D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 34 Citations 4,499 110 World Ranking 8211 National Ranking 826

Overview

What is she best known for?

The fields of study she is best known for:

  • Cryptography
  • Algorithm
  • Artificial intelligence

Her scientific interests lie mostly in Algorithm, Theoretical computer science, Encryption, Hash function and Chaotic. In general Algorithm, her work in Cryptography is often linked to Block matrix linking many areas of study. Her Theoretical computer science research is multidisciplinary, incorporating elements of Ciphertext-only attack, Pixel, Key schedule and Integral cryptanalysis.

Her studies in Encryption integrate themes in fields like Image, Digital image, Robustness and Permutation. Her study in the fields of Cryptographic hash function, Collision resistance and Rolling hash under the domain of Hash function overlaps with other disciplines such as Password-authenticated key agreement. Her Chaotic study integrates concerns from other disciplines, such as Probabilistic encryption and CHAOS.

Her most cited work include:

  • An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules (244 citations)
  • Analysis and improvement of a chaos-based image encryption algorithm (204 citations)
  • A novel key agreement protocol based on chaotic maps (155 citations)

What are the main themes of her work throughout her whole career to date?

Her primary scientific interests are in Algorithm, Encryption, Theoretical computer science, Image and Compressed sensing. Her Algorithm research incorporates elements of Hash function and Chaotic. Her Encryption research is multidisciplinary, relying on both Information hiding, Pixel, Cryptography and Robustness.

Her Theoretical computer science study combines topics from a wide range of disciplines, such as CHAOS, Chaotic map, Chebyshev filter, Ciphertext-only attack and Probabilistic encryption. Her biological study spans a wide range of topics, including Vector quantization and Embedding. Her Compressed sensing study combines topics in areas such as Discrete cosine transform, Computational complexity theory, Decoding methods, Stream cipher and Iterative reconstruction.

She most often published in these fields:

  • Algorithm (52.43%)
  • Encryption (51.46%)
  • Theoretical computer science (38.83%)

What were the highlights of her more recent work (between 2019-2021)?

  • Encryption (51.46%)
  • Compressed sensing (26.21%)
  • Decoding methods (2.91%)

In recent papers she was focusing on the following fields of study:

Encryption, Compressed sensing, Decoding methods, Real-time computing and Algorithm are her primary areas of study. Her Encryption research incorporates themes from Information hiding and Matching. The Compressed sensing study combines topics in areas such as Computational complexity theory, Iterative reconstruction and Cipher.

Her Iterative reconstruction study incorporates themes from Multimedia, Signal processing, Image and Sample. She has included themes like Group of pictures and Data transmission in her Real-time computing study. In most of her Algorithm studies, her work intersects topics such as Image compression.

Between 2019 and 2021, her most popular works were:

  • Privacy-Assured FogCS: Chaotic Compressive Sensing for Secure Industrial Big Image Data Processing in Fog Computing (8 citations)
  • A Novel High-Capacity Data Hiding in Encrypted Images Based on Compressive Sensing Progressive Recovery (4 citations)
  • Cryptanalysis and improvement of a reversible data-hiding scheme in encrypted images by redundant space transfer (2 citations)

In her most recent research, the most cited papers focused on:

  • Artificial intelligence
  • Cryptography
  • Algorithm

Her main research concerns Information hiding, Encryption, Least significant bit, Algorithm and Cryptanalysis. The study incorporates disciplines such as Image quality, Decoding methods and Image processing in addition to Information hiding. Her Encryption research includes elements of Computer vision and Compressed sensing.

