OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

PSO-based image encryption scheme using modular integrated logistic exponential map
Ömer Koçak, Uğur Erkan, Abdurrahim Toktaş, et al.
Expert Systems with Applications (2023) Vol. 237, pp. 121452-121452
Closed Access | Times Cited: 85

Showing 1-25 of 85 citing articles:

Novel multiple color images encryption and decryption scheme based on a bit-level extension algorithm
Nanrun Zhou, Long-Long Hu, Zhiwen Huang, et al.
Expert Systems with Applications (2023) Vol. 238, pp. 122052-122052
Closed Access | Times Cited: 92

Cross-channel color image encryption through 2D hyperchaotic hybrid map of optimization test functions
Feyza Toktas, Uğur Erkan, Zekí Yetgín
Expert Systems with Applications (2024) Vol. 249, pp. 123583-123583
Closed Access | Times Cited: 52

A discrete Chialvo–Rulkov neuron network coupled with a novel memristor model: Design, Dynamical analysis, DSP implementation and its application
Hongli Cao, Yu Wang, Santo Banerjee, et al.
Chaos Solitons & Fractals (2024) Vol. 179, pp. 114466-114466
Closed Access | Times Cited: 48

A robust bit-level image encryption based on Bessel map
Abdurrahim Toktaş, Uğur Erkan, Suo Gao, et al.
Applied Mathematics and Computation (2023) Vol. 462, pp. 128340-128340
Closed Access | Times Cited: 41

Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption
Wei Feng, Jing Zhang, Yao Chen, et al.
Expert Systems with Applications (2024) Vol. 246, pp. 123190-123190
Closed Access | Times Cited: 41

Design, Hardware Implementation, and Application in Video Encryption of the 2D Memristive Cubic Map
Suo Gao, Herbert Ho‐Ching Iu, Mengjiao Wang, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 12, pp. 21807-21815
Closed Access | Times Cited: 28

Cryptanalyzing a bit-level image encryption algorithm based on chaotic maps
Heping Wen, Yiting Lin, Zhaoyang Feng
Engineering Science and Technology an International Journal (2024) Vol. 51, pp. 101634-101634
Open Access | Times Cited: 22

Image privacy protection scheme based on high-quality reconstruction DCT compression and nonlinear dynamics
Yiting Lin, Zhiyu Xie, Tingting Chen, et al.
Expert Systems with Applications (2024) Vol. 257, pp. 124891-124891
Closed Access | Times Cited: 22

Grid Multibutterfly Memristive Neural Network With Three Memristive Systems: Modeling, Dynamic Analysis, and Application in Police IoT
Hairong Lin, Xiaoheng Deng, Fei Yu, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 18, pp. 29878-29889
Closed Access | Times Cited: 21

A color image encryption and decryption scheme based on extended DNA coding and fractional-order 5D hyper-chaotic system
Fanqi Meng, Gang Wu
Expert Systems with Applications (2024) Vol. 254, pp. 124413-124413
Closed Access | Times Cited: 17

Development of a video encryption algorithm for critical areas using 2D extended Schaffer function map and neural networks
Suo Gao, Jiafeng Liu, Herbert Ho‐Ching Iu, et al.
Applied Mathematical Modelling (2024) Vol. 134, pp. 520-537
Closed Access | Times Cited: 14

A Novel Multi-Channel Image Encryption Algorithm Leveraging Pixel Reorganization and Hyperchaotic Maps
Wei Feng, Jiaxin Yang, Xiangyu Zhao, et al.
Mathematics (2024) Vol. 12, Iss. 24, pp. 3917-3917
Open Access | Times Cited: 14

A combinatory approach of non-chain ring and henon map for image encryption application
Salman Mohi, Ikram Ud Din, Tariq Shah, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access | Times Cited: 1

A multi-image encryption scheme based on block compressive sensing and nonlinear bifurcation diffusion
Long-Long Hu, M.-J. Chen, Meng-Meng Wang, et al.
Chaos Solitons & Fractals (2024) Vol. 188, pp. 115521-115521
Closed Access | Times Cited: 10

Frequency-domain image encryption based on IWT and 3D S-box
Heping Wen, Zhaoyang Feng, Chixin Bai, et al.
Physica Scripta (2024) Vol. 99, Iss. 5, pp. 055254-055254
Closed Access | Times Cited: 7

Multiobjective Design of 2D Hyperchaotic System Using Leader Pareto Grey Wolf Optimizer
Abdurrahim Toktaş, Uǧur Erkan, Deniz Üstün, et al.
IEEE Transactions on Systems Man and Cybernetics Systems (2024) Vol. 54, Iss. 9, pp. 5237-5247
Closed Access | Times Cited: 7

A new image encryption algorithm based on cubic fractal matrix and L-LCCML system
Hongyu Zhao, Shengsheng Wang, Zihao Fu
Chaos Solitons & Fractals (2024) Vol. 185, pp. 115076-115076
Closed Access | Times Cited: 5

A novel 2D Log-Logistic–Sine chaotic map for image encryption
Mengmeng Wang, Xin-guang Song, Si-hang Liu, et al.
Nonlinear Dynamics (2024)
Closed Access | Times Cited: 5

Double Security Level Protection Based on Chaotic Maps and SVD for Medical Images
Conghuan Ye, Shenglong Tan, Jun Wang, et al.
Mathematics (2025) Vol. 13, Iss. 2, pp. 182-182
Open Access

Design of new chaotic system with multi-scroll attractor by using variable transformation and its application
Shiya Wang, Jianbin He
Physica Scripta (2025) Vol. 100, Iss. 2, pp. 025230-025230
Closed Access

Photovoltaic Farm Production Forecasting: Modified Metaheuristic Optimized Long Short-Term Memory Based Networks Approach
Aleksandar Stojković, Boško Nikolić, Miodrag Živković, et al.
IEEE Access (2025) Vol. 13, pp. 25198-25222
Open Access

Period regulated particle swarm optimization algorithm
Zhilong Liu, H. Jiang
Soft Computing (2025)
Closed Access

Novel image encryption algorithm utilizing hybrid chaotic maps and Elliptic Curve Cryptography with genetic algorithm
Kartikey Pandey, Deepmala Sharma
Journal of Information Security and Applications (2025) Vol. 89, pp. 103995-103995
Closed Access

Blockchain driven medical image encryption employing chaotic tent map in cloud computing
Usman Shahid, Shamsa Kanwal, Mahwish Bano, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access

Page 1 - Next Page

Scroll to top