
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A novel pixel-split image encryption scheme based on 2D Salomon map
Qiang Lai, Genwen Hu, Uğur Erkan, et al.
Expert Systems with Applications (2022) Vol. 213, pp. 118845-118845
Closed Access | Times Cited: 151
Qiang Lai, Genwen Hu, Uğur Erkan, et al.
Expert Systems with Applications (2022) Vol. 213, pp. 118845-118845
Closed Access | Times Cited: 151
Showing 1-25 of 151 citing articles:
Generating Grid Multi-Scroll Attractors in Memristive Neural Networks
Qiang Lai, Zhiqiang Wan, Paul Didier Kamdem Kuate
IEEE Transactions on Circuits and Systems I Regular Papers (2022) Vol. 70, Iss. 3, pp. 1324-1336
Closed Access | Times Cited: 113
Qiang Lai, Zhiqiang Wan, Paul Didier Kamdem Kuate
IEEE Transactions on Circuits and Systems I Regular Papers (2022) Vol. 70, Iss. 3, pp. 1324-1336
Closed Access | Times Cited: 113
2D hyperchaotic system based on Schaffer function for image encryption
Uğur Erkan, Abdurrahim Toktaş, Qiang Lai
Expert Systems with Applications (2022) Vol. 213, pp. 119076-119076
Closed Access | Times Cited: 107
Uğur Erkan, Abdurrahim Toktaş, Qiang Lai
Expert Systems with Applications (2022) Vol. 213, pp. 119076-119076
Closed Access | Times Cited: 107
Cryptanalysis of an image encryption algorithm using quantum chaotic map and DNA coding
Heping Wen, Yiting Lin
Expert Systems with Applications (2023) Vol. 237, pp. 121514-121514
Closed Access | Times Cited: 95
Heping Wen, Yiting Lin
Expert Systems with Applications (2023) Vol. 237, pp. 121514-121514
Closed Access | Times Cited: 95
Novel multiple color images encryption and decryption scheme based on a bit-level extension algorithm
Nanrun Zhou, Long-Long Hu, Zhiwen Huang, et al.
Expert Systems with Applications (2023) Vol. 238, pp. 122052-122052
Closed Access | Times Cited: 94
Nanrun Zhou, Long-Long Hu, Zhiwen Huang, et al.
Expert Systems with Applications (2023) Vol. 238, pp. 122052-122052
Closed Access | Times Cited: 94
Design and realization of discrete memristive hyperchaotic map with application in image encryption
Qiang Lai, Liang Yang, Yuan Liu
Chaos Solitons & Fractals (2022) Vol. 165, pp. 112781-112781
Closed Access | Times Cited: 93
Qiang Lai, Liang Yang, Yuan Liu
Chaos Solitons & Fractals (2022) Vol. 165, pp. 112781-112781
Closed Access | Times Cited: 93
PSO-based image encryption scheme using modular integrated logistic exponential map
Ömer Koçak, Uğur Erkan, Abdurrahim Toktaş, et al.
Expert Systems with Applications (2023) Vol. 237, pp. 121452-121452
Closed Access | Times Cited: 86
Ömer Koçak, Uğur Erkan, Abdurrahim Toktaş, et al.
Expert Systems with Applications (2023) Vol. 237, pp. 121452-121452
Closed Access | Times Cited: 86
Grid-scroll memristive chaotic system with application to image encryption
Qiang Lai, Zhijie Chen
Chaos Solitons & Fractals (2023) Vol. 170, pp. 113341-113341
Closed Access | Times Cited: 79
Qiang Lai, Zhijie Chen
Chaos Solitons & Fractals (2023) Vol. 170, pp. 113341-113341
Closed Access | Times Cited: 79
High-dimensional memristive neural network and its application in commercial data encryption communication
Chunhua Wang, Dong Hong Tang, Hairong Lin, et al.
Expert Systems with Applications (2023) Vol. 242, pp. 122513-122513
Closed Access | Times Cited: 71
Chunhua Wang, Dong Hong Tang, Hairong Lin, et al.