Least significant bit overlaps with fields such as Redundancy and Bit plane in her research.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Analysis and improvement of a chaos-based image encryption algorithm

Di Xiao;Xiaofeng Liao;Pengcheng Wei.
Chaos Solitons & Fractals (2009)

320 Citations

An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules

Ayesha Kulsoom;Di Xiao;Aqeel-Ur-Rehman;Syed Ali Abbas.
Multimedia Tools and Applications (2016)

276 Citations

One-way Hash function construction based on the chaotic map with changeable-parameter

Di Xiao;Xiaofeng Liao;Shaojiang Deng.
Chaos Solitons & Fractals (2005)

252 Citations

A novel key agreement protocol based on chaotic maps

Di Xiao;Xiaofeng Liao;Shaojiang Deng.
Information Sciences (2007)

226 Citations

An image encryption scheme based on rotation matrix bit-level permutation and block diffusion

Yushu Zhang;Di Xiao.
Communications in Nonlinear Science and Numerical Simulation (2014)

195 Citations

A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations

Yushu Zhang;Di Xiao;Yonglu Shu;Jing Li.
Signal Processing-image Communication (2013)

162 Citations

One-way hash function construction based on 2D coupled map lattices

Yong Wang;Xiaofeng Liao;Di Xiao;Kwok-Wo Wong.
Information Sciences (2008)

159 Citations

Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map

Hui Wang;Di Xiao;Xin Chen;Hongyu Huang.
Signal Processing (2018)

136 Citations

Embedding cryptographic features in compressive sensing

Yushu Zhang;Jiantao Zhou;Fei Chen;Leo Yu Zhang.
Neurocomputing (2016)

117 Citations

A novel Hash algorithm construction based on chaotic neural network

Yantao Li;Shaojiang Deng;Di Xiao.
Neural Computing and Applications (2011)

112 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Di Xiao

Yushu Zhang

Yushu Zhang

Nanjing University of Aeronautics and Astronautics

Publications: 55

Xingyuan Wang

Xingyuan Wang

Dalian University of Technology

Publications: 35

Chengqing Li

Chengqing Li

Xiangtan University

Publications: 21

Xiaofeng Liao

Xiaofeng Liao

Chongqing University

Publications: 20

Yicong Zhou

Yicong Zhou

University of Macau

Publications: 19

Chin-Chen Chang

Chin-Chen Chang

Feng Chia University

Publications: 17

Kwok-Wo Wong

Kwok-Wo Wong

City University of Hong Kong

Publications: 16

Yong Xiang

Yong Xiang

Deakin University

Publications: 15

Muhammad Khurram Khan

Muhammad Khurram Khan

King Saud University

Publications: 12

Nanrun Zhou

Nanrun Zhou

Nanchang University

Publications: 10

Cheng-Chi Lee

Cheng-Chi Lee

Fu Jen Catholic University

Publications: 9

Lixiang Li

Lixiang Li

Beijing University of Posts and Telecommunications

Publications: 9

Tariq Shah

Tariq Shah

Quaid-i-Azam University

Publications: 9

Jiashu Zhang

Jiashu Zhang

Southwest Jiaotong University

Publications: 8

Xinpeng Zhang

Xinpeng Zhang

Fudan University

Publications: 8

Chuan Qin

Chuan Qin

University of Shanghai for Science and Technology

Publications: 8

Trending Scientists

Michael Thielscher

Michael Thielscher

University of New South Wales

Marcello Pucci

Marcello Pucci

National Research Council (CNR)

Jovan Boskovic

Jovan Boskovic

Scientific Systems Company, Inc.

SangHyun Lee

SangHyun Lee

University of Michigan–Ann Arbor

Christian Holm

Christian Holm

University of Stuttgart

Jonathan J. Cooper

Jonathan J. Cooper

University of Lincoln

Takuya Nihira

Takuya Nihira

Osaka University

Bruce D. Cornuelle

Bruce D. Cornuelle

University of California, San Diego

Kozo Takahashi

Kozo Takahashi

Kyushu University

John M. Quinn

John M. Quinn

National Institute of Water and Atmospheric Research

Zhiwei Han

Zhiwei Han

Chinese Academy of Sciences

Keith L. Ligon

Keith L. Ligon

Harvard University

Jürgen C. Becker

Jürgen C. Becker

University of Duisburg-Essen

Robert S. Kerbel

Robert S. Kerbel

University of Toronto

Mark Tessler

Mark Tessler

University of Michigan–Ann Arbor

Alicia M. Soderberg

Alicia M. Soderberg

Harvard University

Something went wrong. Please try again later.