OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Industrial blockchain threshold signatures in federated learning for unified space-air-ground-sea model training
Jingxue Chen, Eric Wang, Gautam Srivastava, et al.
Journal of Industrial Information Integration (2024) Vol. 39, pp. 100593-100593
Open Access | Times Cited: 25

Showing 25 citing articles:

When Federated Learning Meets Privacy-Preserving Computation
Jingxue Chen, Hang Yan, Z. Liu, et al.
ACM Computing Surveys (2024) Vol. 56, Iss. 12, pp. 1-36
Closed Access | Times Cited: 35

Information-integration-based optimal coverage path planning of agricultural unmanned systems formations: From theory to practice
Jian Chen, Tao Chen, Yi Cao, et al.
Journal of Industrial Information Integration (2024) Vol. 40, pp. 100617-100617
Closed Access | Times Cited: 7

Enhancing UAV-assisted vehicle edge computing networks through a digital twin-driven task offloading framework
Zhiyang Zhang, Fengli Zhang, Minsheng Cao, et al.
Wireless Networks (2024)
Closed Access | Times Cited: 5

Physically Secure and Privacy-Preserving Charging Authentication Framework With Data Aggregation in Vehicle-to-Grid Networks
Yangfan Liang, Yining Liu, Xianchao Zhang, et al.
IEEE Transactions on Intelligent Transportation Systems (2024) Vol. 25, Iss. 11, pp. 18831-18846
Closed Access | Times Cited: 5

GPT-Based Wasm Instruction Analysis for Program Language Processing
Liangjun Deng, Qi Zhong, Hang Lei, et al.
Communications in computer and information science (2025), pp. 118-136
Closed Access

GDCTSA: A Grouped Data Collection Scheme for Trustworthy Systems Assessment
Z Si, Ziyi Wang, Yichen Li
Communications in computer and information science (2025), pp. 125-139
Closed Access

Efficient and Privacy-Enhanced Asynchronous Federated Learning for Multimedia Data in Edge-based IoT
Hu Xiong, Hang Yan, Mohammad S. Obaidat, et al.
ACM Transactions on Multimedia Computing Communications and Applications (2024)
Open Access | Times Cited: 2

Secure pairing-free certificateless aggregate signcryption scheme for IoT
Dongmei Chen, Fei Zhou, Yining Liu, et al.
Journal of Systems Architecture (2024) Vol. 156, pp. 103268-103268
Closed Access | Times Cited: 2

Heart Sound Signals Classification with Image Conversion Employed
Erqiang Deng, Yibei Jia, Guobin Zhu, et al.
Electronics (2024) Vol. 13, Iss. 7, pp. 1179-1179
Open Access | Times Cited: 1

A Linked List Encryption Scheme for Image Steganography without Embedding
Pengbiao Zhao, Qi Zhong, Jingxue Chen, et al.
Computer Modeling in Engineering & Sciences (2024) Vol. 141, Iss. 1, pp. 331-352
Open Access | Times Cited: 1

Advanced Optimization Techniques for Federated Learning on Non-IID Data
Filippos Efthymiadis, Aristeidis Karras, Christos Karras, et al.
Future Internet (2024) Vol. 16, Iss. 10, pp. 370-370
Open Access | Times Cited: 1

Efficient plaintext checkable identity‐based signcryption in cyber‐physical systems towards IIoT
Abdalla Hadabi, Zheng Qu, Rashad Elhabob, et al.
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 6
Closed Access | Times Cited: 1

Privacy and Security Challenges in Federated Learning for UAV Systems: A Comprehensive Review
Ahmed Al Farsi, Ajmal Khan, Muhammad Rizwan, et al.
Authorea (Authorea) (2024)
Open Access | Times Cited: 1

RLL-SWE: A Robust Linked List Steganography Without Embedding for intelligence networks in smart environments
Pengbiao Zhao, Yuanjian Zhou, Samreen Ijaz, et al.
Journal of Network and Computer Applications (2024) Vol. 234, pp. 104053-104053
Closed Access | Times Cited: 1

A Privacy-Preserving V2I Fast Authentication Scheme in VANETs
Yusheng Gan, Xiaolan Xie, Yining Liu
Electronics (2024) Vol. 13, Iss. 12, pp. 2369-2369
Open Access

Secure personal-health-records searching in edge-based Internet of Medical Things through plaintext checkable encryption
Abdalla Hadabi, Zheng Qu, Mohammed Amoon, et al.
Computers & Electrical Engineering (2024) Vol. 118, pp. 109373-109373
Closed Access

Heterogeneous and plaintext checkable signcryption for integrating IoT in healthcare system
Abdalla Hadabi, Zheng Qu, Kuo‐Hui Yeh, et al.
Journal of Systems Architecture (2024) Vol. 154, pp. 103235-103235
Closed Access

Privacy-Preserving Authentication Based on PUF for VANETs
Lihui Li, Hanwen Deng, Zhongyi Zhai, et al.
Future Internet (2024) Vol. 16, Iss. 9, pp. 326-326
Open Access

L-GraphSAGE: A Graph Neural Network-Based Approach for IoV Application Encrypted Traffic Identification
Shihe Zhang, Ruidong Chen, Jingxue Chen, et al.
Electronics (2024) Vol. 13, Iss. 21, pp. 4222-4222
Open Access

EADC: An Efficient Anonymous Data Collection Scheme with Blockchain in Internet of Things
Z Si, J Wang, Pengbiao Zhao, et al.
Sensors (2024) Vol. 24, Iss. 22, pp. 7162-7162
Open Access

A Blockchain-enabled Horizontal Federated Learning System for Fuzzy Invasion Detection in Maintaining Space Security
Y.P. Tsang, C.H. Wu, W.H. Ip, et al.
Journal of Industrial Information Integration (2024), pp. 100745-100745
Closed Access

UFL: Unlinkable Federated Learning Through Shuffle and Shamir’s Secret Sharing
Jingxue Chen, Z Si, Jingcheng Song, et al.
Lecture notes in computer science (2024), pp. 239-253
Closed Access

Physically Secure and Privacy-Preserving Authentication Scheme for VANET
Dongmei Chen, Yangfan Liang, Lihui Li, et al.
(2024), pp. 1-6
Closed Access

A Robust Linked List Steganography Without Embedding for Digital Images
Pengbiao Zhao, Xiaopei Wang, Qi Zhong, et al.
Communications in computer and information science (2024), pp. 23-35
Closed Access

LLM-based program analysis for source codes, abstract syntax trees and WebAssembly instructions
Liangjun Deng, Qi Zhong, Yao Qiu, et al.
Research Square (Research Square) (2024)
Closed Access

Page 1

Scroll to top