
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Boosting image watermarking authenticity spreading secrecy from counting‐based secret‐sharing
Adnan Gutub
CAAI Transactions on Intelligence Technology (2022) Vol. 8, Iss. 2, pp. 440-452
Open Access | Times Cited: 69
Adnan Gutub
CAAI Transactions on Intelligence Technology (2022) Vol. 8, Iss. 2, pp. 440-452
Open Access | Times Cited: 69
Showing 26-50 of 69 citing articles:
An Optimized Intelligent Computational Security Model for Interconnected Blockchain-IoT System & Cities
Sunil Kumar, Aman Singh, Abderrahim Benslimane, et al.
Ad Hoc Networks (2023) Vol. 151, pp. 103299-103299
Open Access | Times Cited: 11
Sunil Kumar, Aman Singh, Abderrahim Benslimane, et al.
Ad Hoc Networks (2023) Vol. 151, pp. 103299-103299
Open Access | Times Cited: 11
A lightweight intrusion detection system for internet of vehicles based on transfer learning and MobileNetV2 with hyper-parameter optimization
Yingqing Wang, Guihe Qin, Mi Zou, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 8, pp. 22347-22369
Closed Access | Times Cited: 10
Yingqing Wang, Guihe Qin, Mi Zou, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 8, pp. 22347-22369
Closed Access | Times Cited: 10
A secure and privacy preserved data aggregation scheme in IoMT
Muhammad Arif Mughal, Ata Ullah, Xinbo Yu, et al.
Heliyon (2024) Vol. 10, Iss. 7, pp. e27177-e27177
Open Access | Times Cited: 3
Muhammad Arif Mughal, Ata Ullah, Xinbo Yu, et al.
Heliyon (2024) Vol. 10, Iss. 7, pp. e27177-e27177
Open Access | Times Cited: 3
Enhancing copyright protection with Hadamard transform-based blind digital watermarking using the cycling chaos system
Alina Dash, Kshiramani Naik, Priyanka Priyadarshini
International Journal of Computers and Applications (2024) Vol. 46, Iss. 7, pp. 467-480
Closed Access | Times Cited: 3
Alina Dash, Kshiramani Naik, Priyanka Priyadarshini
International Journal of Computers and Applications (2024) Vol. 46, Iss. 7, pp. 467-480
Closed Access | Times Cited: 3
Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation
Han-Yu Lin, Tung‐Tso Tsai, Pei‐Yih Ting, et al.
Sensors (2023) Vol. 23, Iss. 5, pp. 2706-2706
Open Access | Times Cited: 8
Han-Yu Lin, Tung‐Tso Tsai, Pei‐Yih Ting, et al.
Sensors (2023) Vol. 23, Iss. 5, pp. 2706-2706
Open Access | Times Cited: 8
Dynamic Response of an Elastic Tube-like Nanostructure Embedded in a Vibrating Medium and under the Action of Moving Nano-Objects
Xiaoxia Ma, Mojtaba Roshan, Keivan Kiani, et al.
Symmetry (2023) Vol. 15, Iss. 10, pp. 1827-1827
Open Access | Times Cited: 7
Xiaoxia Ma, Mojtaba Roshan, Keivan Kiani, et al.
Symmetry (2023) Vol. 15, Iss. 10, pp. 1827-1827
Open Access | Times Cited: 7
A survey on counting-based secret sharing schemes for resource-constrained environments: techniques, security, challenges, and future directions
Bhawana Parihar, Arjun Singh Rawat, Maroti Deshmukh
The Journal of Supercomputing (2024) Vol. 80, Iss. 12, pp. 17633-17687
Closed Access | Times Cited: 2
Bhawana Parihar, Arjun Singh Rawat, Maroti Deshmukh
The Journal of Supercomputing (2024) Vol. 80, Iss. 12, pp. 17633-17687
Closed Access | Times Cited: 2
A Novel Technique to Mitigate the Data Redundancy and to Improvise Network Lifetime Using Fuzzy Criminal Search Ebola Optimization for WMSN
Mohammed Abdul Matheen, S. Sundar
Sensors (2023) Vol. 23, Iss. 4, pp. 2218-2218
Open Access | Times Cited: 6
Mohammed Abdul Matheen, S. Sundar
Sensors (2023) Vol. 23, Iss. 4, pp. 2218-2218
Open Access | Times Cited: 6
Fuzzy logic approach in salt and pepper noise
M. Ganjeh-Alamdari, R. Alikhani, Irina Perfilieva
Computers & Electrical Engineering (2022) Vol. 102, pp. 108264-108264
Closed Access | Times Cited: 10
M. Ganjeh-Alamdari, R. Alikhani, Irina Perfilieva
Computers & Electrical Engineering (2022) Vol. 102, pp. 108264-108264
Closed Access | Times Cited: 10
Modeling of Botnet Detection Using Barnacles Mating Optimizer with Machine Learning Model for Internet of Things Environment
Fatma S. Alrayes, Mohammed Maray, Abdulbaset Gaddah, et al.
