
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Cryptanalysis of an image encryption algorithm using quantum chaotic map and DNA coding
Heping Wen, Yiting Lin
Expert Systems with Applications (2023) Vol. 237, pp. 121514-121514
Closed Access | Times Cited: 94
Heping Wen, Yiting Lin
Expert Systems with Applications (2023) Vol. 237, pp. 121514-121514
Closed Access | Times Cited: 94
Showing 1-25 of 94 citing articles:
Exploiting Newly Designed Fractional-Order 3D Lorenz Chaotic System and 2D Discrete Polynomial Hyper-Chaotic Map for High-Performance Multi-Image Encryption
Wei Feng, Quanwen Wang, Hui Liu, et al.
Fractal and Fractional (2023) Vol. 7, Iss. 12, pp. 887-887
Open Access | Times Cited: 69
Wei Feng, Quanwen Wang, Hui Liu, et al.
Fractal and Fractional (2023) Vol. 7, Iss. 12, pp. 887-887
Open Access | Times Cited: 69
Cross-channel color image encryption through 2D hyperchaotic hybrid map of optimization test functions
Feyza Toktas, Uğur Erkan, Zekí Yetgín
Expert Systems with Applications (2024) Vol. 249, pp. 123583-123583
Closed Access | Times Cited: 52
Feyza Toktas, Uğur Erkan, Zekí Yetgín
Expert Systems with Applications (2024) Vol. 249, pp. 123583-123583
Closed Access | Times Cited: 52
Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption
Wei Feng, Jing Zhang, Yao Chen, et al.
Expert Systems with Applications (2024) Vol. 246, pp. 123190-123190
Closed Access | Times Cited: 41
Wei Feng, Jing Zhang, Yao Chen, et al.
Expert Systems with Applications (2024) Vol. 246, pp. 123190-123190
Closed Access | Times Cited: 41
Cryptanalysis of an image encryption scheme using variant Hill cipher and chaos
Heping Wen, Yiting Lin, Lincheng Yang, et al.
Expert Systems with Applications (2024) Vol. 250, pp. 123748-123748
Closed Access | Times Cited: 24
Heping Wen, Yiting Lin, Lincheng Yang, et al.
Expert Systems with Applications (2024) Vol. 250, pp. 123748-123748
Closed Access | Times Cited: 24
Cryptanalyzing a bit-level image encryption algorithm based on chaotic maps
Heping Wen, Yiting Lin, Zhaoyang Feng
Engineering Science and Technology an International Journal (2024) Vol. 51, pp. 101634-101634
Open Access | Times Cited: 22
Heping Wen, Yiting Lin, Zhaoyang Feng
Engineering Science and Technology an International Journal (2024) Vol. 51, pp. 101634-101634
Open Access | Times Cited: 22
Image privacy protection scheme based on high-quality reconstruction DCT compression and nonlinear dynamics
Yiting Lin, Zhiyu Xie, Tingting Chen, et al.
Expert Systems with Applications (2024) Vol. 257, pp. 124891-124891
Closed Access | Times Cited: 22
Yiting Lin, Zhiyu Xie, Tingting Chen, et al.
Expert Systems with Applications (2024) Vol. 257, pp. 124891-124891
Closed Access | Times Cited: 22
Grid Multibutterfly Memristive Neural Network With Three Memristive Systems: Modeling, Dynamic Analysis, and Application in Police IoT
Hairong Lin, Xiaoheng Deng, Fei Yu, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 18, pp. 29878-29889
Closed Access | Times Cited: 21
Hairong Lin, Xiaoheng Deng, Fei Yu, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 18, pp. 29878-29889
Closed Access | Times Cited: 21
Secure Communication of Military Reconnaissance Images Over UAV-Assisted Relay Networks
Wassim Alexan, Laila Aly, Yousef Korayem, et al.
IEEE Access (2024) Vol. 12, pp. 78589-78610
Open Access | Times Cited: 15
Wassim Alexan, Laila Aly, Yousef Korayem, et al.
IEEE Access (2024) Vol. 12, pp. 78589-78610
Open Access | Times Cited: 15
Cryptanalysis of an Image Encryption Algorithm Using DNA Coding and Chaos
Yuzhuo Zhao, Qiqin Shi, Qun Ding
Entropy (2025) Vol. 27, Iss. 1, pp. 40-40
Open Access | Times Cited: 1
Yuzhuo Zhao, Qiqin Shi, Qun Ding
Entropy (2025) Vol. 27, Iss. 1, pp. 40-40
Open Access | Times Cited: 1
A combinatory approach of non-chain ring and henon map for image encryption application
Salman Mohi, Ikram Ud Din, Tariq Shah, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access | Times Cited: 1
Salman Mohi, Ikram Ud Din, Tariq Shah, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access | Times Cited: 1
Secure image encryption algorithm using chaos-based block permutation and weighted bit planes chain diffusion
Heping Wen, Yiting Lin, S. H. Kang, et al.
iScience (2023) Vol. 27, Iss. 1, pp. 108610-108610
Open Access | Times Cited: 30
Heping Wen, Yiting Lin, S. H. Kang, et al.
iScience (2023) Vol. 27, Iss. 1, pp. 108610-108610
Open Access | Times Cited: 30
Highly secure non-orthogonal multiple access based on key accompanying transmission in training sequence
Yongcan Han, Jianxin Ren, Bo Liu, et al.
