OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

PSO-based image encryption scheme using modular integrated logistic exponential map
Ömer Koçak, Uğur Erkan, Abdurrahim Toktaş, et al.
Expert Systems with Applications (2023) Vol. 237, pp. 121452-121452
Closed Access | Times Cited: 85

Showing 26-50 of 85 citing articles:

Hybrid image encryption: leveraging DNA sequencing and Lorenz chaotic dynamics for enhanced security
Kadda Benyahia, Abdelkader Khobzaoui, Samir Benbakreti
Cluster Computing (2025) Vol. 28, Iss. 4
Closed Access

Low Complexity Speech Secure Hash Retrieval Algorithm Based on KDTree Nearest Neighbor Search
Y Huang, An Li, Qiuyu Zhang
ACM Transactions on Asian and Low-Resource Language Information Processing (2025)
Closed Access

Efficient speech encryption algorithm based on three-dimensional quadratic exponential robust chaos
Y Huang, Chong Li, Zhiyong Li, et al.
Applied Acoustics (2025) Vol. 235, pp. 110672-110672
Closed Access

Comparative Analysis of the Chaotic Behavior of a Five-Dimensional Fractional Hyperchaotic System with Constant and Variable Order
Awatif Muflih Alqahtani, Arun Chaudhary, Ravi Shanker Dubey, et al.
Fractal and Fractional (2024) Vol. 8, Iss. 7, pp. 421-421
Open Access | Times Cited: 4

Efficient and secure image encryption algorithm using 2D LIM map and Latin square matrix
Xingfan Huang, Jianeng Tang, Zezong Zhang
Nonlinear Dynamics (2024)
Closed Access | Times Cited: 4

Enhancing image security via chaotic maps, Fibonacci, Tribonacci transformations, and DWT diffusion: a robust data encryption approach
Mohammad Mazyad Hazzazi, Mujeeb Ur Rehman, Arslan Shafique, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 3

Secure Encryption of Biomedical Images Based on Arneodo Chaotic System with the Lowest Fractional-Order Value
Berkay Emi̇n, Akif Akgül, Fahrettin Horasan, et al.
Electronics (2024) Vol. 13, Iss. 11, pp. 2122-2122
Open Access | Times Cited: 3

Exploiting 2D-SDMCHM and matching embedding driven by flag-shaped hexagon prediction for visually meaningful medical image cryptosystem
Xiuli Chai, Guangyu Shang, Binjie Wang, et al.
Chaos Solitons & Fractals (2024) Vol. 185, pp. 115153-115153
Closed Access | Times Cited: 3

A resilient image encryption scheme using Laplace transform
Fariha Nawaz, Saba Inam, Shamsa Kanwal, et al.
Egyptian Informatics Journal (2024) Vol. 27, pp. 100512-100512
Open Access | Times Cited: 3

Exploiting high-quality reconstruction image encryption strategy by optimized orthogonal compressive sensing
Heping Wen, Lincheng Yang, Chixin Bai, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 2

A new 3D robust chaotic mapping and its application to speech encryption
Y Huang, Ling Wang, Zhiyong Li, et al.
Chaos Solitons & Fractals (2024) Vol. 184, pp. 115038-115038
Closed Access | Times Cited: 2

A two-parameter extended logistic chaotic map for modern image cryptosystems
Abdelhakim Latoui, Mohamed El Hossine Daachi
Digital Signal Processing (2024) Vol. 148, pp. 104463-104463
Closed Access | Times Cited: 2

A Random Particle Swarm Optimization Based on Cosine Similarity for Global Optimization and Classification Problems
Yujia Liu, Yuan Zeng, Rui Li, et al.
Biomimetics (2024) Vol. 9, Iss. 4, pp. 204-204
Open Access | Times Cited: 2

Local bit-level image encryption algorithm based on one dimensional zero excluded chaotic map
Xiaogang Feng, Guankai Han, Fengying Yan, et al.
Physica Scripta (2024) Vol. 99, Iss. 6, pp. 065214-065214
Open Access | Times Cited: 2

Design and dynamics of discrete dual-memristor chaotic maps and its application in speech encryption
Shaobo He, Kai Hu, Mengjiao Wang, et al.
Chaos Solitons & Fractals (2024) Vol. 188, pp. 115517-115517
Closed Access | Times Cited: 2

2D hyperchaotic Styblinski-Tang map for image encryption and its hardware implementation
Deniz Üstün, Uğur Erkan, Abdurrahim Toktaş, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 12, pp. 34759-34772
Closed Access | Times Cited: 6

Full states pseudo-random projective synchronization of hyperchaotic system and corresponding secure communication algorithm
Zhenbo Li, Yezhi Tang, Feng Xu, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 1

Cross-Channel Color Image Encryption Scheme Based on Discrete Memristive Coupled Neurons and DWT Compression
Yinghong Cao, Chang Cai, Xianying Xu, et al.
Electronics (2024) Vol. 13, Iss. 13, pp. 2647-2647
Open Access | Times Cited: 1

Multi-view Stable Feature Selection with Adaptive Optimization of View Weights
Menghan Cui, K. Wang, Xiaojian Ding, et al.
Knowledge-Based Systems (2024) Vol. 299, pp. 111970-111970
Closed Access | Times Cited: 1

Design, Dynamical Analysis, and Hardware Implementation of a Novel Memcapacitive Hyperchaotic Logistic Map
Suo Gao, Herbert Ho‐Ching Iu, Uğur Erkan, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 18, pp. 30368-30375
Closed Access | Times Cited: 1

A hybrid northern goshawk optimization algorithm based on cluster collaboration
Changjun Wu, Qingzhen Li, Qiaohua Wang, et al.
Cluster Computing (2024) Vol. 27, Iss. 9, pp. 13203-13237
Closed Access | Times Cited: 1

Autonomous three-dimensional oscillator with two and four wings attractors embedded in the microcontroller: Analysis, amplitude controls, random number generator, and image encryption application
Prasina Alexander, Berkay Emi̇n, Isidore Komofor Ngongiah, et al.
Physica Scripta (2024) Vol. 99, Iss. 8, pp. 085243-085243
Closed Access | Times Cited: 1

Integrating Quadratic Polynomial and Symbolic Chaotic Map-Based Feistel Network to Improve Image Encryption Performance
Edy Winarno, Wiwien Hadikurniawati, Kristiawan Nugroho, et al.
IEEE Access (2024) Vol. 12, pp. 106720-106734
Open Access | Times Cited: 1

Chaos Fractal Digital Image Encryption Transmission in Underwater Optical Wireless Communication System
Amira G. Mohamed, Somia A. Abd El-Mottaleb, Mehtab Singh, et al.
IEEE Access (2024) Vol. 12, pp. 117541-117559
Open Access | Times Cited: 1

Face privacy protection scheme by security-enhanced encryption structure and nonlinear dynamics
Zhiyu Xie, Yiting Lin, Tengyu Liu, et al.
iScience (2024) Vol. 27, Iss. 9, pp. 110768-110768
Open Access | Times Cited: 1

Scroll to top