Electronics (2022) Vol. 11, Iss. 20, pp. 3411-3411
Open Access | Times Cited: 10
Fatma S. Alrayes, Mohammed Maray, Abdulbaset Gaddah, et al.
Electronics (2022) Vol. 11, Iss. 20, pp. 3411-3411
Open Access | Times Cited: 10
GFL-ALDPA: a gradient compression federated learning framework based on adaptive local differential privacy budget allocation
Jiawei Yang, Shuhong Chen, Guojun Wang, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 9, pp. 26349-26368
Closed Access | Times Cited: 5
Jiawei Yang, Shuhong Chen, Guojun Wang, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 9, pp. 26349-26368
Closed Access | Times Cited: 5
Advancing Partial Verification of Watermarking for Arabic Text via Utilization of Innovative Counting-Based Secret Sharing
Adnan Gutub, Esraa Almehmadi
Arabian Journal for Science and Engineering (2022) Vol. 48, Iss. 8, pp. 9963-9989
Closed Access | Times Cited: 9
Adnan Gutub, Esraa Almehmadi
Arabian Journal for Science and Engineering (2022) Vol. 48, Iss. 8, pp. 9963-9989
Closed Access | Times Cited: 9
Adjusting counting-based secret-sharing via personalized passwords and email-authentic reliability
Adnan Gutub
Journal of Engineering Research (2023) Vol. 12, Iss. 1, pp. 107-121
Open Access | Times Cited: 5
Adnan Gutub
Journal of Engineering Research (2023) Vol. 12, Iss. 1, pp. 107-121
Open Access | Times Cited: 5
mPillBox: An open framework for a smarter pillbox
Naser AlDuaij
Journal of Network and Computer Applications (2024) Vol. 223, pp. 103824-103824
Closed Access | Times Cited: 1
Naser AlDuaij
Journal of Network and Computer Applications (2024) Vol. 223, pp. 103824-103824
Closed Access | Times Cited: 1
Novel key-integration to safeguard counting-based secret-sharing from possibilities of cyberattack breaches
Adnan Gutub, Faiza Al-Shaarani, Khoulood Alharthi
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 1
Adnan Gutub, Faiza Al-Shaarani, Khoulood Alharthi
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 1
DNA Steganography: Embedding the Secret Messages Using Glass Stack Method and Detecting Errors Made by Different Attacks
Mahbubun Nahar, A. H. M. Kamal
International Journal of Computers and Applications (2024) Vol. 46, Iss. 7, pp. 508-525
Closed Access | Times Cited: 1
Mahbubun Nahar, A. H. M. Kamal
International Journal of Computers and Applications (2024) Vol. 46, Iss. 7, pp. 508-525
Closed Access | Times Cited: 1
Lightweight and privacy-preserving device-to-device authentication to enable secure transitive communication in IoT-based smart healthcare systems
Sangjukta Das, Maheshwari Prasad Singh, Suyel Namasudra
Journal of Ambient Intelligence and Humanized Computing (2024) Vol. 15, Iss. 9, pp. 3331-3345
Closed Access | Times Cited: 1
Sangjukta Das, Maheshwari Prasad Singh, Suyel Namasudra
Journal of Ambient Intelligence and Humanized Computing (2024) Vol. 15, Iss. 9, pp. 3331-3345
Closed Access | Times Cited: 1
A framework for counting based secret sharing scheme for images
Bhawana Parihar, Maroti Deshmukh, Arjun Singh Rawat
Multimedia Tools and Applications (2024) Vol. 83, Iss. 39, pp. 86757-86790
Closed Access | Times Cited: 1
Bhawana Parihar, Maroti Deshmukh, Arjun Singh Rawat
Multimedia Tools and Applications (2024) Vol. 83, Iss. 39, pp. 86757-86790
Closed Access | Times Cited: 1
Quantum color image watermarking scheme based on quantum error correction coding *
Yumin Dong, Dingkang Mou, Hengrui Liu, et al.
