
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Federated Learning with Blockchain Approach for Trust Management in IoV
Achref Haddaji, Samiha Ayed, Lamia Chaari Fourati
Lecture notes in networks and systems (2022), pp. 411-423
Closed Access | Times Cited: 16
Achref Haddaji, Samiha Ayed, Lamia Chaari Fourati
Lecture notes in networks and systems (2022), pp. 411-423
Closed Access | Times Cited: 16
Showing 16 citing articles:
The Role of Blockchain in Finance Beyond Cryptocurrency: Trust, Data Management, and Automation
Hanfang Chen, Niankun Wei, Leyao Wang, et al.
IEEE Access (2024) Vol. 12, pp. 64861-64885
Open Access | Times Cited: 6
Hanfang Chen, Niankun Wei, Leyao Wang, et al.
IEEE Access (2024) Vol. 12, pp. 64861-64885
Open Access | Times Cited: 6
The Internet of Vehicles and Sustainability—Reflections on Environmental, Social, and Corporate Governance
Mariusz Kostrzewski, Magdalena Marczewska, Lorna Uden
Energies (2023) Vol. 16, Iss. 7, pp. 3208-3208
Open Access | Times Cited: 15
Mariusz Kostrzewski, Magdalena Marczewska, Lorna Uden
Energies (2023) Vol. 16, Iss. 7, pp. 3208-3208
Open Access | Times Cited: 15
Trust Management in Vehicular Ad-hoc Networks: Extensive Survey
Houda Amari, Zakaria Abou El Houda, Lyes Khoukhi, et al.
IEEE Access (2023) Vol. 11, pp. 47659-47680
Open Access | Times Cited: 12
Houda Amari, Zakaria Abou El Houda, Lyes Khoukhi, et al.
IEEE Access (2023) Vol. 11, pp. 47659-47680
Open Access | Times Cited: 12
A Review on Blockchain Applications in Operational Technology for Food and Agriculture Critical Infrastructure
Chengliang Zheng, Xiangzhen Peng, Ziyue Wang, et al.
Foods (2025) Vol. 14, Iss. 2, pp. 251-251
Open Access
Chengliang Zheng, Xiangzhen Peng, Ziyue Wang, et al.
Foods (2025) Vol. 14, Iss. 2, pp. 251-251
Open Access
A New Scheme for Detecting Malicious Nodes in Vehicular Ad Hoc Networks Based on Monitoring Node Behavior
Muhsen Alkhalidy, Atalla Fahed Al-Serhan, Ayoub Alsarhan, et al.
Future Internet (2022) Vol. 14, Iss. 8, pp. 223-223
Open Access | Times Cited: 19
Muhsen Alkhalidy, Atalla Fahed Al-Serhan, Ayoub Alsarhan, et al.
Future Internet (2022) Vol. 14, Iss. 8, pp. 223-223
Open Access | Times Cited: 19
Trustworthy Federated Learning: A Comprehensive Review, Architecture, Key Challenges, and Future Research Prospects
Asadullah Tariq, Mohamed Adel Serhani, Farag Sallabi, et al.
IEEE Open Journal of the Communications Society (2024) Vol. 5, pp. 4920-4998
Open Access | Times Cited: 3
Asadullah Tariq, Mohamed Adel Serhani, Farag Sallabi, et al.
