OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Differential privacy scheme using Laplace mechanism and statistical method computation in deep neural network for privacy preservation
G. Sathish Kumar, K. Premalatha, G. Uma Maheshwari, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 128, pp. 107399-107399
Closed Access | Times Cited: 29

Showing 1-25 of 29 citing articles:

A Survey on Cybersecurity in IoT
Ηλίας Δρίτσας, Μαρία Τρίγκα
Future Internet (2025) Vol. 17, Iss. 1, pp. 30-30
Open Access | Times Cited: 2

Botnets Unveiled: A Comprehensive Survey on Evolving Threats and Defense Strategies
Mehdi Asadi, Mohammad Ali Jabraeil Jamali, Arash Heidari, et al.
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 11
Open Access | Times Cited: 9

Optimized auxiliary physics neural network based multi-target detection for edge-cloud in smart internet of things
B. Prabha, Mallikarjun Yaramadhi, Abhishek Sharma, et al.
Peer-to-Peer Networking and Applications (2025) Vol. 18, Iss. 2
Closed Access

SRADHO: statistical reduction approach with deep hyper optimization for disease classification using artificial intelligence
G. Sathish Kumar, E. Suganya, S. Sountharrajan, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access

FedL_DBNFSpinalNet based malware detection in IoT devices
R. Bhavani, Veeramalai Sankaradass
International Journal of Machine Learning and Cybernetics (2025)
Closed Access

HIDS-RPL: A Hybrid Deep Learning-Based Intrusion Detection System for RPL in Internet of Medical Thing Networks
Abdelwahed Berguiga, Ahlem Harchay, Ayman Massaoudi
IEEE Access (2025) Vol. 13, pp. 38404-38429
Open Access

Federated Learning and Reputation-Based Node Selection Scheme for Internet of Vehicles
Zhaoyu Su, Ruimin Cheng, Chunhai Li, et al.
Electronics (2025) Vol. 14, Iss. 2, pp. 303-303
Open Access

Cyberbullying detection and classification on social media images using Convolution Neural Networks and CB-YOLO model
Subbaraju Pericherla, E. Ilavarasan
Evolving Systems (2025) Vol. 16, Iss. 2
Closed Access

PrivMiner: a similar-first approach to frequent itemset mining under local differential privacy
Yanhui Li, Chen Huang, M. A. Cheng, et al.
World Wide Web (2025) Vol. 28, Iss. 2
Closed Access

Exploring the landscape of network security: a comparative analysis of attack detection strategies
P. Rajesh Kanna, P. Santhi
Journal of Ambient Intelligence and Humanized Computing (2024) Vol. 15, Iss. 8, pp. 3211-3228
Closed Access | Times Cited: 3

Anomaly-based threat detection in smart health using machine learning
Meher Tabassum, Saba Mahmood, Amal Bukhari, et al.
BMC Medical Informatics and Decision Making (2024) Vol. 24, Iss. 1
Open Access | Times Cited: 2

A synergistic framework for histopathologic cancer detection using Epicurve Search –PSB model with surrosec Optimizer
P. Nancy, V Rajeshram, G. Sathish Kumar, et al.
Biomedical Signal Processing and Control (2024) Vol. 96, pp. 106498-106498
Closed Access | Times Cited: 1

FQPDR: federated quantum neural network for privacy-preserving early detection of diabetic retinopathy
Debashis De, Mahua Nandy Pal, Dipankar Hazra
Evolutionary Intelligence (2024)
Closed Access | Times Cited: 1

Efficient federated learning for pediatric pneumonia on chest X-ray classification
Zegang Pan, Haijiang Wang, Jian Wan, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 1

A blockchain-based hybrid encryption technique with anti-quantum signature for securing electronic health records
Shtwai Alsubai, Abdullah Alqahtani, Harish Garg, et al.
Complex & Intelligent Systems (2024) Vol. 10, Iss. 5, pp. 6117-6141
Open Access

Data Privacy Preservation Using Differential Privacy and Re-Identification Attacks
G. Sathish Kumar, K Preethie, S Madhumitha, et al.
(2024), pp. 1-6
Closed Access

A Zero-Knowledge-Proof-Based Anonymous and Revocable Scheme for Cross-Domain Authentication
Xinjian Zhao, Fei Xia, Hanning Xia, et al.
Electronics (2024) Vol. 13, Iss. 14, pp. 2730-2730
Open Access

A Dynamic Intrusion Detection System through Attention Self Supervised Convolutional Neural Networks
NAZREEN BANU A, S Sangeetha
Research Square (Research Square) (2024)
Closed Access

Optimizing parameter settings for hopfield neural networks using reinforcement learning
Safae Rbihou, Nour‐Eddine Joudar, Khalid Haddouch
Evolving Systems (2024)
Closed Access

Advancing Intrusion Detection Precision Through Analysis of Diverse Classification Algorithms
J Suriya Prakash, Snehitha Narasani, N. Thangadurai, et al.
(2024), pp. 1-6
Closed Access

AMOUE: Adaptive modified optimized unary encoding method for local differential privacy data preservation
Tianchong Gao, Hailong Fu, Shunwei Wang, et al.
Computers & Electrical Engineering (2024) Vol. 120, pp. 109791-109791
Closed Access

A Privacy-Preserving Data Mining Through Comprehensive GNIPP Approach in Sensitive Data Sets
Shailesh Kumar Vyas, Swapnili Karmore
International Journal of experimental research and review (2024) Vol. 44, pp. 11-19
Open Access

Page 1 - Next Page

Scroll to top