
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Stimulating trust cooperation in edge services: An evolutionary tripartite game
Panjun Sun, Shigen Shen, Zongda Wu, et al.
Engineering Applications of Artificial Intelligence (2022) Vol. 116, pp. 105465-105465
Closed Access | Times Cited: 20
Panjun Sun, Shigen Shen, Zongda Wu, et al.
Engineering Applications of Artificial Intelligence (2022) Vol. 116, pp. 105465-105465
Closed Access | Times Cited: 20
Showing 20 citing articles:
Computation Offloading Method Using Stochastic Games for Software-Defined-Network-Based Multiagent Mobile Edge Computing
Guowen Wu, Hui Wang, Hong Zhang, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 20, pp. 17620-17634
Closed Access | Times Cited: 53
Guowen Wu, Hui Wang, Hong Zhang, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 20, pp. 17620-17634
Closed Access | Times Cited: 53
Optimal privacy preservation strategies with signaling Q-learning for edge-computing-based IoT resource grant systems
Shigen Shen, Xiaoping Wu, Panjun Sun, et al.
Expert Systems with Applications (2023) Vol. 225, pp. 120192-120192
Closed Access | Times Cited: 52
Shigen Shen, Xiaoping Wu, Panjun Sun, et al.
Expert Systems with Applications (2023) Vol. 225, pp. 120192-120192
Closed Access | Times Cited: 52
Joint Differential Game and Double Deep Q-Networks for Suppressing Malware Spread in Industrial Internet of Things
Shigen Shen, Lanlan Xie, Yanchun Zhang, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 18, pp. 5302-5315
Closed Access | Times Cited: 46
Shigen Shen, Lanlan Xie, Yanchun Zhang, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 18, pp. 5302-5315
Closed Access | Times Cited: 46
Privacy-preserving offloading scheme in multi-access mobile edge computing based on MADRL
Guowen Wu, Xihang Chen, Zhengjun Gao, et al.
Journal of Parallel and Distributed Computing (2023) Vol. 183, pp. 104775-104775
Closed Access | Times Cited: 41
Guowen Wu, Xihang Chen, Zhengjun Gao, et al.
Journal of Parallel and Distributed Computing (2023) Vol. 183, pp. 104775-104775
Closed Access | Times Cited: 41
A Survey of IoT Privacy Security: Architecture, Technology, Challenges, and Trends
Panjun Sun, Shigen Shen, Yi Wan, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 21, pp. 34567-34591
Closed Access | Times Cited: 24
Panjun Sun, Shigen Shen, Yi Wan, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 21, pp. 34567-34591
Closed Access | Times Cited: 24
Deep Q-network-based heuristic intrusion detection against edge-based SIoT zero-day attacks
Shigen Shen, Chenpeng Cai, Zhenwei Li, et al.
Applied Soft Computing (2023) Vol. 150, pp. 111080-111080
Closed Access | Times Cited: 23
Shigen Shen, Chenpeng Cai, Zhenwei Li, et al.
Applied Soft Computing (2023) Vol. 150, pp. 111080-111080
Closed Access | Times Cited: 23
SIHQR model with time delay for worm spread analysis in IIoT-enabled PLC network
Guowen Wu, Yanchun Zhang, Hong Zhang, et al.
Ad Hoc Networks (2024) Vol. 160, pp. 103504-103504
Closed Access | Times Cited: 7
Guowen Wu, Yanchun Zhang, Hong Zhang, et al.
Ad Hoc Networks (2024) Vol. 160, pp. 103504-103504
Closed Access | Times Cited: 7
A study on trust-rating mechanism for WSN node sensors using evolutionary game theory
Azadeh Navaei Tourani, Hamid Haj Seyyed Javadi, Hamidreza Navidi, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 2
Closed Access
Azadeh Navaei Tourani, Hamid Haj Seyyed Javadi, Hamidreza Navidi, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 2
Closed Access
Deep Q-Network-Based Open-Set Intrusion Detection Solution for Industrial Internet of Things
Shoujian Yu, R. Zhai, Yizhou Shen, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 7, pp. 12536-12550
Closed Access | Times Cited: 14
Shoujian Yu, R. Zhai, Yizhou Shen, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 7, pp. 12536-12550
Closed Access | Times Cited: 14
A Blockchain based Efficient Incentive Mechanism in Tripartite Cyber Threat Intelligence Service Marketplace
Yuan Zhou, Yaoyao Zhang, Qinglin Yang, et al.
