OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Self-Organizing Key Security Management Algorithm in Socially Aware Networking
Xuemin Zhang, Deng Haitao, Zenggang Xiong, et al.
Journal of Signal Processing Systems (2024) Vol. 96, Iss. 6-7, pp. 369-383
Closed Access | Times Cited: 26

Showing 1-25 of 26 citing articles:

A novel S-box generator using Frobenius automorphism and its applications in image encryption
Rashad Ali, Javed Ali, Ping Ping, et al.
Nonlinear Dynamics (2024) Vol. 112, Iss. 21, pp. 19463-19486
Closed Access | Times Cited: 6

An efficient network clustering approach using graph-boosting and nonnegative matrix factorization
Ji Tang, Xiaoru Xu, Teng Wang, et al.
Artificial Intelligence Review (2024) Vol. 57, Iss. 11
Open Access | Times Cited: 5

An efficient detection of Sinkhole attacks using machine learning: Impact on energy and security
Muhammad Zulkifl Hasan, Zurina Mohd Hanapi, Zuriati Ahmad Zukarnain, et al.
PLoS ONE (2025) Vol. 20, Iss. 3, pp. e0309532-e0309532
Open Access

Energy‐Efficient Routing Algorithm for Optimizing Network Performance in Underwater Data Transmission Using Gray Wolf Optimization Algorithm
Gulista Khan, Prashant Mishra, Ambuj Kumar Agarwal, et al.
Journal of Sensors (2024) Vol. 2024, Iss. 1
Open Access | Times Cited: 4

Distance based topological characterization, graph energy prediction, and NMR patterns of benzene ring embedded in P-type surface in 2D network
Xiujun Zhang, S. Prabhu, M. Arulperumjothi, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 4

Towards intrusion detection in fog environments using generative adversarial network and long short-term memory network
Aiyan Qu, Qiuhui Shen, Gholamreza Ahmadi
Computers & Security (2024) Vol. 145, pp. 104004-104004
Closed Access | Times Cited: 3

Enhancing Software Fault Prediction Through Feature Selection With Spider Wasp Optimization Algorithm
Himansu Das, Swarnava Das, Mahendra Kumar Gourisaria, et al.
IEEE Access (2024) Vol. 12, pp. 105309-105325
Open Access | Times Cited: 3

Vehicle recognition pipeline via DeepSort on aerial image datasets
Muhammad Hanzla, Muhammad Ovais Yusuf, Naif Al Mudawi, et al.
Frontiers in Neurorobotics (2024) Vol. 18
Open Access | Times Cited: 2

On physical analysis of topological indices for iron disulfide network via curve fitting model
Rongbing Huang, Muhammad Farhan Hanif, Muhammad Kamran Siddiqui, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 2

DemocracyGuard: Blockchain‐based secure voting framework for digital democracy
Mritunjay Shall Peelam, Gaurav Kumar, Kunjan Shah, et al.
Expert Systems (2024)
Open Access | Times Cited: 1

Enhancing real-time intrusion detection and secure key distribution using multi-model machine learning approach for mitigating confidentiality threats
Lu Ju, Arindam Bhar, Arindam Sarkar, et al.
Internet of Things (2024), pp. 101377-101377
Closed Access | Times Cited: 1

A hybrid approach for adversarial attack detection based on sentiment analysis model using Machine learning
Rashid Amin, Rahma Gantassi, Naeem Ahmed, et al.
Engineering Science and Technology an International Journal (2024) Vol. 58, pp. 101829-101829
Open Access | Times Cited: 1

A hybrid evolutionary algorithm to improve task scheduling and load balancing in fog computing
Dongxian Yu, Weiyong Zheng
Cluster Computing (2024) Vol. 28, Iss. 1
Closed Access | Times Cited: 1

Deniable ring signature scheme based on the ISRSAC digital signature algorithm
Yanshuo Zhang, Yuqi Yuan, Ning Liu, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e2190-e2190
Open Access

An efficient algorithm for resource optimization in TWDM passive optical network using a C-RAN
Jun Jiat Tiang, Hee Chan Chung, Jae‐Young Choi, et al.
Frontiers in Physics (2024) Vol. 12
Open Access

Link prediction in multilayer social networks using reliable local random walk and boosting ensemble classifier
Wenbo Cai, Xingzhi Chang, Ping Yang
Chaos Solitons & Fractals (2024) Vol. 188, pp. 115530-115530
Closed Access

A novel development to encrypt data communication under t-intuitionistic fuzzy environment
Hanan Alolaiyan, Laila Latif, Umer Shuaib, et al.
PLoS ONE (2024) Vol. 19, Iss. 9, pp. e0308140-e0308140
Open Access

Exploring topological indices and entropy measure via rational curve fitting models for calcium hydroxide network
Rongbing Huang, Muhammad Farhan Hanif, Muhammad Kamran Siddiqui, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access

Leveraging LSTM and GRU-based deep neural coordination in intelligent transportation to strengthen security in the Internet of Vehicles
Cai Yanmin, Arindam Sarkar, Jasni Mohamad Zain, et al.
International Journal of Machine Learning and Cybernetics (2024)
Closed Access

Internet of things and distributed security framework for 5G networks
Rui Lu, Lei Shi, Kai Sun, et al.
Cluster Computing (2024) Vol. 28, Iss. 2
Closed Access

Smartphone detector examination for transportation mode identification utilizing imbalanced maximizing-area under the curve proximal support vector machine
Zhenhua Dai, Tangsen Huang
Signal Image and Video Processing (2024) Vol. 18, Iss. 11, pp. 8361-8377
Closed Access

Wormhole attack detection and mitigation model for Internet of Things and WSN using machine learning
Asma Hassan Alshehri
PeerJ Computer Science (2024) Vol. 10, pp. e2257-e2257
Open Access

Artificial recurrent neural network coordinated secured transmission towards safeguarding confidentiality in smart Industrial Internet of Things
Arindam Sarkar, Moirangthem Marjit Singh, Hanjabam Saratchandra Sharma
International Journal of Machine Learning and Cybernetics (2024)
Closed Access

Secured mutual wireless communication using real and imaginary-valued artificial neuronal synchronization and attack detection
Chengzhi Jiang, Arindam Sarkar, Abdulfattah Noorwali, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 137, pp. 109203-109203
Closed Access

Page 1 - Next Page

Scroll to top