
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Method of Information Protection for Collaborative Deep Learning under GAN Model Attack
Xiaodan Yan, Baojiang Cui, Yang Xu, et al.
IEEE/ACM Transactions on Computational Biology and Bioinformatics (2019) Vol. 18, Iss. 3, pp. 871-881
Closed Access | Times Cited: 70
Xiaodan Yan, Baojiang Cui, Yang Xu, et al.
IEEE/ACM Transactions on Computational Biology and Bioinformatics (2019) Vol. 18, Iss. 3, pp. 871-881
Closed Access | Times Cited: 70
Showing 26-50 of 70 citing articles:
Lightweight Attention Pyramid Network for Object Detection and Instance Segmentation
Jiwei Zhang, Yanyu Yan, Zelei Cheng, et al.
Applied Sciences (2020) Vol. 10, Iss. 3, pp. 883-883
Open Access | Times Cited: 16
Jiwei Zhang, Yanyu Yan, Zelei Cheng, et al.
Applied Sciences (2020) Vol. 10, Iss. 3, pp. 883-883
Open Access | Times Cited: 16
MP-CLF: An effective Model-Preserving Collaborative deep Learning Framework for mitigating data leakage under the GAN
Zhenzhu Chen, Jie Wu, Anmin Fu, et al.
Knowledge-Based Systems (2023) Vol. 270, pp. 110527-110527
Closed Access | Times Cited: 5
Zhenzhu Chen, Jie Wu, Anmin Fu, et al.
Knowledge-Based Systems (2023) Vol. 270, pp. 110527-110527
Closed Access | Times Cited: 5
A multimodal deep architecture for traditional Chinese medicine diagnosis
Yinglong Dai, Guojun Wang, Jianhua Dai, et al.
Concurrency and Computation Practice and Experience (2020) Vol. 32, Iss. 19
Closed Access | Times Cited: 13
Yinglong Dai, Guojun Wang, Jianhua Dai, et al.
Concurrency and Computation Practice and Experience (2020) Vol. 32, Iss. 19
Closed Access | Times Cited: 13
TAWSEEM: A Deep-Learning-Based Tool for Estimating the Number of Unknown Contributors in DNA Profiling
Hamdah Alotaibi, Fawaz Alsolami, Ehab Abozinadah, et al.
Electronics (2022) Vol. 11, Iss. 4, pp. 548-548
Open Access | Times Cited: 8
Hamdah Alotaibi, Fawaz Alsolami, Ehab Abozinadah, et al.
Electronics (2022) Vol. 11, Iss. 4, pp. 548-548
Open Access | Times Cited: 8
Design Pattern and Challenges of Federated Learning with Applications in Industrial Control System
Hina Batool, Jiuyun Xu, Ateeq Ur Rehman, et al.
Journal on artificial intelligence (2024) Vol. 6, Iss. 1, pp. 105-128
Open Access | Times Cited: 1
Hina Batool, Jiuyun Xu, Ateeq Ur Rehman, et al.
Journal on artificial intelligence (2024) Vol. 6, Iss. 1, pp. 105-128
Open Access | Times Cited: 1
Detection and Mitigation of Label-Flipping Attacks in FL Systems With KL Divergence
Liguang Zang, Yuancheng Li
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 19, pp. 32221-32233
Closed Access | Times Cited: 1
Liguang Zang, Yuancheng Li
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 19, pp. 32221-32233
Closed Access | Times Cited: 1
OFPP-GAN: One-Shot Federated Personalized Protection–Generative Adversarial Network
Zhenyu Jiang, Changli Zhou, Hui Tian, et al.
Electronics (2024) Vol. 13, Iss. 17, pp. 3423-3423
Open Access | Times Cited: 1
Zhenyu Jiang, Changli Zhou, Hui Tian, et al.
Electronics (2024) Vol. 13, Iss. 17, pp. 3423-3423
Open Access | Times Cited: 1
BFR‐SE: A Blockchain‐Based Fair and Reliable Searchable Encryption Scheme for IoT with Fine‐Grained Access Control in Cloud Environment
Hongmin Gao, Shoushan Luo, Zhaofeng Ma, et al.
Wireless Communications and Mobile Computing (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 11
Hongmin Gao, Shoushan Luo, Zhaofeng Ma, et al.
Wireless Communications and Mobile Computing (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 11
A deep‐learning based solar irradiance forecast using missing data
Shuo Shan, Xiangying Xie, Tao Fan, et al.
IET Renewable Power Generation (2022) Vol. 16, Iss. 7, pp. 1462-1473
Open Access | Times Cited: 7
Shuo Shan, Xiangying Xie, Tao Fan, et al.
IET Renewable Power Generation (2022) Vol. 16, Iss. 7, pp. 1462-1473
Open Access | Times Cited: 7
Image Authentication Using QR Code Watermarking Approach Based on Image Segmentation
Xiaomei Liu, Xin Tang
2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (2020), pp. 1572-1577
Closed Access | Times Cited: 9
Xiaomei Liu, Xin Tang
2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (2020), pp. 1572-1577
Closed Access | Times Cited: 9
Network Threat Detection Based on Group CNN for Privacy Protection
Yanping Xu, Xia Zhang, Chengdan Lu, et al.
Wireless Communications and Mobile Computing (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 9
Yanping Xu, Xia Zhang, Chengdan Lu, et al.
