OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Novel Color Image Encryption Algorithm Based on Cross-plane Scrambling and Diffusion
Xuejun Li, Bo Sun, Xiuguo Bi, et al.
Mobile Networks and Applications (2023)
Closed Access | Times Cited: 6

Showing 6 citing articles:

Cross-channel color image encryption through 2D hyperchaotic hybrid map of optimization test functions
Feyza Toktas, Uğur Erkan, Zekí Yetgín
Expert Systems with Applications (2024) Vol. 249, pp. 123583-123583
Closed Access | Times Cited: 52

A new 2D cross hyperchaotic Sine-modulation-Logistic map and its application in bit-level image encryption
Mingxu Wang, Lin Teng, Wenjie Zhou, et al.
Expert Systems with Applications (2024), pp. 125328-125328
Closed Access | Times Cited: 7

S-box using fractional-order 4D hyperchaotic system and its application to RSA cryptosystem-based color image encryption
Saeed Ullah, Xinge Liu, Adil Waheed, et al.
Computer Standards & Interfaces (2025), pp. 103980-103980
Closed Access

Provably secure color image encryption algorithm based on FO 4D-HCS and ACM
Saeed Ullah, Xinge Liu, Adil Waheed, et al.
Soft Computing (2024)
Closed Access | Times Cited: 1

A Novel Color Image Encryption Algorithm Based on Hybrid Two-Dimensional Hyperchaos and Genetic Recombination
Yaoqun Xu, Jiaoyang Liu, Z. Y. You, et al.
Mathematics (2024) Vol. 12, Iss. 22, pp. 3457-3457
Open Access

Color image encryption algorithm based on hybrid chaos and layered strategies
Yibo Huang, Q Zhang, YongBiao Zhao
Journal of Information Security and Applications (2024) Vol. 89, pp. 103921-103921
Closed Access

Page 1

Scroll to top