
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
EmIr-Auth: Eye Movement and Iris-Based Portable Remote Authentication for Smart Grid
Zhuo Ma, Yilong Yang, Ximeng Liu, et al.
IEEE Transactions on Industrial Informatics (2019) Vol. 16, Iss. 10, pp. 6597-6606
Closed Access | Times Cited: 36
Zhuo Ma, Yilong Yang, Ximeng Liu, et al.
IEEE Transactions on Industrial Informatics (2019) Vol. 16, Iss. 10, pp. 6597-6606
Closed Access | Times Cited: 36
Showing 26-50 of 36 citing articles:
A Secure Authentication System based on Emotion Analysis of EEG Signals using Deep Learning Technique
R. Mathumitha, A. Maryposonia
2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS) (2022), pp. 1232-1237
Closed Access | Times Cited: 3
R. Mathumitha, A. Maryposonia
2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS) (2022), pp. 1232-1237
Closed Access | Times Cited: 3
Cross-Modal Deep Neural Networks based Smartphone Authentication for Intelligent Things System
Tran Anh Khoa, Dinh Nguyen The Truong, Duc Ngoc Minh Dang
(2021), pp. 48-51
Closed Access | Times Cited: 4
Tran Anh Khoa, Dinh Nguyen The Truong, Duc Ngoc Minh Dang
(2021), pp. 48-51
Closed Access | Times Cited: 4
Effect of Signal Conditioning and Evoked-Potential Based Representation on Stability and Distinctiveness of EEG Brain Signatures
Muhammed Esad Oztemel, Ömer Soysal
(2024), pp. 1-7
Closed Access
Muhammed Esad Oztemel, Ömer Soysal
(2024), pp. 1-7
Closed Access
DEyeAuth: A Secure Smartphone User Authentication System Integrating Eyelid Patterns With Eye Gestures
Ling Kuang, Fanzi Zeng, Hongbo Jiang, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 18, pp. 30069-30083
Closed Access
Ling Kuang, Fanzi Zeng, Hongbo Jiang, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 18, pp. 30069-30083
Closed Access
Cryptographic Algorithm Designed by Extracting Brainwave Patterns
Marius-Alin Dragu, Irina-Emilia Nicolae, Mădălin-Corneliu Frunzete
Mathematics (2024) Vol. 12, Iss. 13, pp. 1971-1971
Open Access
Marius-Alin Dragu, Irina-Emilia Nicolae, Mădălin-Corneliu Frunzete
Mathematics (2024) Vol. 12, Iss. 13, pp. 1971-1971
Open Access
Radar-Based Noninvasive Person Authentication Using Micro-Doppler Signatures and Generative Adversarial Network
Yue Lang, Chenyang Wu, Yang Yang, et al.
IEEE Transactions on Instrumentation and Measurement (2023) Vol. 72, pp. 1-12
Closed Access | Times Cited: 1
Yue Lang, Chenyang Wu, Yang Yang, et al.
IEEE Transactions on Instrumentation and Measurement (2023) Vol. 72, pp. 1-12
Closed Access | Times Cited: 1
A novel multi-stage distributed authentication scheme for smart meter communication
M.V. Hegde, Adnan Anwar, A. K. Karunakar, et al.
PeerJ Computer Science (2021) Vol. 7, pp. e643-e643
Open Access | Times Cited: 3
M.V. Hegde, Adnan Anwar, A. K. Karunakar, et al.
PeerJ Computer Science (2021) Vol. 7, pp. e643-e643
Open Access | Times Cited: 3
An effective authentication scheme for a secured IRIS recognition system based on a novel encoding technique
D. Harikrishnan, N. Sunilkumar, Joseph Shelby, et al.
Measurement Sensors (2022) Vol. 25, pp. 100626-100626
Open Access | Times Cited: 2
D. Harikrishnan, N. Sunilkumar, Joseph Shelby, et al.
Measurement Sensors (2022) Vol. 25, pp. 100626-100626
Open Access | Times Cited: 2
Fuzzy vault‐based three‐factor authentication and key exchange for 5G‐integrated wireless sensor networks
Junshuai Sun, Qi Jiang, Jianfeng Ma, et al.
Transactions on Emerging Telecommunications Technologies (2020) Vol. 32, Iss. 5
Closed Access | Times Cited: 1
Junshuai Sun, Qi Jiang, Jianfeng Ma, et al.
Transactions on Emerging Telecommunications Technologies (2020) Vol. 32, Iss. 5
Closed Access | Times Cited: 1
Mutual Authentication in Body Area Networks (BANs) Using Multi-Biometric and Physiological Signal-Based Key Agreement
Nur Adibah Saffa Aziz
Journal of IT in Asia (2021) Vol. 9, Iss. 1, pp. 108-120
Open Access | Times Cited: 1
Nur Adibah Saffa Aziz
Journal of IT in Asia (2021) Vol. 9, Iss. 1, pp. 108-120
Open Access | Times Cited: 1
Mutual Authentication Protocol in a Distributed Heterogeneous Environment: A Blockchain-Based Approach
Ningyu An, Xiao Liang, Xuan Wang, et al.
Communications in computer and information science (2023), pp. 161-171
Closed Access
Ningyu An, Xiao Liang, Xuan Wang, et al.
Communications in computer and information science (2023), pp. 161-171
Closed Access