Expert Systems with Applications (2023) Vol. 242, pp. 122513-122513
Closed Access | Times Cited: 71
High-efficiency medical image encryption method based on 2D Logistic-Gaussian hyperchaotic map
Qiang Lai, Genwen Hu, Uğur Erkan, et al.
Applied Mathematics and Computation (2022) Vol. 442, pp. 127738-127738
Closed Access | Times Cited: 70
Qiang Lai, Genwen Hu, Uğur Erkan, et al.
Applied Mathematics and Computation (2022) Vol. 442, pp. 127738-127738
Closed Access | Times Cited: 70
A cross-channel color image encryption algorithm using two-dimensional hyperchaotic map
Qiang Lai, Yuan Liu
Expert Systems with Applications (2023) Vol. 223, pp. 119923-119923
Closed Access | Times Cited: 59
Qiang Lai, Yuan Liu
Expert Systems with Applications (2023) Vol. 223, pp. 119923-119923
Closed Access | Times Cited: 59
Constructing Multiscroll Memristive Neural Network With Local Activity Memristor and Application in Image Encryption
Qiang Lai, Liang Yang, Genwen Hu, et al.
IEEE Transactions on Cybernetics (2024) Vol. 54, Iss. 7, pp. 4039-4048
Closed Access | Times Cited: 54
Qiang Lai, Liang Yang, Genwen Hu, et al.
IEEE Transactions on Cybernetics (2024) Vol. 54, Iss. 7, pp. 4039-4048
Closed Access | Times Cited: 54
A class of 2n+1 dimensional simplest Hamiltonian conservative chaotic systems and fast image encryption schemes
Xinxin Kong, Fei Yu, Wei Yao, et al.
Applied Mathematical Modelling (2023) Vol. 125, pp. 351-374
Closed Access | Times Cited: 49
Xinxin Kong, Fei Yu, Wei Yao, et al.
Applied Mathematical Modelling (2023) Vol. 125, pp. 351-374
Closed Access | Times Cited: 49
Hyperchaotic Maps and the Single Neuron Model: A Novel Framework for Chaos-Based Image Encryption
Wassim Alexan, Yen‐Lin Chen, Lip Yee Por, et al.
Symmetry (2023) Vol. 15, Iss. 5, pp. 1081-1081
Open Access | Times Cited: 42
Wassim Alexan, Yen‐Lin Chen, Lip Yee Por, et al.
Symmetry (2023) Vol. 15, Iss. 5, pp. 1081-1081
Open Access | Times Cited: 42
Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption
Wei Feng, Jing Zhang, Yao Chen, et al.
Expert Systems with Applications (2024) Vol. 246, pp. 123190-123190
Closed Access | Times Cited: 42
Wei Feng, Jing Zhang, Yao Chen, et al.
Expert Systems with Applications (2024) Vol. 246, pp. 123190-123190
Closed Access | Times Cited: 42
Optical image encryption and authentication scheme with computational ghost imaging
Zhe Guo, Suhua Chen, Ling Zhou, et al.
Applied Mathematical Modelling (2024) Vol. 131, pp. 49-66
Closed Access | Times Cited: 39
Zhe Guo, Suhua Chen, Ling Zhou, et al.
Applied Mathematical Modelling (2024) Vol. 131, pp. 49-66
Closed Access | Times Cited: 39
Design, Hardware Implementation, and Application in Video Encryption of the 2D Memristive Cubic Map
Suo Gao, Herbert Ho‐Ching Iu, Mengjiao Wang, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 12, pp. 21807-21815
Closed Access | Times Cited: 28
Suo Gao, Herbert Ho‐Ching Iu, Mengjiao Wang, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 12, pp. 21807-21815
Closed Access | Times Cited: 28
Cryptanalysis of an image encryption scheme using variant Hill cipher and chaos
Heping Wen, Yiting Lin, Lincheng Yang, et al.