Blockchain Research and Applications (2025), pp. 100263-100263
Open Access
Yuan Zhou, Yaoyao Zhang, Qinglin Yang, et al.
Blockchain Research and Applications (2025), pp. 100263-100263
Open Access
Mitigating collusive manipulation of reviews in e-commerce platforms: Evolutionary game and strategy simulation
Xiaoxia Xu, Ruguo Fan, Dongxue Wang, et al.
Information Processing & Management (2025) Vol. 62, Iss. 4, pp. 104080-104080
Closed Access
Xiaoxia Xu, Ruguo Fan, Dongxue Wang, et al.
Information Processing & Management (2025) Vol. 62, Iss. 4, pp. 104080-104080
Closed Access
Load-balancing Model using Game theory in Edge-based IoT Network
Zaineb Naaz, Gamini Joshi, Vidushi Sharma
Pervasive and Mobile Computing (2025), pp. 102041-102041
Closed Access
Zaineb Naaz, Gamini Joshi, Vidushi Sharma
Pervasive and Mobile Computing (2025), pp. 102041-102041
Closed Access
Game-theoretic analytics for privacy preservation in Internet of Things networks: A survey
Yizhou Shen, Carlton Shepherd, Chuadhry Mujeeb Ahmed, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 133, pp. 108449-108449
Closed Access | Times Cited: 3
Yizhou Shen, Carlton Shepherd, Chuadhry Mujeeb Ahmed, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 133, pp. 108449-108449
Closed Access | Times Cited: 3
Task Allocation With Minimum Requirements for Multiple Mobile Robot Systems: A Game-Theoretical Approach
Xin Huo, Hao Zhang, Chao Huang, et al.
IEEE Transactions on Network Science and Engineering (2023) Vol. 11, Iss. 1, pp. 1202-1213
Closed Access | Times Cited: 2
Xin Huo, Hao Zhang, Chao Huang, et al.
IEEE Transactions on Network Science and Engineering (2023) Vol. 11, Iss. 1, pp. 1202-1213
Closed Access | Times Cited: 2
A Spider Monkey Optimization Algorithm Combining Opposition-Based Learning and Orthogonal Experimental Design
Weizhi Liao, Xiaoyun Xia, Xiaojun Jia, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 76, Iss. 3, pp. 3297-3323
Open Access | Times Cited: 2
Weizhi Liao, Xiaoyun Xia, Xiaojun Jia, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 76, Iss. 3, pp. 3297-3323
Open Access | Times Cited: 2
Tripartite evolutionary game in the process of network attack and defense
Zigang Chen, Chaochao Fan, Tao Leng, et al.
Telecommunication Systems (2024) Vol. 86, Iss. 2, pp. 351-361
Open Access
Zigang Chen, Chaochao Fan, Tao Leng, et al.
Telecommunication Systems (2024) Vol. 86, Iss. 2, pp. 351-361
Open Access
Competition and cooperation in international high-speed railway industry chain based on evolutionary game
Yanliang Niu, Huiling Dong, Amin Mahmoudi, et al.
Transportation Planning and Technology (2024), pp. 1-28
Closed Access
Yanliang Niu, Huiling Dong, Amin Mahmoudi, et al.
Transportation Planning and Technology (2024), pp. 1-28
Closed Access
Tripartite Evolutionary Game in the Process of Network Attack and Defense
Zigang Chen, Chaochao Fan, Tao Leng, et al.
Research Square (Research Square) (2023)
Open Access
Zigang Chen, Chaochao Fan, Tao Leng, et al.
Research Square (Research Square) (2023)
Open Access
Evolution of cooperation in spatial public goods game based on heterogenous social preferences and dynamic punishment
Kang Du, Ruguo Fan, Hu Xue, et al.
Journal of Intelligent & Fuzzy Systems (2023) Vol. 45, Iss. 4, pp. 6453-6467
Closed Access
Kang Du, Ruguo Fan, Hu Xue, et al.
Journal of Intelligent & Fuzzy Systems (2023) Vol. 45, Iss. 4, pp. 6453-6467
Closed Access
Consortium Chain Consensus Vulnerability and Chain Generation Mechanism
Rui Qiao, Shi Dong
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 77, Iss. 2, pp. 2505-2527
Open Access
Rui Qiao, Shi Dong
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 77, Iss. 2, pp. 2505-2527
Open Access