H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 48 Citations 8,555 113 World Ranking 3180 National Ranking 1669

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • The Internet
  • Computer security

His main research concerns Computer network, Computer security, Wireless sensor network, Authentication and Cryptography. As part of his studies on Computer network, Yanchao Zhang often connects relevant subjects like Radio resource management. His work investigates the relationship between Computer security and topics such as Wireless ad hoc network that intersect with problems in Mobile ad hoc network.

His Wireless sensor network study integrates concerns from other disciplines, such as Video tracking, Key distribution in wireless sensor networks, Data security and Message authentication code. Yanchao Zhang interconnects Roaming, Wireless mesh network, The Internet and Enterprise information security architecture in the investigation of issues within Authentication. The study incorporates disciplines such as Sybil attack and Public-key cryptography in addition to Cryptography.

His most cited work include:

  • Securing wireless sensor networks: a survey (346 citations)
  • Location-based compromise-tolerant security mechanisms for wireless sensor networks (296 citations)
  • An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks (260 citations)

What are the main themes of his work throughout his whole career to date?

Yanchao Zhang spends much of his time researching Computer network, Computer security, Wireless sensor network, Key distribution in wireless sensor networks and Wireless ad hoc network. His Computer network research incorporates themes from Distributed computing and Cryptography. The concepts of his Computer security study are interwoven with issues in Object, Mobile device, Internet privacy and Botnet.

The Wireless sensor network study which covers Overhead that intersects with Resilience. The various areas that Yanchao Zhang examines in his Key distribution in wireless sensor networks study include Scalability and Correctness. His studies deal with areas such as Routing protocol and Network packet as well as Wireless ad hoc network.

He most often published in these fields:

  • Computer network (56.92%)
  • Computer security (36.92%)
  • Wireless sensor network (30.00%)

What were the highlights of his more recent work (between 2017-2021)?

  • Authentication (16.92%)
  • Computer security (36.92%)
  • Internet privacy (10.77%)

In recent papers he was focusing on the following fields of study:

Authentication, Computer security, Internet privacy, Social media and Server are his primary areas of study. His Authentication research is multidisciplinary, incorporating elements of Key and Usability. His Computer security study frequently links to adjacent areas such as Botnet.

His work deals with themes such as Adversarial system and Mobile payment, which intersect with Internet privacy. Yanchao Zhang usually deals with Mobile authentication and limits it to topics linked to Cognitive neuroscience of visual object recognition and Computer network. His Computer network research is multidisciplinary, relying on both ISM band and Enhanced Data Rates for GSM Evolution.

Between 2017 and 2021, his most popular works were:

  • The Rise of Social Botnets: Attacks and Countermeasures (34 citations)
  • Protecting User Privacy: An Approach for Untraceable Web Browsing History and Unambiguous User Profiles (26 citations)
  • Privacy-Preserving Social Media Data Outsourcing (22 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • The Internet
  • Computer security

His primary areas of study are Computer security, Crowdsourcing, Differential privacy, Internet privacy and Social media. His Computer security study frequently draws connections between adjacent fields such as Botnet. The various areas that he examines in his Crowdsourcing study include Construct and Human–computer interaction.

His research in Differential privacy intersects with topics in Privacy preserving, Information privacy and Data outsourcing. His Internet privacy research integrates issues from Adversarial system and Social network analysis. Social media and User privacy are frequently intertwined in his study.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Securing wireless sensor networks: a survey

Yun Zhou;Yuguang Fang;Yanchao Zhang.
IEEE Communications Surveys and Tutorials (2008)

497 Citations

Location-based compromise-tolerant security mechanisms for wireless sensor networks

Yanchao Zhang;Wei Liu;Wenjing Lou;Yuguang Fang.
IEEE Journal on Selected Areas in Communications (2006)

445 Citations

An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks

Jinyuan Sun;Chi Zhang;Yanchao Zhang;Yuguang Fang.
IEEE Transactions on Parallel and Distributed Systems (2010)

368 Citations

Anonymous communications in mobile ad hoc networks

Yanchao Zhang;Wei Liu;Wenjing Lou.
international conference on computer communications (2005)

319 Citations

PriSense: Privacy-Preserving Data Aggregation in People-Centric Urban Sensing Systems

Jing Shi;Rui Zhang;Yunzhong Liu;Yanchao Zhang.
international conference on computer communications (2010)

285 Citations

Securing Mobile Ad Hoc Networks with Certificateless Public Keys

Yanchao Zhang;Wei Liu;Wenjing Lou;Yuguang Fang.
IEEE Transactions on Dependable and Secure Computing (2006)

268 Citations

LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks

Kui Ren;Wenjing Lou;Yanchao Zhang.
IEEE Transactions on Mobile Computing (2008)

256 Citations

MASK: anonymous on-demand routing in mobile ad hoc networks

Yanchao Zhang;Wei Liu;Wenjing Lou;Yuguang Fang.
IEEE Transactions on Wireless Communications (2006)

253 Citations

Multi-User Broadcast Authentication in Wireless Sensor Networks

Kui Ren;Shucheng Yu;Wenjing Lou;Yanchao Zhang.
IEEE Transactions on Vehicular Technology (2009)

232 Citations

Secure localization and authentication in ultra-wideband sensor networks

Yanchao Zhang;Wei Liu;Yuguang Fang;Dapeng Wu.
IEEE Journal on Selected Areas in Communications (2006)

222 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Yanchao Zhang

Xuemin Shen

Xuemin Shen

University of Waterloo

Publications: 56

Haojin Zhu

Haojin Zhu

Shanghai Jiao Tong University

Publications: 39

Rongxing Lu

Rongxing Lu

University of New Brunswick

Publications: 38

Xiaodong Lin

Xiaodong Lin

University of Guelph

Publications: 37

Wenjing Lou

Wenjing Lou

Virginia Tech

Publications: 33

Yuguang Fang

Yuguang Fang

University of Florida

Publications: 31

Kui Ren

Kui Ren

Zhejiang University

Publications: 25

Xiaohui Liang

Xiaohui Liang

University of Massachusetts Boston

Publications: 23

Junyi Li

Junyi Li

Qualcomm (United Kingdom)

Publications: 21

Mohamed Younis

Mohamed Younis

University of Maryland, Baltimore County

Publications: 19

Huan Liu

Huan Liu

Arizona State University

Publications: 18

Shigang Chen

Shigang Chen

University of Florida

Publications: 18

Rajiv Laroia

Rajiv Laroia

Qualcomm (United Kingdom)

Publications: 18

Emiliano De Cristofaro

Emiliano De Cristofaro

University College London

Publications: 17

Hui Li

Hui Li

Xidian University

Publications: 17

Something went wrong. Please try again later.