Optics Express (2023) Vol. 32, Iss. 2, pp. 1979-1979
Open Access | Times Cited: 26
Yongcan Han, Jianxin Ren, Bo Liu, et al.
Optics Express (2023) Vol. 32, Iss. 2, pp. 1979-1979
Open Access | Times Cited: 26
A novel chaotic map application in image encryption algorithm
Lizong Li
Expert Systems with Applications (2024) Vol. 252, pp. 124316-124316
Closed Access | Times Cited: 13
Lizong Li
Expert Systems with Applications (2024) Vol. 252, pp. 124316-124316
Closed Access | Times Cited: 13
A Novel Image Encryption Algorithm Based on Cyclic Chaotic Map in Industrial IoT Environments
Moatsum Alawida
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 8, pp. 10530-10541
Closed Access | Times Cited: 12
Moatsum Alawida
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 8, pp. 10530-10541
Closed Access | Times Cited: 12
A hybrid approach based on deep neural network and double exponential model for remaining useful life prediction
Junyuan Liang, Hui Liu, Ning‐Cong Xiao
Expert Systems with Applications (2024) Vol. 249, pp. 123563-123563
Closed Access | Times Cited: 11
Junyuan Liang, Hui Liu, Ning‐Cong Xiao
Expert Systems with Applications (2024) Vol. 249, pp. 123563-123563
Closed Access | Times Cited: 11
A comprehensive study of the novel 4D hyperchaotic system with self-exited multistability and application in the voice encryption
Khaled Benkouider, Aceng Sambas, Talal Bonny, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 11
Khaled Benkouider, Aceng Sambas, Talal Bonny, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 11
An image encryption algorithm based on multi-layered chaotic maps and its security analysis
Erdal Güvenoğlu
Connection Science (2024) Vol. 36, Iss. 1
Open Access | Times Cited: 10
Erdal Güvenoğlu
Connection Science (2024) Vol. 36, Iss. 1
Open Access | Times Cited: 10
Dynamic S-Box Construction Using Mordell Elliptic Curves over Galois Field and Its Applications in Image Encryption
Amal S. Alali, Rashad Ali, Muhammad Kamran Jamil, et al.
Mathematics (2024) Vol. 12, Iss. 4, pp. 587-587
Open Access | Times Cited: 10
Amal S. Alali, Rashad Ali, Muhammad Kamran Jamil, et al.
Mathematics (2024) Vol. 12, Iss. 4, pp. 587-587
Open Access | Times Cited: 10
Frequency-domain image encryption based on IWT and 3D S-box
Heping Wen, Zhaoyang Feng, Chixin Bai, et al.
Physica Scripta (2024) Vol. 99, Iss. 5, pp. 055254-055254
Closed Access | Times Cited: 7
Heping Wen, Zhaoyang Feng, Chixin Bai, et al.
Physica Scripta (2024) Vol. 99, Iss. 5, pp. 055254-055254
Closed Access | Times Cited: 7
A Robust Memristor-Enhanced Polynomial Hyper-Chaotic Map and Its Multi-Channel Image Encryption Application
Kun Qian, Xiao Yang, Yingjie Wei, et al.
Micromachines (2023) Vol. 14, Iss. 11, pp. 2090-2090
Open Access | Times Cited: 17
Kun Qian, Xiao Yang, Yingjie Wei, et al.
Micromachines (2023) Vol. 14, Iss. 11, pp. 2090-2090
Open Access | Times Cited: 17
A Lightweight Multi-Chaos-Based Image Encryption Scheme for IoT Networks
Kurunandan Jain, Betrant Titus, Prabhakar Krishnan, et al.
IEEE Access (2024) Vol. 12, pp. 62118-62148
Open Access | Times Cited: 6
Kurunandan Jain, Betrant Titus, Prabhakar Krishnan, et al.
IEEE Access (2024) Vol. 12, pp. 62118-62148
Open Access | Times Cited: 6
An Innovative Feasible Approach for Multi-Media Security Using Both Chaotic and Elliptic Curve Structures
Tanveer Qayyum, Tariq Shah, Ali Yahya Hummdi, et al.
IEEE Access (2024) Vol. 12, pp. 10411-10427
Open Access | Times Cited: 5
Tanveer Qayyum, Tariq Shah, Ali Yahya Hummdi, et al.
IEEE Access (2024) Vol. 12, pp. 10411-10427
Open Access | Times Cited: 5
An innovative image encryption algorithm enhanced with the Pan-Tompkins Algorithm for optimal security
Aysegul IHSAN, Nurettin Doğan
Multimedia Tools and Applications (2024) Vol. 83, Iss. 35, pp. 82589-82619
Open Access | Times Cited: 5
Aysegul IHSAN, Nurettin Doğan
Multimedia Tools and Applications (2024) Vol. 83, Iss. 35, pp. 82589-82619
Open Access | Times Cited: 5
A self-reversible image encryption algorithm utilizing a novel chaotic map
Lizong Li
Nonlinear Dynamics (2025)
Closed Access
Lizong Li
Nonlinear Dynamics (2025)
Closed Access
Parameters security strategy formulated by hyperchaos in federal learning
Zhen Yang, Tian-Shu Yang, Shouliang Li, et al.
Applied Intelligence (2025) Vol. 55, Iss. 4
Closed Access
Zhen Yang, Tian-Shu Yang, Shouliang Li, et al.
Applied Intelligence (2025) Vol. 55, Iss. 4
Closed Access