
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Blockchained service provisioning and malicious node detection via federated learning in scalable Internet of Sensor Things networks
Zain Abubaker, Nadeem Javaid, Ahmad Almogren, et al.
Computer Networks (2022) Vol. 204, pp. 108691-108691
Closed Access | Times Cited: 32
Zain Abubaker, Nadeem Javaid, Ahmad Almogren, et al.
Computer Networks (2022) Vol. 204, pp. 108691-108691
Closed Access | Times Cited: 32
Showing 1-25 of 32 citing articles:
Blockchain-Based Secure Localization against Malicious Nodes in IoT-Based Wireless Sensor Networks Using Federated Learning
Gebrekiros Gebreyesus Gebremariam, Jeebananda Panda, S. Indu
Wireless Communications and Mobile Computing (2023) Vol. 2023, pp. 1-27
Open Access | Times Cited: 36
Gebrekiros Gebreyesus Gebremariam, Jeebananda Panda, S. Indu
Wireless Communications and Mobile Computing (2023) Vol. 2023, pp. 1-27
Open Access | Times Cited: 36
Malicious Node Detection Using Machine Learning and Distributed Data Storage Using Blockchain in WSNs
Muhammad Nouman, U. Qasim, Hina Nasir, et al.
IEEE Access (2023) Vol. 11, pp. 6106-6121
Open Access | Times Cited: 35
Muhammad Nouman, U. Qasim, Hina Nasir, et al.
IEEE Access (2023) Vol. 11, pp. 6106-6121
Open Access | Times Cited: 35
Chained-Drones: Blockchain-based privacy-preserving framework for secure and intelligent service provisioning in Internet of Drone Things
Junaid Akram, Muhammad Umair, Rutvij H. Jhaveri, et al.
Computers & Electrical Engineering (2023) Vol. 110, pp. 108772-108772
Closed Access | Times Cited: 22
Junaid Akram, Muhammad Umair, Rutvij H. Jhaveri, et al.
Computers & Electrical Engineering (2023) Vol. 110, pp. 108772-108772
Closed Access | Times Cited: 22
A Blockchain-Based Deep-Learning-Driven Architecture for Quality Routing in Wireless Sensor Networks
Zahoor Ali Khan, Sana Amjad, Farwa Ahmed, et al.
IEEE Access (2023) Vol. 11, pp. 31036-31051
Open Access | Times Cited: 16
Zahoor Ali Khan, Sana Amjad, Farwa Ahmed, et al.
IEEE Access (2023) Vol. 11, pp. 31036-31051
Open Access | Times Cited: 16
Automation in sensor network metrology: An overview of methods and their implementations
Anupam Prasad Vedurmudi, Kruno Miličević, Gertjan Kok, et al.
Measurement Sensors (2025), pp. 101799-101799
Open Access
Anupam Prasad Vedurmudi, Kruno Miličević, Gertjan Kok, et al.
Measurement Sensors (2025), pp. 101799-101799
Open Access
Based on model randomization and adaptive defense for federated learning schemes
Gaofeng Yue, Xiaowei Han
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Gaofeng Yue, Xiaowei Han
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
FedDefense: A Defense Mechanism for Dishonest Client Attacks in Federated Learning
Gaofeng Yue, Xiaowei Han
Neural Processing Letters (2025) Vol. 57, Iss. 2
Open Access
Gaofeng Yue, Xiaowei Han
Neural Processing Letters (2025) Vol. 57, Iss. 2
Open Access
A Novel Time‐to‐Response Based Attack Mitigation Technique for Internet of Things‐Integrated Wireless Sensor Networks
M. Jagadeeswari, Babji Prasad Chapa, Arun Sekar Rajasekaran
International Journal of Communication Systems (2025) Vol. 38, Iss. 7
Closed Access
M. Jagadeeswari, Babji Prasad Chapa, Arun Sekar Rajasekaran
International Journal of Communication Systems (2025) Vol. 38, Iss. 7
Closed Access
Integrating hybrid bald eagle crow search algorithm and deep learning for enhanced malicious node detection in secure distributed systems
Feras Mohammed Al-Matarneh
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Feras Mohammed Al-Matarneh
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Intelligent Reflecting Surface Backscatter Enabled Multi-Tier Computing for 6G Internet of Things
Sai Xu, Jiajia Liu, Nei Kato, et al.
IEEE Journal on Selected Areas in Communications (2022) Vol. 41, Iss. 2, pp. 320-333
Closed Access | Times Cited: 16
Sai Xu, Jiajia Liu, Nei Kato, et al.
IEEE Journal on Selected Areas in Communications (2022) Vol. 41, Iss. 2, pp. 320-333
Closed Access | Times Cited: 16
Federated Learning-Based Resource Management with Blockchain Trust Assurance in Smart IoT
Xiuhua Fu, Rongqun Peng, Wenhao Yuan, et al.
Electronics (2023) Vol. 12, Iss. 4, pp. 1034-1034
Open Access | Times Cited: 10
Xiuhua Fu, Rongqun Peng, Wenhao Yuan, et al.
Electronics (2023) Vol. 12, Iss. 4, pp. 1034-1034
Open Access | Times Cited: 10
Federated Learning: Navigating the Landscape of Collaborative Intelligence
Konstantinos Lazaros, Dimitrios E. Koumadorakis, Aristidis G. Vrahatis, et al.
Electronics (2024) Vol. 13, Iss. 23, pp. 4744-4744
Open Access | Times Cited: 3
Konstantinos Lazaros, Dimitrios E. Koumadorakis, Aristidis G. Vrahatis, et al.
