
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
AI-Based Mobile Edge Computing for IoT: Applications, Challenges, and Future Scope
Ashish Singh, Suresh Chandra Satapathy, Arnab Roy, et al.
Arabian Journal for Science and Engineering (2022) Vol. 47, Iss. 8, pp. 9801-9831
Closed Access | Times Cited: 78
Ashish Singh, Suresh Chandra Satapathy, Arnab Roy, et al.
Arabian Journal for Science and Engineering (2022) Vol. 47, Iss. 8, pp. 9801-9831
Closed Access | Times Cited: 78
Showing 26-50 of 78 citing articles:
DPPT : A differential privacy preservation technique for cyber–physical system
Santanu Basak, Kakali Chatterjee, Ashish Singh
Computers & Electrical Engineering (2023) Vol. 109, pp. 108661-108661
Closed Access | Times Cited: 7
Santanu Basak, Kakali Chatterjee, Ashish Singh
Computers & Electrical Engineering (2023) Vol. 109, pp. 108661-108661
Closed Access | Times Cited: 7
Passive Rule-Based Approach to Detect Sinkhole Attack in RPL-Based Internet of Things Networks
Shadi Al-Sarawi, Mohammed Anbar, Basim Ahmad Alabsi, et al.
IEEE Access (2023) Vol. 11, pp. 94081-94093
Open Access | Times Cited: 7
Shadi Al-Sarawi, Mohammed Anbar, Basim Ahmad Alabsi, et al.
IEEE Access (2023) Vol. 11, pp. 94081-94093
Open Access | Times Cited: 7
Research on safety risk control of prepared foods from the perspective of supply chain
Jing Gong, Yong Sun, Du Hongyan, et al.
Heliyon (2024) Vol. 10, Iss. 3, pp. e25012-e25012
Open Access | Times Cited: 2
Jing Gong, Yong Sun, Du Hongyan, et al.
Heliyon (2024) Vol. 10, Iss. 3, pp. e25012-e25012
Open Access | Times Cited: 2
An adaptive interpolation and 3D reconstruction algorithm for underwater images
Zhijie Tang, Congqi Xu, Siyu Yan
Machine Vision and Applications (2024) Vol. 35, Iss. 2
Closed Access | Times Cited: 2
Zhijie Tang, Congqi Xu, Siyu Yan
Machine Vision and Applications (2024) Vol. 35, Iss. 2
Closed Access | Times Cited: 2
Planning and building digital twins for smart cities
Harpreet Kaur Channi, Pulkit Kumar, Farnaz Safdarian
Elsevier eBooks (2024), pp. 205-225
Closed Access | Times Cited: 2
Harpreet Kaur Channi, Pulkit Kumar, Farnaz Safdarian
Elsevier eBooks (2024), pp. 205-225
Closed Access | Times Cited: 2
Hier-SFL: Client-edge-cloud collaborative traffic classification framework based on hierarchical federated split learning
Tian Qin, Guang Cheng, Yichen Wei, et al.
Future Generation Computer Systems (2023) Vol. 149, pp. 12-24
Closed Access | Times Cited: 6
Tian Qin, Guang Cheng, Yichen Wei, et al.
Future Generation Computer Systems (2023) Vol. 149, pp. 12-24
Closed Access | Times Cited: 6
A Modular Framework for Data Processing at the Edge: Design and Implementation
Ľubomír Urblík, Erik Kajáti, Peter Papcun, et al.
Sensors (2023) Vol. 23, Iss. 17, pp. 7662-7662
Open Access | Times Cited: 6
Ľubomír Urblík, Erik Kajáti, Peter Papcun, et al.
Sensors (2023) Vol. 23, Iss. 17, pp. 7662-7662
Open Access | Times Cited: 6
Social Networking Security during COVID-19: A Systematic Literature Review
Rabia Abid, Muhammad Rizwan, Peter Veselý, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-21
Open Access | Times Cited: 9
Rabia Abid, Muhammad Rizwan, Peter Veselý, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-21
Open Access | Times Cited: 9
Autonomous DRL-based energy efficient VM consolidation for cloud data centers
Khizar Abbas, Jibum Hong, Nguyen Van Tu, et al.
