
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Insights into security and privacy issues in smart healthcare systems based on medical images
Fei Yan, Nianqiao Li, Abdullah M. Iliyasu, et al.
Journal of Information Security and Applications (2023) Vol. 78, pp. 103621-103621
Open Access | Times Cited: 14
Fei Yan, Nianqiao Li, Abdullah M. Iliyasu, et al.
Journal of Information Security and Applications (2023) Vol. 78, pp. 103621-103621
Open Access | Times Cited: 14
Showing 14 citing articles:
Securing healthcare medical image information using advance morphological component analysis, information hiding systems, and hybrid convolutional neural networks on IoMT
Binay Kumar Pandey, Digvijay Pandey
Computers in Biology and Medicine (2024) Vol. 185, pp. 109499-109499
Closed Access | Times Cited: 30
Binay Kumar Pandey, Digvijay Pandey
Computers in Biology and Medicine (2024) Vol. 185, pp. 109499-109499
Closed Access | Times Cited: 30
Cybersecurity for Sustainable Smart Healthcare: State of the Art, Taxonomy, Mechanisms, and Essential Roles
Guma Ali, Maad M. Mijwil
Deleted Journal (2024) Vol. 4, Iss. 2, pp. 20-62
Open Access | Times Cited: 8
Guma Ali, Maad M. Mijwil
Deleted Journal (2024) Vol. 4, Iss. 2, pp. 20-62
Open Access | Times Cited: 8
A novel medical steganography technique based on Adversarial Neural Cryptography and digital signature using least significant bit replacement
Mohamed Abdel Hameed, M. Hassaballah, Riem Abdelazim, et al.
International Journal of Cognitive Computing in Engineering (2024) Vol. 5, pp. 379-397
Open Access | Times Cited: 5
Mohamed Abdel Hameed, M. Hassaballah, Riem Abdelazim, et al.
International Journal of Cognitive Computing in Engineering (2024) Vol. 5, pp. 379-397
Open Access | Times Cited: 5
Blockchain for security and privacy in the smart healthcare
Hamed Taherdoost
Elsevier eBooks (2025), pp. 411-433
Closed Access
Hamed Taherdoost
Elsevier eBooks (2025), pp. 411-433
Closed Access
Lessons from Twenty Years of Quantum Image Processing
Fei Yan, Salvador E. Venegas-Andraca
ACM Transactions on Quantum Computing (2024)
Open Access | Times Cited: 2
Fei Yan, Salvador E. Venegas-Andraca
ACM Transactions on Quantum Computing (2024)
Open Access | Times Cited: 2
Robust and Secure Watermarking of Medical Images Using Möbius Transforms
Atheer Alrammahi, Hedieh Sajedi
(2024), pp. 208-214
Closed Access | Times Cited: 1
Atheer Alrammahi, Hedieh Sajedi
(2024), pp. 208-214
Closed Access | Times Cited: 1
Enhancing emergency medical response through IoT: A focus on security and privacy
Hui Miao
Applied and Computational Engineering (2024) Vol. 48, Iss. 1, pp. 219-224
Closed Access
Hui Miao
Applied and Computational Engineering (2024) Vol. 48, Iss. 1, pp. 219-224
Closed Access
Cyber Security Risk Assessment Methods for Smart Healthcare
Sumaira Memon, Shahzad Memon, Lachhman Das, et al.
(2024) Vol. 153, pp. 1-6
Closed Access
Sumaira Memon, Shahzad Memon, Lachhman Das, et al.
(2024) Vol. 153, pp. 1-6
Closed Access
Image information hiding scheme based on interweaving permutation
Zijian Zhen, Sili Luo, Qiang Wang, et al.
(2024) Vol. 2, pp. 248-248
Closed Access
Zijian Zhen, Sili Luo, Qiang Wang, et al.
(2024) Vol. 2, pp. 248-248
Closed Access
SECURE DICOM IMAGE COMMUNICATION: ADVANCES AND CHALLENGES
Saurabh Verma, Mukta Bhatele, Akhilesh A. Waoo
ShodhKosh Journal of Visual and Performing Arts (2024) Vol. 5, Iss. 1
Closed Access
Saurabh Verma, Mukta Bhatele, Akhilesh A. Waoo
ShodhKosh Journal of Visual and Performing Arts (2024) Vol. 5, Iss. 1
Closed Access
Enhancing security of medical images using code-based intermittent encryption and convolutional neural network
Prasanth Aruchamy, M Sundarrajan, Mani Deepak Choudhry, et al.
The Computer Journal (2024)
Closed Access
Prasanth Aruchamy, M Sundarrajan, Mani Deepak Choudhry, et al.
The Computer Journal (2024)
Closed Access
An Efficient Multilayer approach for Securing E-Healthcare Data in Cloud using Crypto – Stego Technique
N. Abirami, M. S. Anbarasi
Engineering World (2024) Vol. 6, pp. 128-135
Open Access
N. Abirami, M. S. Anbarasi
Engineering World (2024) Vol. 6, pp. 128-135
Open Access
Cybersecurity in Digital Transformation in Healthcare : A Systematic Literature Review (Preprint)
Abeer Alharbi, Ali Alkhalifah
(2024)
Closed Access
Abeer Alharbi, Ali Alkhalifah
(2024)
Closed Access
Efficient Data Compression Algorithms for Cloud-Based Medical Imaging
Himanshu Sharma, Sumit Pundir, A. Deepak, et al.
(2023), pp. 1-7
Closed Access | Times Cited: 1
Himanshu Sharma, Sumit Pundir, A. Deepak, et al.
(2023), pp. 1-7
Closed Access | Times Cited: 1