overlaps with fields such as Redundancy and Bit plane in her research.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Analysis and improvement of a chaos-based image encryption algorithm

Di Xiao;Xiaofeng Liao;Pengcheng Wei.
Chaos Solitons & Fractals (2009)

309 Citations

An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules

Ayesha Kulsoom;Di Xiao;Aqeel-Ur-Rehman;Syed Ali Abbas.
Multimedia Tools and Applications (2016)

261 Citations

One-way Hash function construction based on the chaotic map with changeable-parameter

Di Xiao;Xiaofeng Liao;Shaojiang Deng.
Chaos Solitons & Fractals (2005)

245 Citations

A novel key agreement protocol based on chaotic maps

Di Xiao;Xiaofeng Liao;Shaojiang Deng.
Information Sciences (2007)

215 Citations

An image encryption scheme based on rotation matrix bit-level permutation and block diffusion

Yushu Zhang;Di Xiao.
Communications in Nonlinear Science and Numerical Simulation (2014)

187 Citations

A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations

Yushu Zhang;Di Xiao;Yonglu Shu;Jing Li.
Signal Processing-image Communication (2013)

156 Citations

One-way hash function construction based on 2D coupled map lattices

Yong Wang;Xiaofeng Liao;Di Xiao;Kwok-Wo Wong.
Information Sciences (2008)

149 Citations

Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map

Hui Wang;Di Xiao;Xin Chen;Hongyu Huang.
Signal Processing (2018)

114 Citations

Embedding cryptographic features in compressive sensing

Yushu Zhang;Jiantao Zhou;Fei Chen;Leo Yu Zhang.
Neurocomputing (2016)

102 Citations

A novel Hash algorithm construction based on chaotic neural network

Yantao Li;Shaojiang Deng;Di Xiao.
Neural Computing and Applications (2011)

101 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Di Xiao

Yushu Zhang

Yushu Zhang

Nanjing University of Aeronautics and Astronautics

Publications: 55

Xingyuan Wang

Xingyuan Wang

Dalian University of Technology

Publications: 35

Chengqing Li

Chengqing Li

Hunan University

Publications: 21

Xiaofeng Liao

Xiaofeng Liao

Chongqing University

Publications: 20

Yicong Zhou

Yicong Zhou

University of Macau

Publications: 19

Chin-Chen Chang

Chin-Chen Chang

Feng Chia University

Publications: 17

Kwok-Wo Wong

Kwok-Wo Wong

City University of Hong Kong

Publications: 16

Yong Xiang

Yong Xiang

Swinburne University of Technology

Publications: 15

Muhammad Khurram Khan

Muhammad Khurram Khan

King Saud University

Publications: 12

Nanrun Zhou

Nanrun Zhou

Nanchang University

Publications: 10

Cheng-Chi Lee

Cheng-Chi Lee

Fu Jen Catholic University

Publications: 9

Tariq Shah

Tariq Shah

Quaid-i-Azam University

Publications: 9

Lixiang Li

Lixiang Li

Beijing University of Posts and Telecommunications

Publications: 9

Xinpeng Zhang

Xinpeng Zhang

Shanghai University

Publications: 8

Jiashu Zhang

Jiashu Zhang

Southwest Jiaotong University

Publications: 8

Something went wrong. Please try again later.