Expert Systems with Applications (2024) Vol. 250, pp. 123748-123748
Closed Access | Times Cited: 24
Heping Wen, Yiting Lin, Lincheng Yang, et al.
Expert Systems with Applications (2024) Vol. 250, pp. 123748-123748
Closed Access | Times Cited: 24
A Novel Multi-Channel Image Encryption Algorithm Leveraging Pixel Reorganization and Hyperchaotic Maps
Wei Feng, Jiaxin Yang, Xiangyu Zhao, et al.
Mathematics (2024) Vol. 12, Iss. 24, pp. 3917-3917
Open Access | Times Cited: 18
Wei Feng, Jiaxin Yang, Xiangyu Zhao, et al.
Mathematics (2024) Vol. 12, Iss. 24, pp. 3917-3917
Open Access | Times Cited: 18
Advances and Vulnerabilities in Modern Cryptographic Techniques: A Comprehensive Survey on Cybersecurity in the Domain of Machine/Deep Learning and Quantum Techniques
Abid Mehmood, Arslan Shafique, Moatsum Alawida, et al.
IEEE Access (2024) Vol. 12, pp. 27530-27555
Open Access | Times Cited: 15
Abid Mehmood, Arslan Shafique, Moatsum Alawida, et al.
IEEE Access (2024) Vol. 12, pp. 27530-27555
Open Access | Times Cited: 15
A novel chaotic map application in image encryption algorithm
Lizong Li
Expert Systems with Applications (2024) Vol. 252, pp. 124316-124316
Closed Access | Times Cited: 15
Lizong Li
Expert Systems with Applications (2024) Vol. 252, pp. 124316-124316
Closed Access | Times Cited: 15
Design of two dimensional hyperchaotic system through optimization benchmark function
Uğur Erkan, Abdurrahim Toktaş, Qiang Lai
Chaos Solitons & Fractals (2022) Vol. 167, pp. 113032-113032
Closed Access | Times Cited: 37
Uğur Erkan, Abdurrahim Toktaş, Qiang Lai
Chaos Solitons & Fractals (2022) Vol. 167, pp. 113032-113032
Closed Access | Times Cited: 37
An n-dimensional modulo chaotic system with expected Lyapunov exponents and its application in image encryption
Da‐Wei Ding, Wei Wang, Zongli Yang, et al.
Chaos Solitons & Fractals (2023) Vol. 174, pp. 113841-113841
Closed Access | Times Cited: 31
Da‐Wei Ding, Wei Wang, Zongli Yang, et al.
Chaos Solitons & Fractals (2023) Vol. 174, pp. 113841-113841
Closed Access | Times Cited: 31
Dynamical analysis and finite-time synchronization of grid-scroll memristive chaotic system without equilibrium
Qiang Lai, Zhijie Chen
Chaos Solitons & Fractals (2023) Vol. 176, pp. 114118-114118
Closed Access | Times Cited: 30
Qiang Lai, Zhijie Chen
Chaos Solitons & Fractals (2023) Vol. 176, pp. 114118-114118
Closed Access | Times Cited: 30
Secure image encryption algorithm using chaos-based block permutation and weighted bit planes chain diffusion
Heping Wen, Yiting Lin, S. H. Kang, et al.
iScience (2023) Vol. 27, Iss. 1, pp. 108610-108610
Open Access | Times Cited: 30
Heping Wen, Yiting Lin, S. H. Kang, et al.
iScience (2023) Vol. 27, Iss. 1, pp. 108610-108610
Open Access | Times Cited: 30
Multimedia Security Using Encryption: A Survey
Khalid M. Hosny, Mohamed A. Zaki, Nabil A. Lashin, et al.
IEEE Access (2023) Vol. 11, pp. 63027-63056
Open Access | Times Cited: 27
Khalid M. Hosny, Mohamed A. Zaki, Nabil A. Lashin, et al.
IEEE Access (2023) Vol. 11, pp. 63027-63056
Open Access | Times Cited: 27