Electronics (2024) Vol. 13, Iss. 23, pp. 4744-4744
Open Access | Times Cited: 3
A new federated learning-based wireless communication and client scheduling solution for combating COVID-19
Shuhong Chen, Zhiyong Jie, Guojun Wang, et al.
Computer Communications (2023) Vol. 206, pp. 101-109
Open Access | Times Cited: 7
Shuhong Chen, Zhiyong Jie, Guojun Wang, et al.
Computer Communications (2023) Vol. 206, pp. 101-109
Open Access | Times Cited: 7
Dual-Stage Machine Learning Approach for Advanced Malicious Node Detection in WSNs
Osama A. Khashan
Ad Hoc Networks (2024), pp. 103672-103672
Closed Access | Times Cited: 2
Osama A. Khashan
Ad Hoc Networks (2024), pp. 103672-103672
Closed Access | Times Cited: 2
Blockchain Based Privacy Preserving Authentication and Malicious Node Detection in Internet of Underwater Things (IoUT) Networks
Shahid Abbas, Hina Nasir, Ahmad Almogren, et al.
IEEE Access (2022) Vol. 10, pp. 113945-113955
Open Access | Times Cited: 9
Shahid Abbas, Hina Nasir, Ahmad Almogren, et al.
IEEE Access (2022) Vol. 10, pp. 113945-113955
Open Access | Times Cited: 9
Optimizing federated learning approaches with hybrid Convolutional Neural Networks ‐ Bidirectional Encoder Representations from Transformers for precise estimation of average localization errors in wireless sensor networks
L. Raja, S. Dhanasekaran, Rangarajan Vinod Kumar, et al.
International Journal of Communication Systems (2024) Vol. 37, Iss. 13
Closed Access | Times Cited: 1
L. Raja, S. Dhanasekaran, Rangarajan Vinod Kumar, et al.
International Journal of Communication Systems (2024) Vol. 37, Iss. 13
Closed Access | Times Cited: 1
Directed dynamic attribute graph anomaly detection based on evolved graph attention for blockchain
Chenlei Liu, Yuhua Xu, Zhixin Sun
Knowledge and Information Systems (2023) Vol. 66, Iss. 2, pp. 989-1010
Open Access | Times Cited: 3
Chenlei Liu, Yuhua Xu, Zhixin Sun
Knowledge and Information Systems (2023) Vol. 66, Iss. 2, pp. 989-1010
Open Access | Times Cited: 3
BTIMFL: A Blockchain-Based Trust Incentive Mechanism in Federated Learning
Minjung Park, Sangmi Chai
Lecture notes in computer science (2023), pp. 175-185
Closed Access | Times Cited: 2
Minjung Park, Sangmi Chai
Lecture notes in computer science (2023), pp. 175-185
Closed Access | Times Cited: 2
Research Progress of Acoustic Energy Harvesters Based on Nanogenerators
Yue Huang, Taili Du, Cheng Xiang, et al.
International Journal of Energy Research (2023) Vol. 2023, pp. 1-40
Open Access | Times Cited: 2
Yue Huang, Taili Du, Cheng Xiang, et al.
International Journal of Energy Research (2023) Vol. 2023, pp. 1-40
Open Access | Times Cited: 2
Revolutionizing Emergency Response: The Transformative Power of Smart Wearables Through Blockchain, Federated Learning, and Beyond 5G/6G Services
Priyanka Ganesan, Senthil Kumar Jagatheesaperumal
IT Professional (2023) Vol. 25, Iss. 6, pp. 54-61
Closed Access | Times Cited: 2
Priyanka Ganesan, Senthil Kumar Jagatheesaperumal
IT Professional (2023) Vol. 25, Iss. 6, pp. 54-61
Closed Access | Times Cited: 2
Kalman Filter-Based Differential Privacy Federated Learning Method
Xiaohui Yang, Zijian Dong
Applied Sciences (2022) Vol. 12, Iss. 15, pp. 7787-7787
Open Access | Times Cited: 4
Xiaohui Yang, Zijian Dong
Applied Sciences (2022) Vol. 12, Iss. 15, pp. 7787-7787
Open Access | Times Cited: 4
Enhancing Location Privacy through P2P Network and Caching in Anonymizer
Peiqian Liu, Shangchen Xie, Zihao Shen, et al.
KSII Transactions on Internet and Information Systems (2022) Vol. 16, Iss. 5
Open Access | Times Cited: 3
Peiqian Liu, Shangchen Xie, Zihao Shen, et al.
KSII Transactions on Internet and Information Systems (2022) Vol. 16, Iss. 5
Open Access | Times Cited: 3
A Preference-Driven Malicious Platform Detection Mechanism for Users in Mobile Crowdsensing
Haotian Wang, Jun Tao, Dingwen Chi, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 2720-2731
Closed Access
Haotian Wang, Jun Tao, Dingwen Chi, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 2720-2731
Closed Access
Malicious Node Detection Using Machine Learning and Distributed Data Storage Using Blockchain in WSNs
Akash Pawar, Omkar Ladkat, Prashant Shendage, et al.
International Journal for Research in Applied Science and Engineering Technology (2024) Vol. 12, Iss. 5, pp. 4419-4424
Open Access
Akash Pawar, Omkar Ladkat, Prashant Shendage, et al.
International Journal for Research in Applied Science and Engineering Technology (2024) Vol. 12, Iss. 5, pp. 4419-4424
Open Access
A consortium blockchain-edge enabled authentication scheme for underwater acoustic network (UAN)
Neeraj Kumar, Rifaqat Ali
Internet of Things (2024) Vol. 28, pp. 101426-101426
Closed Access
Neeraj Kumar, Rifaqat Ali
Internet of Things (2024) Vol. 28, pp. 101426-101426
Closed Access