
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Differential privacy scheme using Laplace mechanism and statistical method computation in deep neural network for privacy preservation
G. Sathish Kumar, K. Premalatha, G. Uma Maheshwari, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 128, pp. 107399-107399
Closed Access | Times Cited: 29
G. Sathish Kumar, K. Premalatha, G. Uma Maheshwari, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 128, pp. 107399-107399
Closed Access | Times Cited: 29
Showing 1-25 of 29 citing articles:
A Survey on Cybersecurity in IoT
Ηλίας Δρίτσας, Μαρία Τρίγκα
Future Internet (2025) Vol. 17, Iss. 1, pp. 30-30
Open Access | Times Cited: 2
Ηλίας Δρίτσας, Μαρία Τρίγκα
Future Internet (2025) Vol. 17, Iss. 1, pp. 30-30
Open Access | Times Cited: 2
Botnets Unveiled: A Comprehensive Survey on Evolving Threats and Defense Strategies
Mehdi Asadi, Mohammad Ali Jabraeil Jamali, Arash Heidari, et al.
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 11
Open Access | Times Cited: 9
Mehdi Asadi, Mohammad Ali Jabraeil Jamali, Arash Heidari, et al.
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 11
Open Access | Times Cited: 9
Optimized auxiliary physics neural network based multi-target detection for edge-cloud in smart internet of things
B. Prabha, Mallikarjun Yaramadhi, Abhishek Sharma, et al.
Peer-to-Peer Networking and Applications (2025) Vol. 18, Iss. 2
Closed Access
B. Prabha, Mallikarjun Yaramadhi, Abhishek Sharma, et al.
Peer-to-Peer Networking and Applications (2025) Vol. 18, Iss. 2
Closed Access
SRADHO: statistical reduction approach with deep hyper optimization for disease classification using artificial intelligence
G. Sathish Kumar, E. Suganya, S. Sountharrajan, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
G. Sathish Kumar, E. Suganya, S. Sountharrajan, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
FedL_DBNFSpinalNet based malware detection in IoT devices
R. Bhavani, Veeramalai Sankaradass
International Journal of Machine Learning and Cybernetics (2025)
Closed Access
R. Bhavani, Veeramalai Sankaradass
International Journal of Machine Learning and Cybernetics (2025)
Closed Access
Advancing object detection performance: random replacement one–one optimized convolutional LeNet algorithm with novel strategies for improved efficiency
Rakan A. Alsowail, Taher Al‐Shehari
Evolving Systems (2025) Vol. 16, Iss. 2
Closed Access
Rakan A. Alsowail, Taher Al‐Shehari
Evolving Systems (2025) Vol. 16, Iss. 2
Closed Access
HIDS-RPL: A Hybrid Deep Learning-Based Intrusion Detection System for RPL in Internet of Medical Thing Networks
Abdelwahed Berguiga, Ahlem Harchay, Ayman Massaoudi
IEEE Access (2025) Vol. 13, pp. 38404-38429
Open Access
Abdelwahed Berguiga, Ahlem Harchay, Ayman Massaoudi
IEEE Access (2025) Vol. 13, pp. 38404-38429
Open Access
Federated Learning and Reputation-Based Node Selection Scheme for Internet of Vehicles
Zhaoyu Su, Ruimin Cheng, Chunhai Li, et al.
Electronics (2025) Vol. 14, Iss. 2, pp. 303-303
Open Access
Zhaoyu Su, Ruimin Cheng, Chunhai Li, et al.
Electronics (2025) Vol. 14, Iss. 2, pp. 303-303
Open Access
Cyberbullying detection and classification on social media images using Convolution Neural Networks and CB-YOLO model
Subbaraju Pericherla, E. Ilavarasan
Evolving Systems (2025) Vol. 16, Iss. 2
Closed Access
Subbaraju Pericherla, E. Ilavarasan
Evolving Systems (2025) Vol. 16, Iss. 2
Closed Access
PrivMiner: a similar-first approach to frequent itemset mining under local differential privacy
Yanhui Li, Chen Huang, M. A. Cheng, et al.
World Wide Web (2025) Vol. 28, Iss. 2
Closed Access
Yanhui Li, Chen Huang, M. A. Cheng, et al.
World Wide Web (2025) Vol. 28, Iss. 2
Closed Access
Exploring the landscape of network security: a comparative analysis of attack detection strategies
P. Rajesh Kanna, P. Santhi
Journal of Ambient Intelligence and Humanized Computing (2024) Vol. 15, Iss. 8, pp. 3211-3228
Closed Access | Times Cited: 3
P. Rajesh Kanna, P. Santhi
Journal of Ambient Intelligence and Humanized Computing (2024) Vol. 15, Iss. 8, pp. 3211-3228
Closed Access | Times Cited: 3
Anomaly-based threat detection in smart health using machine learning
Meher Tabassum, Saba Mahmood, Amal Bukhari, et al.
BMC Medical Informatics and Decision Making (2024) Vol. 24, Iss. 1
Open Access | Times Cited: 2
Meher Tabassum, Saba Mahmood, Amal Bukhari, et al.
