OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

DNACDS: Cloud IoE big data security and accessing scheme based on DNA cryptography
Ashish Singh, Abhinav Kumar, Suyel Namasudra
Frontiers of Computer Science (2023) Vol. 18, Iss. 1
Closed Access | Times Cited: 27

Showing 1-25 of 27 citing articles:

Securing the future of IoT-healthcare systems: A meta-synthesis of mandatory security requirements
Mahmoud Zahedian Nezhad, Ali Javan Jafari Bojnordi, Mohammad Mehraeen, et al.
International Journal of Medical Informatics (2024) Vol. 185, pp. 105379-105379
Closed Access | Times Cited: 11

An Enhanced Encryption Scheme for IoT‐Based Wireless Sensor Network Using DNA Enclosed Fully Homomorphic Approach
Alka P. Sawlikar, Devashri Raich, B. Ganguly, et al.
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 3
Closed Access

Dynamic Analysis and Circuit Design of a New 3D Highly Chaotic System and its Application to Pseudo Random Number Generator (PRNG) and Image Encryption
Aceng Sambas, Khaled Benkouider, Sezgin Kaçar, et al.
SN Computer Science (2024) Vol. 5, Iss. 4
Closed Access | Times Cited: 3

Introduction to Internet of Things
Tajkia Nuri Ananna, Munshi Saifuzzaman
Studies in computational intelligence (2024), pp. 1-49
Closed Access | Times Cited: 2

Coding, Decoding and Retrieving a Message Using DNA: An Experience from a Brazilian Center Research on DNA Data Storage
Caio Perez Gomes, André G. C. Martins, Sabrina E. Nunes, et al.
Micromachines (2024) Vol. 15, Iss. 4, pp. 474-474
Open Access | Times Cited: 1

Elevating Image Steganography: A Fusion of MSB Matching and LSB Substitution for Enhanced Concealment Capabilities
Muhammad Zaman Ali, Omer Riaz, Hafiz Muhammad Hasnain, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 2, pp. 2923-2943
Open Access | Times Cited: 1

A side match oriented data hiding based on absolute moment block truncation encoding mechanism with reversibility
Jui‐Chuan Liu, Yijie Lin, Ching‐Chun Chang, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 1

Semi-Supervised Machine Learning Approaches for Thyroid Disease Prediction and its Integration With the Internet of Everything
Melih Ağraz
International Journal of Interactive Multimedia and Artificial Intelligence (2024) Vol. 8, Iss. 7, pp. 38-38
Open Access | Times Cited: 1

Data Privacy Protection in Cloud Computing Using Visual Cryptography
N Musrat Sultana, K. Srinivas
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 1

Internet of Things and Machine Learning for Smart Healthcare
Cristiano André da Costa, Felipe André Zeiser, Rodrigo da Rosa Righi, et al.
Studies in computational intelligence (2024), pp. 95-133
Closed Access | Times Cited: 1

Machine Learning and IoT in Health 4.0
Dina Darwish
Studies in computational intelligence (2024), pp. 235-276
Closed Access | Times Cited: 1

A Lightweight, Searchable, and Controllable EMR Sharing Scheme
Xiaohui Yang, Peiyin Zhao
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 1, pp. 1521-1538
Open Access

METHODOLOGY FOR COLLECTING PROCESSING STORING AND CLASSIFYING DATA IN ACCORDANCE WITH SOC2 TYPE2 REQUIREMENTS
O. Deineka, L. Bortnik
Komp'ûternì sistemi ta merežì (2024) Vol. 6, Iss. 1, pp. 36-43
Closed Access

Verifiable Changeable Threshold Secret Image Sharing Scheme Based on LWE Problem
Massoud Hadian Dehkordi, Samaneh Mashhadi, Seyed Taghi Farahi, et al.
Wireless Personal Communications (2024) Vol. 137, Iss. 2, pp. 1099-1118
Closed Access

A robust multi-key authority system for privacy-preserving distribution and access control of healthcare data
Amitesh Singh Rajput, Avinash Kumar Agarwal, Kiran Raja
Computer Communications (2024) Vol. 225, pp. 195-204
Closed Access

Enhanced mayfly with active elite approach clustering based deep Q learner routing with EBRLWE for IoT-based healthcare monitoring system
D. Balakrishnan, T. Dhiliphan Rajkumar
Multimedia Tools and Applications (2024) Vol. 83, Iss. 39, pp. 87129-87152
Closed Access

Application of Big Data Analysis and Cloud Computing Technology
Dajun Guo
International Journal of Grid and High Performance Computing (2024) Vol. 16, Iss. 1, pp. 1-19
Open Access

Optimized Data Management with Color Multiplexing in QR Codes
Sara Ignacio-Cerrato, David Pacios, José Miguel Ezquerro Rodríguez, et al.
Physica Scripta (2024) Vol. 99, Iss. 10, pp. 105036-105036
Open Access

An Efficient Ontology‐Based Semantic Interoperability Using MSGO‐RNN in Cloud Computing
R. Chithambaramani, K. Jayashree, Brahmadesam Viswanathan Krishna, et al.
Journal of Optimization (2024) Vol. 2024, Iss. 1
Open Access

Analysing e-Healthcare Data from Internet of Things Devices and Cloud Computing
V Vivek, Bharadwaj Veeravalli
Studies in computational intelligence (2024), pp. 301-323
Closed Access

Machine Learning for Smart Healthcare Management Using IoT
Yagmur Yigit, Kübra Duran, Naghmeh Moradpoor, et al.
Studies in computational intelligence (2024), pp. 135-166
Closed Access

E-Healthcare Data Management Using Machine Learning and IoT
Anoop Titus, Alosh Denny, Sonish Sivarajkumar, et al.
Studies in computational intelligence (2024), pp. 167-199
Closed Access

Machine Learning and IoT in Precision Healthcare
Sujni Paul, C. Beulah Christalin Latha
Studies in computational intelligence (2024), pp. 201-234
Closed Access

ЗАХИЩЕНЕ ЗБЕРІГАННЯ ДАНИХ ІЗ ВИКОРИСТАННЯМ ТЕХНОЛОГІЇ БЛОКЧЕЙН ETHEREUM
Олег Гарасимчук, Юрій Наконечний, Тарас Луковський, et al.
Ukrainian Information Security Research Journal (2024) Vol. 26, Iss. 1, pp. 239-251
Open Access

An Improved Multi-Chaotic Public Key Algorithm Based on Chebyshev Polynomials
Chunfu Zhang, Jing Bai, Yanchun Liang, et al.
Algorithms (2024) Vol. 17, Iss. 9, pp. 389-389
Open Access

Page 1 - Next Page

Scroll to top