
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Intelligent security and optimization in Edge/Fog Computing
Meikang Qiu, Sun‐Yuan Kung, Keke Gai
Future Generation Computer Systems (2020) Vol. 107, pp. 1140-1142
Closed Access | Times Cited: 38
Meikang Qiu, Sun‐Yuan Kung, Keke Gai
Future Generation Computer Systems (2020) Vol. 107, pp. 1140-1142
Closed Access | Times Cited: 38
Showing 1-25 of 38 citing articles:
Edge-computing-driven Internet of Things: A Survey
Linghe Kong, Jinlin Tan, Junqin Huang, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 8, pp. 1-41
Closed Access | Times Cited: 119
Linghe Kong, Jinlin Tan, Junqin Huang, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 8, pp. 1-41
Closed Access | Times Cited: 119
Optimized ANFIS Model Using Hybrid Metaheuristic Algorithms for Parkinson’s Disease Prediction in IoT Environment
Ibrahim M. El‐Hasnony, Sherif Barakat, Reham R. Mostafa
IEEE Access (2020) Vol. 8, pp. 119252-119270
Open Access | Times Cited: 83
Ibrahim M. El‐Hasnony, Sherif Barakat, Reham R. Mostafa
IEEE Access (2020) Vol. 8, pp. 119252-119270
Open Access | Times Cited: 83
Multilevel Intrusion Detection Based on Transformer and Wavelet Transform for IoT Data Security
Peifeng Liang, Lina Yang, Zenggang Xiong, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 15, pp. 25613-25624
Closed Access | Times Cited: 8
Peifeng Liang, Lina Yang, Zenggang Xiong, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 15, pp. 25613-25624
Closed Access | Times Cited: 8
A clogging resistant secure authentication scheme for fog computing services
Zeeshan Ali, Shehzad Ashraf Chaudhry, Khalid Mahmood, et al.
Computer Networks (2020) Vol. 185, pp. 107731-107731
Closed Access | Times Cited: 54
Zeeshan Ali, Shehzad Ashraf Chaudhry, Khalid Mahmood, et al.
Computer Networks (2020) Vol. 185, pp. 107731-107731
Closed Access | Times Cited: 54
Blockchain-based reliable task offloading framework for edge-cloud cooperative workflows in IoMT
Juan Li, Mengyuan Zhu, Jin Liu, et al.
Information Sciences (2024) Vol. 668, pp. 120530-120530
Closed Access | Times Cited: 6
Juan Li, Mengyuan Zhu, Jin Liu, et al.
Information Sciences (2024) Vol. 668, pp. 120530-120530
Closed Access | Times Cited: 6
A Homomorphic Encryption and Privacy Protection Method Based on Blockchain and Edge Computing
Yan Xiao-yan, Qilin Wu, Sun You-ming
Wireless Communications and Mobile Computing (2020) Vol. 2020, pp. 1-9
Open Access | Times Cited: 45
Yan Xiao-yan, Qilin Wu, Sun You-ming
Wireless Communications and Mobile Computing (2020) Vol. 2020, pp. 1-9
Open Access | Times Cited: 45
Privacy-preserving image multi-classification deep learning model in robot system of industrial IoT
Yange Chen, Yuan Ping, Zhili Zhang, et al.
Neural Computing and Applications (2020) Vol. 33, Iss. 10, pp. 4677-4694
Closed Access | Times Cited: 37
Yange Chen, Yuan Ping, Zhili Zhang, et al.
Neural Computing and Applications (2020) Vol. 33, Iss. 10, pp. 4677-4694
Closed Access | Times Cited: 37
Development of Smart Cities with Fog Computing and Internet of Things
Kong-Long Lai, Joy Iong Zong Chen
Journal of Ubiquitous Computing and Communication Technologies (2021) Vol. 3, Iss. 1, pp. 52-60
Open Access | Times Cited: 29
Kong-Long Lai, Joy Iong Zong Chen
Journal of Ubiquitous Computing and Communication Technologies (2021) Vol. 3, Iss. 1, pp. 52-60
Open Access | Times Cited: 29
Current Status and Prospects of Blockchain Security Standardization
Xiaofeng Chen, Zunbo Wei, Xiangjuan Jia, et al.
(2022), pp. 24-29
Closed Access | Times Cited: 11
Xiaofeng Chen, Zunbo Wei, Xiangjuan Jia, et al.
(2022), pp. 24-29
Closed Access | Times Cited: 11
Accurate Anomaly Detection With Energy Efficiency in IoT–Edge–Cloud Collaborative Networks
Yi Li, Zhangbing Zhou, Xiao Xue, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 19, pp. 16959-16974
Closed Access | Times Cited: 6
Yi Li, Zhangbing Zhou, Xiao Xue, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 19, pp. 16959-16974
Closed Access | Times Cited: 6
Enterprise ecological niche measurement and competitive effect analysis based on digital business recognition
Li RunYi, Bin Gu
Technology Analysis and Strategic Management (2023) Vol. 36, Iss. 11, pp. 3621-3636
Closed Access | Times Cited: 6
Li RunYi, Bin Gu
Technology Analysis and Strategic Management (2023) Vol. 36, Iss. 11, pp. 3621-3636
Closed Access | Times Cited: 6
A cost‐efficient and QoS‐aware adaptive placement of applications in fog computing
Hongjian Li, Xu Chen, Tiantian Wang, et al.
Concurrency and Computation Practice and Experience (2023) Vol. 35, Iss. 21
Closed Access | Times Cited: 4
Hongjian Li, Xu Chen, Tiantian Wang, et al.