Wireless Communications and Mobile Computing (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 9
Research on Collaborative Optimization Model of Tourism Resources and Highway Network Based on IoT Network and Deep Learning
Zhiwen Xu, Xie Fang
Security and Communication Networks (2022) Vol. 2022, pp. 1-10
Open Access | Times Cited: 6
Zhiwen Xu, Xie Fang
Security and Communication Networks (2022) Vol. 2022, pp. 1-10
Open Access | Times Cited: 6
A Personalized Search Query Generating Method for Safety-Enhanced Vehicle-to-People Networks
Xiaodan Yan, Jiwei Zhang, Haroon Elahi, et al.
IEEE Transactions on Vehicular Technology (2021) Vol. 70, Iss. 6, pp. 5296-5307
Closed Access | Times Cited: 7
Xiaodan Yan, Jiwei Zhang, Haroon Elahi, et al.
IEEE Transactions on Vehicular Technology (2021) Vol. 70, Iss. 6, pp. 5296-5307
Closed Access | Times Cited: 7
Malicious Mail Filtering and Tracing System Based on KNN and Improved LSTM Algorithm
Xiao Da, Meiyi Jiang
2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech) (2020), pp. 222-229
Closed Access | Times Cited: 6
Xiao Da, Meiyi Jiang
2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech) (2020), pp. 222-229
Closed Access | Times Cited: 6
Hierarchical Quantum Information Splitting of an Arbitrary Two-Qubit State Based on a Decision Tree
Dongfen Li, Yundan Zheng, Xiaofang Liu, et al.
Mathematics (2022) Vol. 10, Iss. 23, pp. 4571-4571
Open Access | Times Cited: 4
Dongfen Li, Yundan Zheng, Xiaofang Liu, et al.
Mathematics (2022) Vol. 10, Iss. 23, pp. 4571-4571
Open Access | Times Cited: 4
Research and Application of Generative-Adversarial-Network Attacks Defense Method Based on Federated Learning
Xiaoyu Ma, Lize Gu
Electronics (2023) Vol. 12, Iss. 4, pp. 975-975
Open Access | Times Cited: 2
Xiaoyu Ma, Lize Gu
Electronics (2023) Vol. 12, Iss. 4, pp. 975-975
Open Access | Times Cited: 2
FIMPA: A Fixed Identity Mapping Prediction Algorithm in Edge Computing Environment
Shuo Zhang, Yaping Liu, Shudong Li, et al.
IEEE Access (2020) Vol. 8, pp. 17356-17365
Open Access | Times Cited: 5
Shuo Zhang, Yaping Liu, Shudong Li, et al.
IEEE Access (2020) Vol. 8, pp. 17356-17365
Open Access | Times Cited: 5
Differentially Private Machine Learning Model against Model Extraction Attack
Zelei Cheng, Zuotian Li, Jiwei Zhang, et al.
(2020), pp. 722-728
Closed Access | Times Cited: 5
Zelei Cheng, Zuotian Li, Jiwei Zhang, et al.
(2020), pp. 722-728
Closed Access | Times Cited: 5
Search & Catch: Detecting Promotion Infection in the Underground through Search Engines
Ronghai Yang, Jia Liu, Liang Gu, et al.
2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (2020), pp. 1566-1571
Closed Access | Times Cited: 5
Ronghai Yang, Jia Liu, Liang Gu, et al.
2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (2020), pp. 1566-1571
Closed Access | Times Cited: 5
Multiple Differential Distinguisher of SIMECK32/64 Based on Deep Learning
Huijiao Wang, Jiapeng Tian, Xin Zhang, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-12
Open Access | Times Cited: 3
Huijiao Wang, Jiapeng Tian, Xin Zhang, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-12
Open Access | Times Cited: 3
A Hybrid Framework for Secure Communication Integrating HMAC and GAN Algorithm
T. Dineshkumar, R. Asokan, S. Rubini, et al.
(2024), pp. 1-7
Closed Access
T. Dineshkumar, R. Asokan, S. Rubini, et al.
(2024), pp. 1-7
Closed Access
Multi-Optimiser Training for GANs Based on Evolutionary Computation
Y.X. Zhang, Yu Xue, Ferrante Neri
2022 IEEE Congress on Evolutionary Computation (CEC) (2024), pp. 1-8
Closed Access
Y.X. Zhang, Yu Xue, Ferrante Neri
2022 IEEE Congress on Evolutionary Computation (CEC) (2024), pp. 1-8
Closed Access
Federated Learning in Glaucoma: A Comprehensive Review and Future Perspectives
Shahin Hallaj, Benton Chuter, Alexander Lieu, et al.
Ophthalmology Glaucoma (2024)
Closed Access
Shahin Hallaj, Benton Chuter, Alexander Lieu, et al.
Ophthalmology Glaucoma (2024)
Closed Access
Power Allocation Strategy for Secret Key Generation Method in Wireless Communications
Bin Zhang, Muhammad Waqas, Shanshan Tu, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2021) Vol. 68, Iss. 2, pp. 2179-2188
Open Access | Times Cited: 4
Bin Zhang, Muhammad Waqas, Shanshan Tu, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2021) Vol. 68, Iss. 2, pp. 2179-2188
Open Access | Times Cited: 4
Reversible Data Hiding Based on Improved Block Selection Strategy and Pixel Value Ordering
Xin Tang, Linna Zhou, Guang Tang, et al.
2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech) (2021) Vol. 16, pp. 619-627
Closed Access | Times Cited: 4
Xin Tang, Linna Zhou, Guang Tang, et al.
2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech) (2021) Vol. 16, pp. 619-627
Closed Access | Times Cited: 4