
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Detection of impostor and tampered segments in audio by using an intelligent system
Zeshan Mubeen, Mehtab Afzal, Zulfiqar Ali, et al.
Computers & Electrical Engineering (2021) Vol. 91, pp. 107122-107122
Open Access | Times Cited: 7
Zeshan Mubeen, Mehtab Afzal, Zulfiqar Ali, et al.
Computers & Electrical Engineering (2021) Vol. 91, pp. 107122-107122
Open Access | Times Cited: 7
Showing 7 citing articles:
Data Integrity Time Optimization of a Blockchain IoT Smart Home Network Using Different Consensus and Hash Algorithms
Ammar Riadh Kairaldeen, Nor Fadzilah Abdullah, Asma Abu-Samah, et al.
Wireless Communications and Mobile Computing (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 17
Ammar Riadh Kairaldeen, Nor Fadzilah Abdullah, Asma Abu-Samah, et al.
Wireless Communications and Mobile Computing (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 17
PCA-Based Advanced Local Octa-Directional Pattern (ALODP-PCA): A Texture Feature Descriptor for Image Retrieval
Muhammad Qasim, Danish Mahmood, Asifa Bibi, et al.
Electronics (2022) Vol. 11, Iss. 2, pp. 202-202
Open Access | Times Cited: 7
Muhammad Qasim, Danish Mahmood, Asifa Bibi, et al.
Electronics (2022) Vol. 11, Iss. 2, pp. 202-202
Open Access | Times Cited: 7
Speech watermarking based tamper detection and recovery scheme with high tolerable tamper rate
Shengbei Wang, Weitao Yuan, Zhen Zhang, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 3, pp. 6711-6729
Closed Access | Times Cited: 2
Shengbei Wang, Weitao Yuan, Zhen Zhang, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 3, pp. 6711-6729
Closed Access | Times Cited: 2
Pyramid Feature Attention Network for Speech Resampling Detection
Xinyu Zhou, Yujin Zhang, Yongqi Wang, et al.
Applied Sciences (2024) Vol. 14, Iss. 11, pp. 4803-4803
Open Access
Xinyu Zhou, Yujin Zhang, Yongqi Wang, et al.
Applied Sciences (2024) Vol. 14, Iss. 11, pp. 4803-4803
Open Access
Identification of true speakers from disguised voices in anti-forensic scenarios using an efficient framework
Samia Rana, Muhammad Ali Qureshi, Asma Majeed, et al.
Signal Image and Video Processing (2024) Vol. 18, Iss. 10, pp. 7455-7471
Closed Access
Samia Rana, Muhammad Ali Qureshi, Asma Majeed, et al.
Signal Image and Video Processing (2024) Vol. 18, Iss. 10, pp. 7455-7471
Closed Access
MVL-Tra: Multi-view LFM signal source classification using Transformer
Jiale Chang, Yanhui Wang, Siya Mi, et al.
Computers & Electrical Engineering (2023) Vol. 111, pp. 108967-108967
Closed Access | Times Cited: 1
Jiale Chang, Yanhui Wang, Siya Mi, et al.
Computers & Electrical Engineering (2023) Vol. 111, pp. 108967-108967
Closed Access | Times Cited: 1
Guest Editorial: Introduction to the special section on Edge Intelligence in Industrial Applications (VSI-eiia)
Jiafu Wan, Fangyang Shen
Computers & Electrical Engineering (2021) Vol. 92, pp. 107150-107150
Closed Access
Jiafu Wan, Fangyang Shen
Computers & Electrical Engineering (2021) Vol. 92, pp. 107150-107150
Closed Access