Physical Communication (2022) Vol. 55, pp. 101925-101925
Closed Access | Times Cited: 9
Khizar Abbas, Jibum Hong, Nguyen Van Tu, et al.
Physical Communication (2022) Vol. 55, pp. 101925-101925
Closed Access | Times Cited: 9
Advancing Partial Verification of Watermarking for Arabic Text via Utilization of Innovative Counting-Based Secret Sharing
Adnan Gutub, Esraa Almehmadi
Arabian Journal for Science and Engineering (2022) Vol. 48, Iss. 8, pp. 9963-9989
Closed Access | Times Cited: 9
Adnan Gutub, Esraa Almehmadi
Arabian Journal for Science and Engineering (2022) Vol. 48, Iss. 8, pp. 9963-9989
Closed Access | Times Cited: 9
The decadal perspective of facial emotion processing and Recognition: A survey
Navjot Rathour, Rajesh Singh, Anita Gehlot, et al.
Displays (2022) Vol. 75, pp. 102330-102330
Closed Access | Times Cited: 8
Navjot Rathour, Rajesh Singh, Anita Gehlot, et al.
Displays (2022) Vol. 75, pp. 102330-102330
Closed Access | Times Cited: 8
A Cooperative PoW and Incentive Mechanism for Blockchain in Edge Computing
Liuling Qi, Junfeng Tian, Mengjia Chai, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 20, pp. 18111-18124
Closed Access | Times Cited: 4
Liuling Qi, Junfeng Tian, Mengjia Chai, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 20, pp. 18111-18124
Closed Access | Times Cited: 4
A Novel Resilient and Intelligent Predictive Model for CPS-Enabled E-Health Applications
Amjad Rehman, Khalid Haseeb, Teg Alam, et al.
Cognitive Computation (2024) Vol. 16, Iss. 3, pp. 1321-1330
Closed Access | Times Cited: 1
Amjad Rehman, Khalid Haseeb, Teg Alam, et al.
Cognitive Computation (2024) Vol. 16, Iss. 3, pp. 1321-1330
Closed Access | Times Cited: 1
Federated deep reinforcement learning for task offloading and resource allocation in mobile edge computing-assisted vehicular networks
Xu Zhao, Yichuan Wu, Tianhao Zhao, et al.
Journal of Network and Computer Applications (2024) Vol. 229, pp. 103941-103941
Closed Access | Times Cited: 1
Xu Zhao, Yichuan Wu, Tianhao Zhao, et al.
Journal of Network and Computer Applications (2024) Vol. 229, pp. 103941-103941
Closed Access | Times Cited: 1
Edge Computing in Centralized Data Server Deployment for Network Qos and Latency Improvement for Virtualization Environment
Ashok Kumar Yadav, Ms. Bhanu Sharma, Akash Kumar Bhagat, et al.
International Journal of Communication Networks and Information Security (IJCNIS) (2023) Vol. 14, Iss. 3, pp. 214-225
Open Access | Times Cited: 4
Ashok Kumar Yadav, Ms. Bhanu Sharma, Akash Kumar Bhagat, et al.
International Journal of Communication Networks and Information Security (IJCNIS) (2023) Vol. 14, Iss. 3, pp. 214-225
Open Access | Times Cited: 4
LMNet: Lightweight multi-scale convolutional neural network architecture for COVID-19 detection in IoMT environment
Vishwajeet Dwivedy, Harsh Deep Shukla, Pradeep Kumar Roy
Computers & Electrical Engineering (2022) Vol. 103, pp. 108325-108325
Open Access | Times Cited: 7
Vishwajeet Dwivedy, Harsh Deep Shukla, Pradeep Kumar Roy
Computers & Electrical Engineering (2022) Vol. 103, pp. 108325-108325
Open Access | Times Cited: 7
Lightweight Unified Collaborated Relinquish Edge Intelligent Gateway Architecture With Joint Optimization
R. Ramya, S. Ramamoorthy
IEEE Access (2023) Vol. 11, pp. 90396-90409
Open Access | Times Cited: 3
R. Ramya, S. Ramamoorthy
IEEE Access (2023) Vol. 11, pp. 90396-90409
Open Access | Times Cited: 3
Quantum-Empowered Federated Learning and 6G Wireless Networks for IoT Security: Concept, Challenges and Future Directions
Danish Javeed, Muhammad Shahid Saeed, Ijaz Ahmad, et al.
