OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Smart contract token-based privacy-preserving access control system for industrial Internet of Things
Weizheng Wang, Huakun Huang, Zhimeng Yin, et al.
Digital Communications and Networks (2022) Vol. 9, Iss. 2, pp. 337-346
Open Access | Times Cited: 44

Showing 1-25 of 44 citing articles:

Virtual-Reality Interpromotion Technology for Metaverse: A Survey
Dapeng Wu, Zhigang Yang, Puning Zhang, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 18, pp. 15788-15809
Closed Access | Times Cited: 73

A Comprehensive Survey on Privacy-Preserving Techniques in Federated Recommendation Systems
Muhammad Asad, Saima Shaukat, Ehsan Javanmardi, et al.
Applied Sciences (2023) Vol. 13, Iss. 10, pp. 6201-6201
Open Access | Times Cited: 23

Effective combining source code and opcode for accurate vulnerability detection of smart contracts in edge AI systems
Huakun Huang, Longtao Guo, Lingjun Zhao, et al.
Applied Soft Computing (2024) Vol. 158, pp. 111556-111556
Closed Access | Times Cited: 5

On the adoption and deployment of secure and privacy-preserving IIoT in smart manufacturing: a comprehensive guide with recent advances
Sani M. Abdullahi, Sanja Lazarova‐Molnar
International Journal of Information Security (2025) Vol. 24, Iss. 1
Open Access

Dairy product quality evaluation using optimization-based deep maxout network with blockchain-driven internet of things
Maheshwari Biradar, Nandini Sidnal, Rajeshree Rokade, et al.
Peer-to-Peer Networking and Applications (2025) Vol. 18, Iss. 3
Closed Access

MedAccessX: A Blockchain-Enabled Dynamic Access Control Framework for IoMT Networks
Guoyi Shi, Minfeng Qi, Qi Zhong, et al.
Sensors (2025) Vol. 25, Iss. 6, pp. 1857-1857
Open Access

Digital transformation and visual knowledge map analysis of intelligent factory for sensor information of internet of things
Honglv Wang, Dingke Shi, Chengting Zhang, et al.
Intelligent Decision Technologies (2025)
Closed Access

Deep learning-based solution for smart contract vulnerabilities detection
Xueyan Tang, Yuying Du, Alan Lai, et al.
Scientific Reports (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 12

Access control in Internet of Things: A survey
Rahma Trabelsi, Ghofrane Fersi, Mohamed Jmaïel
Computers & Security (2023) Vol. 135, pp. 103472-103472
Closed Access | Times Cited: 11

Evolutionary Analysis of the Regulation of Data Abuse in Digital Platforms
Zhen Wang, Chunhui Yuan, Xiaolong Li
Systems (2023) Vol. 11, Iss. 4, pp. 188-188
Open Access | Times Cited: 10

UAV-Employed Intelligent Approach to Identify Injured Soldier on Blockchain-Integrated Internet of Battlefield Things
Md Masuduzzaman, Tariq Rahim, Anik Islam, et al.
IEEE Transactions on Network and Service Management (2024) Vol. 21, Iss. 5, pp. 5197-5214
Closed Access | Times Cited: 3

Smart Contract-Based Access Control Framework for Internet of Things Devices
Md. Rahat Hasan, Ammar Alazab, Siddhartha Barman Joy, et al.
Computers (2023) Vol. 12, Iss. 11, pp. 240-240
Open Access | Times Cited: 7

Modeling a Takagi-Sugeno (T-S) fuzzy for unmanned aircraft vehicle using fuzzy controller
Muhammad Shamrooz Aslam, Hazrat Bilal
Ain Shams Engineering Journal (2024) Vol. 15, Iss. 10, pp. 102984-102984
Open Access | Times Cited: 2

Fine-grained access control policy in blockchain-enabled edge computing
Guangxuan He, Chunlin Li, Yong Shu, et al.
Journal of Network and Computer Applications (2023) Vol. 221, pp. 103706-103706
Closed Access | Times Cited: 6

Digital rights management scheme based on redactable blockchain and perceptual hash
Xinyu Yi, Yuping Zhou, Yuqian Lin, et al.
Peer-to-Peer Networking and Applications (2023) Vol. 16, Iss. 5, pp. 2630-2648
Closed Access | Times Cited: 6

Internet of things for smart manufacturing based on advanced encryption standard (AES) algorithm with chaotic system
Huo Xiaoyan, Xuemei Wang
Results in Engineering (2023) Vol. 20, pp. 101589-101589
Open Access | Times Cited: 6

DAuth—Delegated Authorization Framework for Secured Serverless Cloud Computing
P. Padma, S. Srinivasan
Wireless Personal Communications (2023) Vol. 129, Iss. 3, pp. 1563-1583
Closed Access | Times Cited: 4

Blockchain Assisted Cloud Security and Privacy Preservation using Hybridized Encryption and Deep Learning Mechanism in IoT-Healthcare Application
K. Narasimha Raju, N. Ramshankar, J. Anvar Shathik, et al.
Journal of Grid Computing (2023) Vol. 21, Iss. 3
Closed Access | Times Cited: 4

Dynamic multiple access based on deep reinforcement learning for Internet of Things
Xin Liu, Zengqi Li
Computer Communications (2023) Vol. 210, pp. 331-341
Closed Access | Times Cited: 4

IoT cryptography with privacy-preserving ElGamal public key cryptosystem using oppositional artificial flora optimization algorithm
Devi Paramasivam, Sathyalakshmi Sivaji, Venkata Subramanian Dayanandan, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 1

Disjunctive Multi-Level Digital Forgetting Scheme
Marwan Adnan Darwish, Georgios Smaragdakis
Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing (2024), pp. 112-121
Open Access | Times Cited: 1

Research on smart contracts for Omnipresent AI in commercial health insurance
Tsung-Chih Hsiao, Tzer‐Long Chen, Shu-Chen Chang, et al.
Enterprise Information Systems (2024)
Closed Access | Times Cited: 1

Unknown Threats Detection Methods of Smart Contracts
Daojing He, Ke Ding, Sammy Chan, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 3, pp. 4430-4441
Closed Access | Times Cited: 3

PCIDS: Permission and Credibility-Based Intrusion Detection System in IoT Gateways
Chen Zhang, Zhuotao Lian, Huakun Huang, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 1, pp. 904-913
Closed Access | Times Cited: 2

SREM: Smart renewable energy management scheme with distributed learning and EV network
Huakun Huang, Sihui Xue, Lingjun Zhao, et al.
Engineering Reports (2023) Vol. 6, Iss. 5
Open Access | Times Cited: 2

Page 1 - Next Page

Scroll to top