OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Privacy-Enhanced Retrieval Technology for the Cloud-Assisted Internet of Things
Tian Wang, Quan Yang, Xuewei Shen, et al.
IEEE Transactions on Industrial Informatics (2021) Vol. 18, Iss. 7, pp. 4981-4989
Closed Access | Times Cited: 77

Showing 26-50 of 77 citing articles:

Two-Stage OD Flow Prediction for Emergency in Urban Rail Transit
Guangyu Zhu, Jiacun Ding, Yun Wei, et al.
IEEE Transactions on Intelligent Transportation Systems (2023) Vol. 25, Iss. 1, pp. 920-928
Closed Access | Times Cited: 10

Detecting unknown vulnerabilities in smart contracts using opcode sequences
Peiqiang Li, Guojun Wang, Xiaofei Xing, et al.
Connection Science (2024) Vol. 36, Iss. 1
Open Access | Times Cited: 3

Joint Optimization of AoI, SINR, Completeness, and Energy in UAV-Aided SDCNs: Coalition Formation Game and Cooperative Order
Yaoqi Yang, Xianglin Wei, Renhui Xu, et al.
IEEE Transactions on Green Communications and Networking (2021) Vol. 6, Iss. 1, pp. 265-280
Closed Access | Times Cited: 20

Traditional and Hybrid Access Control Models: A Detailed Survey
Muhammad Umar Aftab, Ali Hamza, Ariyo Oluwasanmi, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-12
Open Access | Times Cited: 15

The Construction and Development of a Clinical Prediction Model to Assess Lymph Node Metastases in Osteosarcoma
Wenle Li, Shengtao Dong, Bing Wang, et al.
Frontiers in Public Health (2022) Vol. 9
Open Access | Times Cited: 14

Connectivity Probability Analysis for Green Cooperative Cognitive Vehicular Networks
Xuan Li, Ruiwei Zhou, Tianqing Zhou, et al.
IEEE Transactions on Green Communications and Networking (2022) Vol. 6, Iss. 3, pp. 1553-1563
Closed Access | Times Cited: 14

SPTM-EC: A Security and Privacy-Preserving Task Management in Edge Computing for IIoT
A. S. M. Sanwar Hosen, Pradip Kumar Sharma, In-Ho Ra, et al.
IEEE Transactions on Industrial Informatics (2021) Vol. 18, Iss. 9, pp. 6330-6339
Closed Access | Times Cited: 19

Game-Based Channel Access for AoI-Oriented Data Transmission Under Dynamic Attack
Yaoqi Yang, Xianglin Wei, Renhui Xu, et al.
IEEE Internet of Things Journal (2021) Vol. 9, Iss. 11, pp. 8820-8837
Closed Access | Times Cited: 18

Enhancing Data Security in Multi-Cloud Environments: A Product Cipher-Based Distributed Steganography Approach
Syed Shakeel Hashmi, Arshad Ahmad Khan Mohammad, Arif Mohammad Abdul, et al.
International Journal of Safety and Security Engineering (2024) Vol. 14, Iss. 1, pp. 47-61
Open Access | Times Cited: 2

Zigbee-Based Low Power Consumption Wearables Device for Voice Data Transmission
Asma Alshuhail, Surbhi Bhatia, Ankit Kumar, et al.
Sustainability (2022) Vol. 14, Iss. 17, pp. 10847-10847
Open Access | Times Cited: 12

An efficient and access policy-hiding keyword search and data sharing scheme in cloud-assisted IoT
Hui Yin, Yangfan Li, Fangmin Li, et al.
Journal of Systems Architecture (2022) Vol. 128, pp. 102533-102533
Closed Access | Times Cited: 11

Zero-Trust-Based Protection Scheme for Users in Internet of Vehicles
Letian Fang, Chunshang Wu, Yukun Kang, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-17
Open Access | Times Cited: 9

SecVKQ: Secure and verifiable kNN queries in sensor–cloud systems
Qin Liu, Zhengzheng Hao, Yu Peng, et al.
Journal of Systems Architecture (2021) Vol. 120, pp. 102300-102300
Open Access | Times Cited: 12

Efficient and accurate identification of missing tags for large-scale dynamic RFID systems
Xinning Chen, Kehua Yang, Xuan Liu, et al.
Journal of Systems Architecture (2022) Vol. 124, pp. 102394-102394
Closed Access | Times Cited: 8

Searchable Encryption Scheme for Large Data Sets in Cloud Storage Environment
Ying Xiong, M. X. Luo
Radioengineering (2024) Vol. 33, Iss. 2, pp. 223-235
Open Access | Times Cited: 1

Research and Design of Encryption Standards Based on IoT Network Layer Information Security of Data
Jia Wang
ICST Transactions on Scalable Information Systems (2024) Vol. 11, Iss. 5
Open Access | Times Cited: 1

Research on the Privacy Protection Technology of Blockchain Spatiotemporal Big Data
Bao Zhou, Junsan Zhao, Ying Yin, et al.
IEEE Access (2024) Vol. 12, pp. 111187-111195
Open Access | Times Cited: 1

A fourfold-objective-based cloud privacy preservation model with proposed association rule hiding and deep learning assisted optimal key generation
Smita Sharma, Sanjay Tyagi
Network Computation in Neural Systems (2024), pp. 1-36
Closed Access | Times Cited: 1

Detecting unknown vulnerabilities in smart contracts with the CNN-BiLSTM model
Wanyi Gu, Guojun Wang, Peiqiang Li, et al.
International Journal of Information Security (2024) Vol. 24, Iss. 1
Closed Access | Times Cited: 1

CNN-Based Attack Defense for Device-Free Localization
Zhaoyang Han, Liang Lin, Ziyue Wang, et al.
Mobile Information Systems (2022) Vol. 2022, pp. 1-7
Open Access | Times Cited: 7

Multiagent Reinforcement Learning-Based Signal Planning for Resisting Congestion Attack in Green Transportation
Yike Li, Wenjia Niu, Yunzhe Tian, et al.
IEEE Transactions on Green Communications and Networking (2022) Vol. 6, Iss. 3, pp. 1448-1458
Open Access | Times Cited: 7

ES-PPDA: an efficient and secure privacy-protected data aggregation scheme in the IoT with an edge-based XaaS architecture
Quan Chen, Liangshun Wu, Congshi Jiang
Journal of Cloud Computing Advances Systems and Applications (2022) Vol. 11, Iss. 1
Open Access | Times Cited: 6

CUNA: A privacy preserving medical records storage in cloud environment using deep encryption
S. Gayathri, S Gowri
Measurement Sensors (2022) Vol. 24, pp. 100528-100528
Open Access | Times Cited: 6

Searchable Symmetric Encryption for Private Data Protection in Cloud Environments
Matheus M. Silveira, Danielle S. Silva, Sandra J. R. Rodriguez, et al.
(2022)
Closed Access | Times Cited: 6

Smart Home IoT Cybersecurity Survey: A Systematic Mapping
Leonardo Ayavaca-Vallejo, Diego Ávila-Pesantez
(2023), pp. 1-6
Closed Access | Times Cited: 3

Scroll to top