
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
GPDS: A multi-agent deep reinforcement learning game for anti-jamming secure computing in MEC network
Miaojiang Chen, Wei Liu, Ning Zhang, et al.
Expert Systems with Applications (2022) Vol. 210, pp. 118394-118394
Closed Access | Times Cited: 34
Miaojiang Chen, Wei Liu, Ning Zhang, et al.
Expert Systems with Applications (2022) Vol. 210, pp. 118394-118394
Closed Access | Times Cited: 34
Showing 1-25 of 34 citing articles:
A comprehensive study of DDoS attacks over IoT network and their countermeasures
Pooja Kumari, Ankit Kumar Jain
Computers & Security (2023) Vol. 127, pp. 103096-103096
Closed Access | Times Cited: 117
Pooja Kumari, Ankit Kumar Jain
Computers & Security (2023) Vol. 127, pp. 103096-103096
Closed Access | Times Cited: 117
Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review
Tariq Emad Ali, Yung-Wey Chong, Selvakumar Manickam
Applied Sciences (2023) Vol. 13, Iss. 5, pp. 3183-3183
Open Access | Times Cited: 85
Tariq Emad Ali, Yung-Wey Chong, Selvakumar Manickam
Applied Sciences (2023) Vol. 13, Iss. 5, pp. 3183-3183
Open Access | Times Cited: 85
Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems
Hang Thanh Bui, Hamed Aboutorab, Arash Mahboubi, et al.
Computers & Security (2024) Vol. 140, pp. 103754-103754
Open Access | Times Cited: 19
Hang Thanh Bui, Hamed Aboutorab, Arash Mahboubi, et al.
Computers & Security (2024) Vol. 140, pp. 103754-103754
Open Access | Times Cited: 19
SGPL: An Intelligent Game-Based Secure Collaborative Communication Scheme for Metaverse Over 5G and Beyond Networks
Miaojiang Chen, Anfeng Liu, Naixue Xiong, et al.
IEEE Journal on Selected Areas in Communications (2023) Vol. 42, Iss. 3, pp. 767-782
Open Access | Times Cited: 24
Miaojiang Chen, Anfeng Liu, Naixue Xiong, et al.
IEEE Journal on Selected Areas in Communications (2023) Vol. 42, Iss. 3, pp. 767-782
Open Access | Times Cited: 24
Optimizing task offloading and resource allocation in edge-cloud networks: a DRL approach
Ihsan Ullah, Hyun-Kyo Lim, Yeong-Jun Seok, et al.
Journal of Cloud Computing Advances Systems and Applications (2023) Vol. 12, Iss. 1
Open Access | Times Cited: 22
Ihsan Ullah, Hyun-Kyo Lim, Yeong-Jun Seok, et al.
Journal of Cloud Computing Advances Systems and Applications (2023) Vol. 12, Iss. 1
Open Access | Times Cited: 22
Game Theory Based Optimal Defensive Resources Allocation with Incomplete Information in Cyber-Physical Power Systems Against False Data Injection Attacks
Bingjing Yan, Zhenze Jiang, Pengchao Yao, et al.
Protection and Control of Modern Power Systems (2024) Vol. 9, Iss. 2, pp. 115-127
Open Access | Times Cited: 9
Bingjing Yan, Zhenze Jiang, Pengchao Yao, et al.
Protection and Control of Modern Power Systems (2024) Vol. 9, Iss. 2, pp. 115-127
Open Access | Times Cited: 9
A novel deep policy gradient action quantization for trusted collaborative computation in intelligent vehicle networks
Miaojiang Chen, Meng Yi, Mingfeng Huang, et al.
Expert Systems with Applications (2023) Vol. 221, pp. 119743-119743
Closed Access | Times Cited: 20
Miaojiang Chen, Meng Yi, Mingfeng Huang, et al.
Expert Systems with Applications (2023) Vol. 221, pp. 119743-119743
Closed Access | Times Cited: 20
Real-time monitoring model of DDoS attacks using distance thresholds in Edge cooperation networks
Mingyue Li, Liudong Zheng, Xiaoxue Ma, et al.