New Journal of Physics (2023) Vol. 25, Iss. 11, pp. 113016-113016
Open Access | Times Cited: 4
Yumin Dong, Dingkang Mou, Hengrui Liu, et al.
New Journal of Physics (2023) Vol. 25, Iss. 11, pp. 113016-113016
Open Access | Times Cited: 4
A Data-Driven Architecture for Smart Renewable Energy Microgrids in Non-Interconnected Zones: A Colombian Case Study
Ramón Fernando Colmenares-Quintero, Gina Maestre-Góngora, Óscar Camilo Valderrama Riveros, et al.
Energies (2023) Vol. 16, Iss. 23, pp. 7900-7900
Open Access | Times Cited: 4
Ramón Fernando Colmenares-Quintero, Gina Maestre-Góngora, Óscar Camilo Valderrama Riveros, et al.
Energies (2023) Vol. 16, Iss. 23, pp. 7900-7900
Open Access | Times Cited: 4
iRSL: Intelligent RAT selection framework for beyond 5G networks
Bhanu Priya, Jyoteesh Malhotra
Multimedia Tools and Applications (2023) Vol. 83, Iss. 10, pp. 28479-28504
Closed Access | Times Cited: 3
Bhanu Priya, Jyoteesh Malhotra
Multimedia Tools and Applications (2023) Vol. 83, Iss. 10, pp. 28479-28504
Closed Access | Times Cited: 3
Detection of violence using mosaicking and DFE- WLSRF: Deep feature extraction with weighted least square with random forest
V. Elakiya, N. Puviarasan, P. Aruna
Multimedia Tools and Applications (2023) Vol. 83, Iss. 14, pp. 40873-40908
Closed Access | Times Cited: 3
V. Elakiya, N. Puviarasan, P. Aruna
Multimedia Tools and Applications (2023) Vol. 83, Iss. 14, pp. 40873-40908
Closed Access | Times Cited: 3
FSR-SPD: an efficient chaotic multi-image encryption system based on flip-shift-rotate synchronous-permutation-diffusion operation
Ankita Raghuvanshi, Muskan Budhia, K. Abhimanyu Kumar Patro, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 19, pp. 57011-57057
Open Access | Times Cited: 3
Ankita Raghuvanshi, Muskan Budhia, K. Abhimanyu Kumar Patro, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 19, pp. 57011-57057
Open Access | Times Cited: 3
Federated Learning Attacks Revisited: A Critical Discussion of Gaps, Assumptions, and Evaluation Setups
Aidmar Wainakh, Ephraim Zimmer, Sandeep Subedi, et al.
Sensors (2022) Vol. 23, Iss. 1, pp. 31-31
Open Access | Times Cited: 5
Aidmar Wainakh, Ephraim Zimmer, Sandeep Subedi, et al.
Sensors (2022) Vol. 23, Iss. 1, pp. 31-31
Open Access | Times Cited: 5
Competitive Swarm Improved Invasive Weed Optimization-Based Secret Sharing Scheme for Visual Cryptography
Arvind Singh Choudhary, Manoj Kumar
Cybernetics & Systems (2022) Vol. 55, Iss. 1, pp. 42-60
Closed Access | Times Cited: 5
Arvind Singh Choudhary, Manoj Kumar
Cybernetics & Systems (2022) Vol. 55, Iss. 1, pp. 42-60
Closed Access | Times Cited: 5