D-Index & Metrics Best Publications

D-Index & Metrics

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 53 Citations 10,450 348 World Ranking 2435 National Ranking 242

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • Operating system
  • Artificial intelligence

The scientist’s investigation covers issues in Computer security, Cloud computing, Recurrent neural network, Trust management and Computational trust. The Computer security study combines topics in areas such as Mobile device, Computer network, Cloud computing security and Wireless. His Cloud computing research incorporates themes from Virtual machine and Encryption.

His Recurrent neural network research focuses on Control theory and how it relates to Memristor. Zheng Yan has included themes like Layer, Knowledge management, Middleware, Function and Secure multi-party computation in his Trust management study. While the research belongs to areas of Secure multi-party computation, Zheng Yan spends his time largely on the problem of Information security, intersecting his research to questions surrounding Sensor fusion.

His most cited work include:

  • A survey on trust management for Internet of Things (675 citations)
  • A survey on trust management for Internet of Things (675 citations)
  • From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework (171 citations)

What are the main themes of his work throughout his whole career to date?

Zheng Yan focuses on Computer security, Computer network, Cloud computing, Trust management and The Internet. His Computer security research is multidisciplinary, incorporating perspectives in Mobile device, Cloud computing security, Mobile computing and Internet privacy. His biological study spans a wide range of topics, including Security service and Big data.

His research integrates issues of Wireless and Scalability in his study of Computer network. His work in Cloud computing tackles topics such as Data deduplication which are related to areas like Cloud storage. Zheng Yan interconnects Trusted Computing, Control and Knowledge management in the investigation of issues within Trust management.

He most often published in these fields:

  • Computer security (40.66%)
  • Computer network (22.82%)
  • Cloud computing (18.46%)

What were the highlights of his more recent work (between 2019-2021)?

  • Computer security (40.66%)
  • Cloud computing (18.46%)
  • Blockchain (7.05%)

In recent papers he was focusing on the following fields of study:

His scientific interests lie mostly in Computer security, Cloud computing, Blockchain, Computer network and Artificial intelligence. His work on Cloud storage as part of general Computer security research is frequently linked to Data collection, bridging the gap between disciplines. His studies in Cloud computing integrate themes in fields like Homomorphic encryption, Encryption, Information privacy and Access control.

His work on Base station as part of general Computer network research is frequently linked to Wireless network virtualization, thereby connecting diverse disciplines of science. As a part of the same scientific study, Zheng Yan usually deals with the Artificial intelligence, concentrating on Machine learning and frequently concerns with State. His work in Sensor fusion addresses subjects such as Port, which are connected to disciplines such as Field.

Between 2019 and 2021, his most popular works were:

  • A privacy-preserving cryptosystem for IoT E-healthcare (56 citations)
  • A privacy-preserving cryptosystem for IoT E-healthcare (56 citations)
  • A survey on machine learning for data fusion (49 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Computer network
  • Artificial intelligence

His primary areas of investigation include Cloud computing, Internet privacy, Information privacy, Blockchain and Computer security. His Cloud computing research incorporates elements of Data as a service, The Internet, Encryption and Access control. The various areas that Zheng Yan examines in his The Internet study include Exploit, Information security and Differential privacy.

The study incorporates disciplines such as Cryptocurrency and Openness to experience in addition to Internet privacy. His Blockchain study combines topics in areas such as Transparency, Open research and Vehicular ad hoc network. Many of his studies involve connections with topics such as Wireless and Computer security.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

A survey on trust management for Internet of Things

Zheng Yan;Zheng Yan;Peng Zhang;Athanasios V. Vasilakos.
Journal of Network and Computer Applications (2014)

802 Citations

Active ticket with dynamic characteristic such as appearance with various validation options

Petteri Saarinen;Mia Lahteenmaki;Zheng Yan.
(2004)

272 Citations

Trust Evaluation Based Security Solution in Ad Hoc Networks

Zheng Yan;Peng Zhang;Teemupekka Virtanen.
(2003)

246 Citations

From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework

Opeyemi Osanaiye;Shuo Chen;Zheng Yan;Rongxing Lu.
IEEE Access (2017)

196 Citations

Global exponential dissipativity and stabilization of memristor-based recurrent neural networks with time-varying delays

Zhenyuan Guo;Zhenyuan Guo;Jun Wang;Zheng Yan.
Neural Networks (2013)

190 Citations

Security, Privacy and Anonymity in Computation, Communication and Storage

Guojun Wang;Mohammed Atiquzzaman;Zheng Yan;Kim-Kwang Raymond Choo.
International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (2016)

188 Citations

Trust Modeling and Management: From Social Trust to Digital Trust

Zheng Yan;Silke Holtmanns.
(2008)

168 Citations

Attractivity Analysis of Memristor-Based Cellular Neural Networks With Time-Varying Delays

Zhenyuan Guo;Jun Wang;Zheng Yan.
IEEE Transactions on Neural Networks (2014)

167 Citations

A security and trust framework for virtualized networks and software-defined networking

Zheng Yan;Zheng Yan;Peng Zhang;Athanasios V. Vasilakos.
Security and Communication Networks (2016)

164 Citations

Global Exponential Synchronization of Two Memristor-Based Recurrent Neural Networks With Time Delays via Static or Dynamic Coupling

Zhenyuan Guo;Jun Wang;Zheng Yan.
systems man and cybernetics (2015)

156 Citations

Best Scientists Citing Zheng Yan

Tingwen Huang

Tingwen Huang

Texas A&M University at Qatar

Publications: 57

Jinde Cao

Jinde Cao

Southeast University

Publications: 55

Zhigang Zeng

Zhigang Zeng

Huazhong University of Science and Technology

Publications: 37

Shiping Wen

Shiping Wen

University of Technology Sydney

Publications: 30

Neeraj Kumar

Neeraj Kumar

Thapar University

Publications: 23

Chuandong Li

Chuandong Li

Southwest University

Publications: 18

Steven G. LeMay

Steven G. LeMay

International Game Technology (Canada)

Publications: 14

Shukai Duan

Shukai Duan

Southwest University

Publications: 12

Zhanshan Wang

Zhanshan Wang

Northeastern University

Publications: 12

Laurence T. Yang

Laurence T. Yang

St. Francis Xavier University

Publications: 12

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 12

Athanasios V. Vasilakos

Athanasios V. Vasilakos

Luleå University of Technology

Publications: 12

Mika Ylianttila

Mika Ylianttila

University of Oulu

Publications: 12

Khan Muhammad

Khan Muhammad

Sejong University

Publications: 11

Lixiang Li

Lixiang Li

Beijing University of Posts and Telecommunications

Publications: 10

Lihong Huang

Lihong Huang

Changsha University of Science and Technology

Publications: 10

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us
Something went wrong. Please try again later.