Journal of Information Security and Applications (2025) Vol. 89, pp. 103972-103972
Closed Access
Mingyue Li, Liudong Zheng, Xiaoxue Ma, et al.
Journal of Information Security and Applications (2025) Vol. 89, pp. 103972-103972
Closed Access
A Review of the NIST Lightweight Cryptography Finalists and Their Fault Analyses
H.M.P.S. Madushan, Iftekhar Salam, Janaka Alawatugoda
Electronics (2022) Vol. 11, Iss. 24, pp. 4199-4199
Open Access | Times Cited: 21
H.M.P.S. Madushan, Iftekhar Salam, Janaka Alawatugoda
Electronics (2022) Vol. 11, Iss. 24, pp. 4199-4199
Open Access | Times Cited: 21
Timely reliability modeling and evaluation of wireless sensor networks with adaptive N-policy sleep scheduling
Changzhen Zhang, Jun Yang, Ning Wang
Reliability Engineering & System Safety (2023) Vol. 235, pp. 109270-109270
Closed Access | Times Cited: 11
Changzhen Zhang, Jun Yang, Ning Wang
Reliability Engineering & System Safety (2023) Vol. 235, pp. 109270-109270
Closed Access | Times Cited: 11
Privacy-preserving healthcare monitoring for IoT devices under edge computing
Wei Cao, Wenting Shen, Zhixiang Zhang, et al.
Computers & Security (2023) Vol. 134, pp. 103464-103464
Closed Access | Times Cited: 10
Wei Cao, Wenting Shen, Zhixiang Zhang, et al.
Computers & Security (2023) Vol. 134, pp. 103464-103464
Closed Access | Times Cited: 10
Protocol-Specific and Sensor Network-Inherited Attack Detection in IoT Using Machine Learning
F. Zahra, N. Z. Jhanjhi, Navid Ali Khan, et al.
Applied Sciences (2022) Vol. 12, Iss. 22, pp. 11598-11598
Open Access | Times Cited: 17
F. Zahra, N. Z. Jhanjhi, Navid Ali Khan, et al.
Applied Sciences (2022) Vol. 12, Iss. 22, pp. 11598-11598
Open Access | Times Cited: 17
Multi-Agent Modeling and Jamming-Aware Routing Protocols for Movable-Jammer-Affected WSNs
Biao Xu, Minyan Lu, Hong Zhang
Sensors (2023) Vol. 23, Iss. 8, pp. 3846-3846
Open Access | Times Cited: 7
Biao Xu, Minyan Lu, Hong Zhang
Sensors (2023) Vol. 23, Iss. 8, pp. 3846-3846
Open Access | Times Cited: 7
Optimizing random forests to detect intrusion in the Internet of Things
Seyede Zohre Majidian, Shiva TaghipourEivazi, Bahman Arasteh, et al.
Computers & Electrical Engineering (2024) Vol. 120, pp. 109860-109860
Closed Access | Times Cited: 2
Seyede Zohre Majidian, Shiva TaghipourEivazi, Bahman Arasteh, et al.
Computers & Electrical Engineering (2024) Vol. 120, pp. 109860-109860
Closed Access | Times Cited: 2
Meta attention for Off-Policy Actor-Critic
Jiateng Huang, Wanrong Huang, Long Lan, et al.
Neural Networks (2023) Vol. 163, pp. 86-96
Closed Access | Times Cited: 6
Jiateng Huang, Wanrong Huang, Long Lan, et al.
Neural Networks (2023) Vol. 163, pp. 86-96
Closed Access | Times Cited: 6
Decentralized Counterfactual Value with Threat Detection for Multi-Agent Reinforcement Learning in mixed cooperative and competitive environments
Shaokang Dong, Chao Li, Shangdong Yang, et al.
Expert Systems with Applications (2024) Vol. 257, pp. 125116-125116
Closed Access | Times Cited: 1
Shaokang Dong, Chao Li, Shangdong Yang, et al.