IEEE Open Journal of the Communications Society (2024) Vol. 5, pp. 4920-4998
Open Access | Times Cited: 3
Vulnerabilities and attacks assessments in blockchain 1.0, 2.0 and 3.0: tools, analysis and countermeasures
Ahlem Hamdi, Lamia Chaari Fourati, Samiha Ayed
International Journal of Information Security (2023) Vol. 23, Iss. 2, pp. 713-757
Closed Access | Times Cited: 8
Ahlem Hamdi, Lamia Chaari Fourati, Samiha Ayed
International Journal of Information Security (2023) Vol. 23, Iss. 2, pp. 713-757
Closed Access | Times Cited: 8
A Systematic Review on Federated Learning in Edge-Cloud Continuum
Sambit Kumar Mishra, Subham Sahoo, Chinmaya Kumar Swain
SN Computer Science (2024) Vol. 5, Iss. 7
Closed Access | Times Cited: 2
Sambit Kumar Mishra, Subham Sahoo, Chinmaya Kumar Swain
SN Computer Science (2024) Vol. 5, Iss. 7
Closed Access | Times Cited: 2
Dynamic Intrusion Detection Framework for UAVCAN Protocol Using AI
Fadhila Tlili, Samiha Ayed, Lamia Chaari Fourati
Proceedings of the 17th International Conference on Availability, Reliability and Security (2023), pp. 1-10
Closed Access | Times Cited: 5
Fadhila Tlili, Samiha Ayed, Lamia Chaari Fourati
Proceedings of the 17th International Conference on Availability, Reliability and Security (2023), pp. 1-10
Closed Access | Times Cited: 5
IoV security and privacy survey: issues, countermeasures, and challenges
Achref Haddaji, Samiha Ayed, Lamia Chaari Fourati
The Journal of Supercomputing (2024) Vol. 80, Iss. 15, pp. 23018-23082
Closed Access | Times Cited: 1
Achref Haddaji, Samiha Ayed, Lamia Chaari Fourati
The Journal of Supercomputing (2024) Vol. 80, Iss. 15, pp. 23018-23082
Closed Access | Times Cited: 1
D-BlockAuth: An Authentication Scheme-Based Dual Blockchain for 5G-Assisted Vehicular Fog Computing
Hussam Dheaa Kamel Al-Janabi, Saima Anwar Lashari, Ayman Khalil, et al.
IEEE Access (2024) Vol. 12, pp. 99321-99332
Open Access | Times Cited: 1
Hussam Dheaa Kamel Al-Janabi, Saima Anwar Lashari, Ayman Khalil, et al.
IEEE Access (2024) Vol. 12, pp. 99321-99332
Open Access | Times Cited: 1
A New Hybrid Adaptive Deep Learning-Based Framework for UAVs Faults and Attacks Detection
Fadhila Tlili, Samiha Ayed, Lamia Chaari Fourati
IEEE Transactions on Services Computing (2023) Vol. 16, Iss. 6, pp. 4128-4139
Closed Access | Times Cited: 4
Fadhila Tlili, Samiha Ayed, Lamia Chaari Fourati
IEEE Transactions on Services Computing (2023) Vol. 16, Iss. 6, pp. 4128-4139
Closed Access | Times Cited: 4
IoT Security Review: A Case Study of IIoT, IoV, and Smart Home
Jinnan Ma, Xuekui Shangguan, Ying Zhang
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-10
Open Access | Times Cited: 7
Jinnan Ma, Xuekui Shangguan, Ying Zhang
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-10
Open Access | Times Cited: 7
Cooperative Perception and Decision-Making in Internet of Vehicles: A Comprehensive Review of Federated Learning and Blockchain Technology
Wenjie Long, Lejun Zhang
Communications in computer and information science (2024), pp. 431-437
Closed Access
Wenjie Long, Lejun Zhang
Communications in computer and information science (2024), pp. 431-437
Closed Access
A Trustworthy and Cooperative MAC Protocol for Cognitive Vehicular Networks
Jahnvi Tiwari, Dheeraj Dubey, Arun Prakash, et al.
2021 IEEE 8th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON) (2022)
Closed Access | Times Cited: 1
Jahnvi Tiwari, Dheeraj Dubey, Arun Prakash, et al.
2021 IEEE 8th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON) (2022)
Closed Access | Times Cited: 1
Blockchain-based voter registry management system
Swapna Donepudi, Thammi Reddy
International Journal of Advanced Technology and Engineering Exploration (2023) Vol. 10, Iss. 101
Open Access
Swapna Donepudi, Thammi Reddy
International Journal of Advanced Technology and Engineering Exploration (2023) Vol. 10, Iss. 101
Open Access