Concurrency and Computation Practice and Experience (2023) Vol. 35, Iss. 21
Closed Access | Times Cited: 4
A deep learning-based dynamic deformable adaptive framework for locating the root region of the dynamic flames
Hongkang Tao, Guhong Wang, Jiansheng Liu, et al.
PLoS ONE (2024) Vol. 19, Iss. 4, pp. e0301839-e0301839
Open Access | Times Cited: 1
Hongkang Tao, Guhong Wang, Jiansheng Liu, et al.
PLoS ONE (2024) Vol. 19, Iss. 4, pp. e0301839-e0301839
Open Access | Times Cited: 1
Decentralized IoT Resource Monitoring and Scheduling Framework Based on Blockchain
Dawei Li, Ruonan Chen, Qinjun Wan, et al.
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 24, pp. 21135-21142
Closed Access | Times Cited: 7
Dawei Li, Ruonan Chen, Qinjun Wan, et al.
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 24, pp. 21135-21142
Closed Access | Times Cited: 7
SIMAD: Secure Intelligent Method for IoT-Fog Environments Attacks Detection
Wided Ben Daoud, Sami Mahfoudhi
Computers, materials & continua/Computers, materials & continua (Print) (2021) Vol. 70, Iss. 2, pp. 2727-2742
Open Access | Times Cited: 9
Wided Ben Daoud, Sami Mahfoudhi
Computers, materials & continua/Computers, materials & continua (Print) (2021) Vol. 70, Iss. 2, pp. 2727-2742
Open Access | Times Cited: 9
Standardization of Financial Blockchain: Technologies, Challenges, and Future
Xiaofeng Chen, Qing Zhang, Lu Zhang, et al.
(2022), pp. 30-35
Closed Access | Times Cited: 6
Xiaofeng Chen, Qing Zhang, Lu Zhang, et al.
(2022), pp. 30-35
Closed Access | Times Cited: 6
IDP-Net: Industrial defect perception network based on cross-layer semantic information guidance and context concentration enhancement
Gang Li, Shilong Zhao, Min Li, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 130, pp. 107677-107677
Closed Access | Times Cited: 3
Gang Li, Shilong Zhao, Min Li, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 130, pp. 107677-107677
Closed Access | Times Cited: 3
Analyzing the delivery determination problem of new retail stores considering crowdsourcing under the background of blockchain
Yue Li, Jianyou Zhao, Zenghua Chen
Research in Transportation Business & Management (2023) Vol. 52, pp. 101083-101083
Closed Access | Times Cited: 3
Yue Li, Jianyou Zhao, Zenghua Chen
Research in Transportation Business & Management (2023) Vol. 52, pp. 101083-101083
Closed Access | Times Cited: 3
Method of Interaction between Blockchain and the World outside the Chain based on Oracle Machine
Feng Yang, Lei Liao, Lin Chen
(2022), pp. 101-106
Closed Access | Times Cited: 4
Feng Yang, Lei Liao, Lin Chen
(2022), pp. 101-106
Closed Access | Times Cited: 4
[Retracted] Optimization of an Intelligent Music‐Playing System Based on Network Communication
Liaoyan Zhang
Complexity (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 5
Liaoyan Zhang
Complexity (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 5
Remote Audit Scheme of Embedded Device Software Based on TPM
Dawei Li, Yingpeng Zhang, Jian Cui, et al.
(2022), pp. 61-66
Closed Access | Times Cited: 3
Dawei Li, Yingpeng Zhang, Jian Cui, et al.
(2022), pp. 61-66
Closed Access | Times Cited: 3
Enhancing Public Wellbeing Through Autogate at Soekarno-Hatta International Airports
Gunawan Ari Nursanto, Isidorus Anung Prabadhi, Besse Hartati, et al.
Return Study of Management Economic and Bussines (2024) Vol. 3, Iss. 2, pp. 149-157
Open Access
Gunawan Ari Nursanto, Isidorus Anung Prabadhi, Besse Hartati, et al.
Return Study of Management Economic and Bussines (2024) Vol. 3, Iss. 2, pp. 149-157
Open Access
An advanced security model for fog computing to tackle various attacks on the data link layer using the QQL-FHES scheme
V. Balaji, P. Selvaraj
International Journal of Information Technology (2024) Vol. 16, Iss. 5, pp. 3093-3100
Closed Access
V. Balaji, P. Selvaraj
International Journal of Information Technology (2024) Vol. 16, Iss. 5, pp. 3093-3100
Closed Access
Application of IoT‐Fog based real‐time monitoring system for open‐cast mines—A survey
Devendra Kumar Yadav, Pragyan Mishra, Singam Jayanthu, et al.
IET Wireless Sensor Systems (2021) Vol. 11, Iss. 1, pp. 1-21
Open Access | Times Cited: 4
Devendra Kumar Yadav, Pragyan Mishra, Singam Jayanthu, et al.
IET Wireless Sensor Systems (2021) Vol. 11, Iss. 1, pp. 1-21
Open Access | Times Cited: 4
Steam computing paradigm: Cross‐layer solutions over cloud, fog, and edge computing
Abir Mchergui, Rejab Hajlaoui, Tarek Moulahi, et al.
IET Wireless Sensor Systems (2023)
Open Access | Times Cited: 1
Abir Mchergui, Rejab Hajlaoui, Tarek Moulahi, et al.
IET Wireless Sensor Systems (2023)
Open Access | Times Cited: 1