OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A blockchain-based decentralized machine learning framework for collaborative intrusion detection within UAVs
Ammar Ahmed Khan, Muhammad Mubashir Khan, Kashif Mehboob Khan, et al.
Computer Networks (2021) Vol. 196, pp. 108217-108217
Open Access | Times Cited: 66

Showing 1-25 of 66 citing articles:

Machine Learning Applications in Internet-of-Drones: Systematic Review, Recent Deployments, and Open Issues
Arash Heidari, Nima Jafari Navimipour, Mehmet Ünal, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 12, pp. 1-45
Closed Access | Times Cited: 115

Towards resilience in Industry 5.0: A decentralized autonomous manufacturing paradigm
Jiewu Leng, Yuanwei Zhong, Zisheng Lin, et al.
Journal of Manufacturing Systems (2023) Vol. 71, pp. 95-114
Closed Access | Times Cited: 96

Autonomous Vehicles Security: Challenges and Solutions Using Blockchain and Artificial Intelligence
Gueltoum Bendiab, Amina Hameurlaine, Georgios Germanos, et al.
IEEE Transactions on Intelligent Transportation Systems (2023) Vol. 24, Iss. 4, pp. 3614-3637
Closed Access | Times Cited: 74

A comprehensive survey on security, privacy issues and emerging defence technologies for UAVs
Hassan Jalil Hadi, Yue Cao, Khaleeq Un Nisa, et al.
Journal of Network and Computer Applications (2023) Vol. 213, pp. 103607-103607
Closed Access | Times Cited: 74

Blockchain for secure and decentralized artificial intelligence in cybersecurity: A comprehensive review
Ahmed M. Shamsan Saleh
Blockchain Research and Applications (2024) Vol. 5, Iss. 3, pp. 100193-100193
Open Access | Times Cited: 21

A hybrid blockchain method in internet of things for privacy and security in unmanned aerial vehicles network
Emad H. Abualsauod
Computers & Electrical Engineering (2022) Vol. 99, pp. 107847-107847
Closed Access | Times Cited: 40

Machine-Learning-Based UAV-Assisted Agricultural Information Security Architecture and Intrusion Detection
Rui Fu, Xiaojun Ren, Ye Li, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 21, pp. 18589-18598
Closed Access | Times Cited: 39

Hybrid Truck-Drone Delivery Systems: A Systematic Literature Review
Batool Madani, Malick Ndiaye
IEEE Access (2022) Vol. 10, pp. 92854-92878
Open Access | Times Cited: 38

A Review of Indoor Positioning Systems for UAV Localization with Machine Learning Algorithms
Chamali Sandamini, M. W. P. Maduranga, Valmik Tilwari, et al.
Electronics (2023) Vol. 12, Iss. 7, pp. 1533-1533
Open Access | Times Cited: 29

A Survey of Cyber-Physical Systems From a Game-Theoretic Perspective
Wayes Tushar, Chau Yuen, Tapan Kumar Saha, et al.
IEEE Access (2023) Vol. 11, pp. 9799-9834
Open Access | Times Cited: 26

Sea turtle foraging algorithm with hybrid deep learning-based intrusion detection for the internet of drones environment
José Escorcia‐Gutierrez, Margarita Gamarra, Esmeide Leal, et al.
Computers & Electrical Engineering (2023) Vol. 108, pp. 108704-108704
Open Access | Times Cited: 22

A secure and efficient UAV network defense strategy: Convergence of blockchain and deep learning
Zhihao Li, Qi Chen, Jin Li, et al.
Computer Standards & Interfaces (2024) Vol. 90, pp. 103844-103844
Closed Access | Times Cited: 7

A Survey of Cyberattack Countermeasures for Unmanned Aerial Vehicles
Peng‐Yong Kong
IEEE Access (2021) Vol. 9, pp. 148244-148263
Open Access | Times Cited: 43

Federated Learning with Blockchain Assisted Image Classification for Clustered UAV Networks
Ibrahim Abunadi, Maha M. Althobaiti, Fahd N. Al‐Wesabi, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 72, Iss. 1, pp. 1195-1212
Open Access | Times Cited: 33

Vehicle to Everything (V2X) and Edge Computing: A Secure Lifecycle for UAV-Assisted Vehicle Network and Offloading with Blockchain
Abdullah Ayub Khan, Asif Ali Laghari, Muhammad Shafiq, et al.
Drones (2022) Vol. 6, Iss. 12, pp. 377-377
Open Access | Times Cited: 30

Blockchain and Deep Learning Empowered Secure Data Sharing Framework for Softwarized UAVs
Prabhat Kumar, Randhir Kumar, Abhinav Kumar, et al.
2022 IEEE International Conference on Communications Workshops (ICC Workshops) (2022)
Closed Access | Times Cited: 27

UAV-Assisted IoT Applications, Cybersecurity Threats, AI-Enabled Solutions, Open Challenges With Future Research Directions
Muhammad Adil, Houbing Song, Spyridon Mastorakis, et al.
IEEE Transactions on Intelligent Vehicles (2023) Vol. 9, Iss. 4, pp. 4583-4605
Closed Access | Times Cited: 21

A Review of Blockchain Technology in Knowledge-Defined Networking, Its Application, Benefits, and Challenges
Patikiri Arachchige Don Shehan Nilmantha Wijesekara, Subodha Gunawardena
Network (2023) Vol. 3, Iss. 3, pp. 343-421
Open Access | Times Cited: 18

Lightweight Secure Communication Supporting Batch Authentication for UAV Swarm
Pengbin Han, Aina Sui, Jiang Wu
Drones (2025) Vol. 9, Iss. 2, pp. 139-139
Open Access

Designing energy-aware collaborative intrusion detection in IoT networks
Wenjuan Li, Philip S. Rosenberg, Mads Glisby, et al.
Journal of Information Security and Applications (2024) Vol. 81, pp. 103713-103713
Closed Access | Times Cited: 4

DeepSpoofNet: a framework for securing UAVs against GPS spoofing attacks
Aziz Ur Rehman Badar, Danish Mahmood, Adeel Iqbal, et al.
PeerJ Computer Science (2025) Vol. 11, pp. e2714-e2714
Open Access

Intrusion detection in internet of things using differential privacy: A hybrid machine learning approach
Ankit Manderna, Upasana Dohare, Sushil Kumar, et al.
Ad Hoc Networks (2025), pp. 103818-103818
Closed Access

Block chain fostered cycle‐consistent generative adversarial network framework espoused intrusion detection for protecting IoT network
G. Sugitha, A. Solairaj, J. Suresh
Transactions on Emerging Telecommunications Technologies (2022) Vol. 33, Iss. 11
Closed Access | Times Cited: 20

Unmanned Aerial Vehicle Intrusion Detection: Deep-Meta-Heuristic System
Shangting Miao, Quan Pan, Dongxiao Zheng, et al.
Vehicular Communications (2024), pp. 100726-100726
Closed Access | Times Cited: 3

Page 1 - Next Page

Scroll to top