(2023)
Open Access | Times Cited: 3
Danish Javeed, Muhammad Shahid Saeed, Ijaz Ahmad, et al.
(2023)
Open Access | Times Cited: 3
DTC: A Dynamic Trusted Collaboration Architecture for Mobile Edge Computing
Ruizhong Du, Yan Gao
(2022)
Closed Access | Times Cited: 5
Ruizhong Du, Yan Gao
(2022)
Closed Access | Times Cited: 5
Securing the Perceptual Layer of the Internet of Things (Iot) Devices Using Elliptic Curve Cryptography
T. M. Okediran, Olufunke Rebecca Vincent, Adebayo Abayomi‐Alli, et al.
Research Square (Research Square) (2023)
Open Access | Times Cited: 2
T. M. Okediran, Olufunke Rebecca Vincent, Adebayo Abayomi‐Alli, et al.
Research Square (Research Square) (2023)
Open Access | Times Cited: 2
Securing High-Resolution Images From Unmanned Aerial Vehicles With DNA Encoding and Bit-Plane Extraction Method
Arslan Shafique, Mujeeb Ur Rehman, Kashif Hesham Khan, et al.
IEEE Access (2023) Vol. 11, pp. 44559-44577
Open Access | Times Cited: 2
Arslan Shafique, Mujeeb Ur Rehman, Kashif Hesham Khan, et al.
IEEE Access (2023) Vol. 11, pp. 44559-44577
Open Access | Times Cited: 2
Virtual Machine Migration Strategy Based on Markov Decision and Greedy Algorithm in Edge Computing Environment
Ma Xiaoxue, Wangkai He, Yan Gao
Wireless Communications and Mobile Computing (2023) Vol. 2023, pp. 1-13
Open Access | Times Cited: 2
Ma Xiaoxue, Wangkai He, Yan Gao
Wireless Communications and Mobile Computing (2023) Vol. 2023, pp. 1-13
Open Access | Times Cited: 2
Theil-Sen Regressive Miyaguchi–Preneel-based Cryptographic Hash Blockchain for Secure Data Transmission Using Remote Sensing Data in IoT
B. Sharmila, T. Kalavathi Devi
IETE Journal of Research (2023) Vol. 70, Iss. 1, pp. 116-129
Open Access | Times Cited: 2
B. Sharmila, T. Kalavathi Devi
IETE Journal of Research (2023) Vol. 70, Iss. 1, pp. 116-129
Open Access | Times Cited: 2
Statistical methods for feature selection: unlocking the key to improved accuracy
Bidyapati Thiyam, Shouvik Dey
International Journal of Computers and Applications (2023) Vol. 45, Iss. 6, pp. 433-443
Closed Access | Times Cited: 2
Bidyapati Thiyam, Shouvik Dey
International Journal of Computers and Applications (2023) Vol. 45, Iss. 6, pp. 433-443
Closed Access | Times Cited: 2
Characterizing Mobile Money Phishing Using Reinforcement Learning
Alima Nzeket Njoya, Vanelle Laure Tchaya Ngongag, Franklin Tchakounté, et al.
IEEE Access (2023) Vol. 11, pp. 103839-103862
Open Access | Times Cited: 2
Alima Nzeket Njoya, Vanelle Laure Tchaya Ngongag, Franklin Tchakounté, et al.
IEEE Access (2023) Vol. 11, pp. 103839-103862
Open Access | Times Cited: 2