BMC Medical Informatics and Decision Making (2024) Vol. 24, Iss. 1
Open Access | Times Cited: 2
A synergistic framework for histopathologic cancer detection using Epicurve Search –PSB model with surrosec Optimizer
P. Nancy, V Rajeshram, G. Sathish Kumar, et al.
Biomedical Signal Processing and Control (2024) Vol. 96, pp. 106498-106498
Closed Access | Times Cited: 1
P. Nancy, V Rajeshram, G. Sathish Kumar, et al.
Biomedical Signal Processing and Control (2024) Vol. 96, pp. 106498-106498
Closed Access | Times Cited: 1
FQPDR: federated quantum neural network for privacy-preserving early detection of diabetic retinopathy
Debashis De, Mahua Nandy Pal, Dipankar Hazra
Evolutionary Intelligence (2024)
Closed Access | Times Cited: 1
Debashis De, Mahua Nandy Pal, Dipankar Hazra
Evolutionary Intelligence (2024)
Closed Access | Times Cited: 1
Efficient federated learning for pediatric pneumonia on chest X-ray classification
Zegang Pan, Haijiang Wang, Jian Wan, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 1
Zegang Pan, Haijiang Wang, Jian Wan, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 1
Enhancing Parkinson’s Disease Prediction Using Deep Learning-Based Convolutional Neural Networks
Ravi Ramya
Deleted Journal (2024) Vol. 20, Iss. 5s, pp. 1866-1874
Open Access
Ravi Ramya
Deleted Journal (2024) Vol. 20, Iss. 5s, pp. 1866-1874
Open Access
A blockchain-based hybrid encryption technique with anti-quantum signature for securing electronic health records
Shtwai Alsubai, Abdullah Alqahtani, Harish Garg, et al.
Complex & Intelligent Systems (2024) Vol. 10, Iss. 5, pp. 6117-6141
Open Access
Shtwai Alsubai, Abdullah Alqahtani, Harish Garg, et al.
Complex & Intelligent Systems (2024) Vol. 10, Iss. 5, pp. 6117-6141
Open Access
Data Privacy Preservation Using Differential Privacy and Re-Identification Attacks
G. Sathish Kumar, K Preethie, S Madhumitha, et al.
(2024), pp. 1-6
Closed Access
G. Sathish Kumar, K Preethie, S Madhumitha, et al.
(2024), pp. 1-6
Closed Access
A Zero-Knowledge-Proof-Based Anonymous and Revocable Scheme for Cross-Domain Authentication
Xinjian Zhao, Fei Xia, Hanning Xia, et al.
Electronics (2024) Vol. 13, Iss. 14, pp. 2730-2730
Open Access
Xinjian Zhao, Fei Xia, Hanning Xia, et al.
Electronics (2024) Vol. 13, Iss. 14, pp. 2730-2730
Open Access
A Dynamic Intrusion Detection System through Attention Self Supervised Convolutional Neural Networks
NAZREEN BANU A, S Sangeetha
Research Square (Research Square) (2024)
Closed Access
NAZREEN BANU A, S Sangeetha
Research Square (Research Square) (2024)
Closed Access
Optimizing parameter settings for hopfield neural networks using reinforcement learning
Safae Rbihou, Nour‐Eddine Joudar, Khalid Haddouch
Evolving Systems (2024)
Closed Access
Safae Rbihou, Nour‐Eddine Joudar, Khalid Haddouch
Evolving Systems (2024)
Closed Access
Advancing Intrusion Detection Precision Through Analysis of Diverse Classification Algorithms
J Suriya Prakash, Snehitha Narasani, N. Thangadurai, et al.
(2024), pp. 1-6
Closed Access
J Suriya Prakash, Snehitha Narasani, N. Thangadurai, et al.
(2024), pp. 1-6
Closed Access
AMOUE: Adaptive modified optimized unary encoding method for local differential privacy data preservation
Tianchong Gao, Hailong Fu, Shunwei Wang, et al.
Computers & Electrical Engineering (2024) Vol. 120, pp. 109791-109791
Closed Access
Tianchong Gao, Hailong Fu, Shunwei Wang, et al.
Computers & Electrical Engineering (2024) Vol. 120, pp. 109791-109791
Closed Access
A Privacy-Preserving Data Mining Through Comprehensive GNIPP Approach in Sensitive Data Sets
Shailesh Kumar Vyas, Swapnili Karmore
International Journal of experimental research and review (2024) Vol. 44, pp. 11-19
Open Access
Shailesh Kumar Vyas, Swapnili Karmore
International Journal of experimental research and review (2024) Vol. 44, pp. 11-19
Open Access
The Random Neural Network – based Approach and Evolutionary Intelligence are integral components ofIOT – RNNEI, an intrusion detection system for IOT Networks
Parisa Rahmani, Mohamad Arefi, Seyyed Mohammad Saber SEYYED Shojae, et al.
Research Square (Research Square) (2024)
Open Access
Parisa Rahmani, Mohamad Arefi, Seyyed Mohammad Saber SEYYED Shojae, et al.
Research Square (Research Square) (2024)
Open Access