Expert Systems with Applications (2024) Vol. 257, pp. 125116-125116
Closed Access | Times Cited: 1
Policy ensemble gradient for continuous control problems in deep reinforcement learning
Guoqiang Liu, Gang Chen, Victoria Huang
Neurocomputing (2023) Vol. 548, pp. 126381-126381
Open Access | Times Cited: 4
Guoqiang Liu, Gang Chen, Victoria Huang
Neurocomputing (2023) Vol. 548, pp. 126381-126381
Open Access | Times Cited: 4
TSGS: Two-stage security game solution based on deep reinforcement learning for Internet of Things
Xuecai Feng, Hui Xia, Shuo Xu, et al.
Expert Systems with Applications (2023) Vol. 234, pp. 120965-120965
Closed Access | Times Cited: 4
Xuecai Feng, Hui Xia, Shuo Xu, et al.
Expert Systems with Applications (2023) Vol. 234, pp. 120965-120965
Closed Access | Times Cited: 4
Incentive mechanism design for two-layer mobile data offloading networks: A contract theory approach
Xin Song, Runfeng Zhang, Yu Wang, et al.
Ad Hoc Networks (2023) Vol. 144, pp. 103154-103154
Closed Access | Times Cited: 3
Xin Song, Runfeng Zhang, Yu Wang, et al.
Ad Hoc Networks (2023) Vol. 144, pp. 103154-103154
Closed Access | Times Cited: 3
Multi-robot task allocation in e-commerce RMFS based on deep reinforcement learning
Ruiping Yuan, Jiangtao Dou, Juntao Li, et al.
Mathematical Biosciences & Engineering (2022) Vol. 20, Iss. 2, pp. 1903-1918
Open Access | Times Cited: 4
Ruiping Yuan, Jiangtao Dou, Juntao Li, et al.
Mathematical Biosciences & Engineering (2022) Vol. 20, Iss. 2, pp. 1903-1918
Open Access | Times Cited: 4
Fast Reactive Mechanism for Desired Trajectory Attacks on Unmanned Aerial Vehicles
Yapei Gu, Kexin Guo, Chenlong Zhao, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 8, pp. 8976-8984
Closed Access | Times Cited: 4
Yapei Gu, Kexin Guo, Chenlong Zhao, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 8, pp. 8976-8984
Closed Access | Times Cited: 4
An Efficient Task Allocation with Fuzzy Reptile Search Algorithm for Disaster Management in urban and rural area
Rashmi Chaudhry, Vinay Rishiwal
Sustainable Computing Informatics and Systems (2023) Vol. 39, pp. 100893-100893
Open Access | Times Cited: 2
Rashmi Chaudhry, Vinay Rishiwal
Sustainable Computing Informatics and Systems (2023) Vol. 39, pp. 100893-100893
Open Access | Times Cited: 2
Hybrid approach for virtual machine allocation in cloud computing
B. Booba, X. Joshphin Jasaline Anitha, Chilukuri K. Mohan, et al.
Sustainable Computing Informatics and Systems (2023) Vol. 41, pp. 100922-100922
Closed Access | Times Cited: 2
B. Booba, X. Joshphin Jasaline Anitha, Chilukuri K. Mohan, et al.
Sustainable Computing Informatics and Systems (2023) Vol. 41, pp. 100922-100922
Closed Access | Times Cited: 2
Practical Approach to Mission Autonomy of Multiple Unmanned Air Mobilities
Jun-Young An, Kang Hyun Lee, Sang Pyuk Lee, et al.
International Journal of Control Automation and Systems (2024) Vol. 22, Iss. 8, pp. 2513-2536
Closed Access
Jun-Young An, Kang Hyun Lee, Sang Pyuk Lee, et al.
International Journal of Control Automation and Systems (2024) Vol. 22, Iss. 8, pp. 2513-2536
Closed Access
Spectrum and Power Efficient Anti-Jamming Approach for Cognitive Radio Networks Based on Reinforcement Learning
Hussein Jdeed, Wissam Altabban, Samer Jamal
International Journal of Sensors Wireless Communications and Control (2024) Vol. 14, Iss. 4, pp. 279-328
Closed Access
Hussein Jdeed, Wissam Altabban, Samer Jamal
International Journal of Sensors Wireless Communications and Control (2024) Vol. 14, Iss. 4, pp. 279-328
Closed Access