OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

SCTD: A spatiotemporal correlation truth discovery scheme for security management of data platform
Wen Hui Mo, Zeyuan Li, Zhiwen Zeng, et al.
Future Generation Computer Systems (2022) Vol. 139, pp. 109-125
Closed Access | Times Cited: 22

Showing 22 citing articles:

Credit and quality intelligent learning based multi-armed bandit scheme for unknown worker selection in multimedia MCS
Jianheng Tang, Feijiang Han, Kejia Fan, et al.
Information Sciences (2023) Vol. 647, pp. 119444-119444
Closed Access | Times Cited: 22

Utilizing data platform management to implement “5W” analysis framework for preventing and controlling corruption in grassroots government
Zeyu Wang, Xin Guan, Yanzhao Zeng, et al.
Heliyon (2024) Vol. 10, Iss. 7, pp. e28601-e28601
Open Access | Times Cited: 11

DLFTI: A deep learning based fast truth inference mechanism for distributed spatiotemporal data in mobile crowd sensing
Jianheng Tang, Kejia Fan, Pengzhi Yin, et al.
Information Sciences (2023) Vol. 644, pp. 119245-119245
Closed Access | Times Cited: 21

A decentralized trust inference approach with intelligence to improve data collection quality for mobile crowd sensing
Xuezheng Yang, Zhiwen Zeng, Anfeng Liu, et al.
Information Sciences (2023) Vol. 644, pp. 119286-119286
Closed Access | Times Cited: 12

BTV-CMAB: A Bi-Directional Trust Verification-Based Combinatorial Multiarmed Bandit Scheme for Mobile Crowdsourcing
Jianheng Tang, Kejia Fan, Wenxuan Xie, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 2, pp. 1925-1938
Closed Access | Times Cited: 12

A trust and privacy-preserving intelligent big data collection scheme in mobile edge-cloud crowdsourcing
Zihui Sun, Anfeng Liu, Naixue Xiong, et al.
Future Generation Computer Systems (2024) Vol. 157, pp. 145-163
Closed Access | Times Cited: 3

Temporal Data Correlation Providing Enhanced Dynamic Crypto-Ransomware Pre-Encryption Boundary Delineation
Abdullah Alqahtani, Frederick T. Sheldon
Sensors (2023) Vol. 23, Iss. 9, pp. 4355-4355
Open Access | Times Cited: 7

TD-MDB: A Truth-Discovery-Based Multidimensional Bidding Strategy for Federated Learning in Industrial IoT Systems
Pengjie Zeng, Anfeng Liu, Naixue Xiong, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 3, pp. 4274-4288
Closed Access | Times Cited: 7

Truth based three-tier Combinatorial Multi-Armed Bandit ecosystems for mobile crowdsensing
Yingqi Peng, Wei Liu, Anfeng Liu, et al.
Expert Systems with Applications (2023) Vol. 236, pp. 121119-121119
Closed Access | Times Cited: 7

Multiround Efficient and Secure Truth Discovery in Mobile Crowdsensing Systems
Chenfei Hu, Z. Z. Li, Yuhua Xu, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 10, pp. 17210-17222
Closed Access | Times Cited: 2

A Semi-supervised Sensing Rate Learning based CMAB scheme to combat COVID-19 by trustful data collection in the crowd
Jianheng Tang, Kejia Fan, Wenxuan Xie, et al.
Computer Communications (2023) Vol. 206, pp. 85-100
Open Access | Times Cited: 6

Employing Social Participants for Timely Data Collection Using Pub/sub Solutions in Dynamic IoT Systems
Jiayi Yu, Anfeng Liu, Naixue Xiong, et al.
Computer Networks (2022) Vol. 220, pp. 109501-109501
Closed Access | Times Cited: 8

The more open, the better? Research on the influence of subject diversity on trust of tourism platforms
Siyuan Xu, Yupeng Mou, Zhihua Ding
Marketing Intelligence & Planning (2023) Vol. 41, Iss. 8, pp. 1213-1235
Closed Access | Times Cited: 3

User trust and evaluation mechanism based on community classification calculation in opportunistic social networks
Juan Huang, Fangfang Gou, Jia Wu
Journal of Intelligent & Fuzzy Systems (2023), pp. 1-18
Closed Access | Times Cited: 2

Boosting Crowdsourced Annotation Accuracy: Small Loss Filtering and Augmentation-Driven Training
Yanming Fu, Weigeng Han, Jingsang Yang, et al.
IEEE Access (2024) Vol. 12, pp. 101745-101755
Open Access

Privacy-preserving quadratic truth discovery based on Precision partitioning
Ruizhong Du, Zhuang Liang, Xiaoyan Liang
Computers & Security (2024) Vol. 146, pp. 104039-104039
Closed Access

Anti Dynamic Collusion Data Aggregation Scheme in Mobile Crowdsensing
Wenshuo Ma, Kan Yu, Wenhao Zhang, et al.
(2024), pp. 53-57
Closed Access

A hyper-heuristic optimization multi-task allocation in mobile crowdsensing based on inherent attributes
Heng Cao, Yantao Yu, Guojin Liu, et al.
Ad Hoc Networks (2024), pp. 103717-103717
Closed Access

HVVU: A Hash Value Verification joint UAVs scheme for trust data collection in smart cities
Guangrong Yang, An He, Guangwei Wu, et al.
Computer Networks (2024), pp. 111005-111005
Closed Access

Mining frequent temporal duration-based patterns on time interval sequential database
Fuyin Lai, Guoting Chen, Wensheng Gan, et al.
Information Sciences (2024) Vol. 665, pp. 120421-120421
Closed Access

Location and Bid Privacy Preserving-Based Quality-Aware Worker Recruitment Scheme in MCS
Weifan Shi, Qingyong Deng, Zhetao Li, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 12, pp. 21841-21856
Closed Access

Truth Discovery for Multiple Judgments With Crowdsourced Sparse Data
Pengfei Wang, Dian Jiao, Zhan Su, et al.
IEEE Internet of Things Journal (2024) Vol. 12, Iss. 5, pp. 5122-5136
Closed Access

Page 1

Scroll to top