OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Comparative study of metaheuristic optimization algorithms for image steganography based on discrete Fourier transform domain
Anna Melman, Oleg Evsutin
Applied Soft Computing (2022) Vol. 132, pp. 109847-109847
Closed Access | Times Cited: 22

Showing 22 citing articles:

Electric eel foraging optimization: A new bio-inspired optimizer for engineering applications
Weiguo Zhao, Liying Wang, Zhenxing Zhang, et al.
Expert Systems with Applications (2023) Vol. 238, pp. 122200-122200
Closed Access | Times Cited: 118

Black-winged kite algorithm: a nature-inspired meta-heuristic for solving benchmark functions and engineering problems
Jun Wang, Wenchuan Wang, Xiao-xue Hu, et al.
Artificial Intelligence Review (2024) Vol. 57, Iss. 4
Open Access | Times Cited: 83

Frequency-domain image encryption based on IWT and 3D S-box
Heping Wen, Zhaoyang Feng, Chixin Bai, et al.
Physica Scripta (2024) Vol. 99, Iss. 5, pp. 055254-055254
Closed Access | Times Cited: 7

Dynamic RNA Coding Color Image Cipher Based on Chain Feedback Structure
Heping Wen, S. H. Kang, Zhuxi Wu, et al.
Mathematics (2023) Vol. 11, Iss. 14, pp. 3133-3133
Open Access | Times Cited: 20

Exploring the future application of UAVs: Face image privacy protection scheme based on chaos and DNA cryptography
Heping Wen, Zhiyu Xie, Zhuxi Wu, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 36, Iss. 1, pp. 101871-101871
Open Access | Times Cited: 15

Optimal Control and Optimization of Grid-Connected PV and Wind Turbine Hybrid Systems Using Electric Eel Foraging Optimization Algorithms
Saad A. Mohamed Abdelwahab, Ali M. El‐Rifaie, Hossam Youssef Hegazy, et al.
Sensors (2024) Vol. 24, Iss. 7, pp. 2354-2354
Open Access | Times Cited: 6

Boosted Nutcracker optimizer and Chaos Game Optimization with Cross Vision Transformer for medical image classification
Ahmed F. Mohamed, Amal I. Saba, Mohamed K. Hassan, et al.
Egyptian Informatics Journal (2024) Vol. 26, pp. 100457-100457
Open Access | Times Cited: 5

Metaheuristics for pruning convolutional neural networks: A comparative study
Vikas Palakonda, Jamshid Tursunboev, Jae‐Mo Kang, et al.
Expert Systems with Applications (2025), pp. 126326-126326
Closed Access

A secure image steganography based on LSB technique and 2D chaotic maps
Noura Khalil, Amany Sarhan, Mahmoud A. M. Alshewimy
Computers & Electrical Engineering (2024) Vol. 119, pp. 109566-109566
Closed Access | Times Cited: 3

Image watermarking based on a ratio of DCT coefficient sums using a gradient-based optimizer
Anna Melman, Oleg Evsutin
Computers & Electrical Engineering (2024) Vol. 117, pp. 109271-109271
Closed Access | Times Cited: 2

Secure information embedding in images with hybrid firefly algorithm
Sahil Nokhwal, Chandrasekharan Manoj, Ankit Chaudhary
Neural Computing and Applications (2024)
Closed Access | Times Cited: 2

A fusion-domain intelligent blind color image watermarking scheme using graph-based transform
Qingtang Su, Fangxu Hu, Xiaojie Tian, et al.
Optics & Laser Technology (2024) Vol. 177, pp. 111191-111191
Closed Access | Times Cited: 1

High-Fidelity Steganography: A Covert Parity Bit Model-Based Approach
Tamer Rabie, Mohammed Baziyad, Ibrahim Kamel
Algorithms (2024) Vol. 17, Iss. 8, pp. 328-328
Open Access | Times Cited: 1

Face privacy protection scheme by security-enhanced encryption structure and nonlinear dynamics
Zhiyu Xie, Yiting Lin, Tengyu Liu, et al.
iScience (2024) Vol. 27, Iss. 9, pp. 110768-110768
Open Access | Times Cited: 1

An image steganography algorithm via a compression and chaotic maps
M. Abdelhakm, Ahmed Salah, Sameh Askar, et al.
AIP Advances (2024) Vol. 14, Iss. 4
Open Access

The Role of Deep Learning Innovations With CNNs and GANs in Steganography
Harpreet Kaur, Chiranji Lal Chowdhary
Advances in information security, privacy, and ethics book series (2024), pp. 75-106
Closed Access

Optimizing energy hubs with a focus on ice energy storage: a strategic approach for managing cooling, thermal, and electrical loads via an advanced slime mold algorithm
Tao Hai, Hayder Oleiwi Shami, S Saleh, et al.
International Journal of Low-Carbon Technologies (2024) Vol. 19, pp. 2568-2579
Open Access

Large-capacity information hiding method based on a chunking matrix
Zhang Ju, Tao Zhang, Yanpeng Xiang, et al.
Journal of Intelligent & Fuzzy Systems (2023) Vol. 46, Iss. 1, pp. 2727-2741
Closed Access

A transform domain communication method based on combinatorial basis function
Beiming Li, Jiahao Xu
(2023), pp. 101-105
Closed Access

Page 1

Scroll to top