
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Exploring the future application of UAVs: Face image privacy protection scheme based on chaos and DNA cryptography
Heping Wen, Zhiyu Xie, Zhuxi Wu, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 36, Iss. 1, pp. 101871-101871
Open Access | Times Cited: 15
Heping Wen, Zhiyu Xie, Zhuxi Wu, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 36, Iss. 1, pp. 101871-101871
Open Access | Times Cited: 15
Showing 15 citing articles:
Cryptanalysis of an image encryption scheme using variant Hill cipher and chaos
Heping Wen, Yiting Lin, Lincheng Yang, et al.
Expert Systems with Applications (2024) Vol. 250, pp. 123748-123748
Closed Access | Times Cited: 24
Heping Wen, Yiting Lin, Lincheng Yang, et al.
Expert Systems with Applications (2024) Vol. 250, pp. 123748-123748
Closed Access | Times Cited: 24
Cryptanalyzing a bit-level image encryption algorithm based on chaotic maps
Heping Wen, Yiting Lin, Zhaoyang Feng
Engineering Science and Technology an International Journal (2024) Vol. 51, pp. 101634-101634
Open Access | Times Cited: 22
Heping Wen, Yiting Lin, Zhaoyang Feng
Engineering Science and Technology an International Journal (2024) Vol. 51, pp. 101634-101634
Open Access | Times Cited: 22
Frequency-domain image encryption based on IWT and 3D S-box
Heping Wen, Zhaoyang Feng, Chixin Bai, et al.
Physica Scripta (2024) Vol. 99, Iss. 5, pp. 055254-055254
Closed Access | Times Cited: 7
Heping Wen, Zhaoyang Feng, Chixin Bai, et al.
Physica Scripta (2024) Vol. 99, Iss. 5, pp. 055254-055254
Closed Access | Times Cited: 7
An Upper Bound for Locating Strings with High Probability Within Consecutive Bits of Pi
Víctor Manuel Silva-García, Manuel Alejandro Cardona-López, Rolando Flores-Carapia
Mathematics (2025) Vol. 13, Iss. 2, pp. 313-313
Open Access
Víctor Manuel Silva-García, Manuel Alejandro Cardona-López, Rolando Flores-Carapia
Mathematics (2025) Vol. 13, Iss. 2, pp. 313-313
Open Access
A novel multi-color image compression encryption algorithm based on the reconstruction coefficient matrix and DNA point mutation operation
Meng Tang, Guo Du, Yanping Lin
Expert Systems with Applications (2025) Vol. 270, pp. 126620-126620
Closed Access
Meng Tang, Guo Du, Yanping Lin
Expert Systems with Applications (2025) Vol. 270, pp. 126620-126620
Closed Access
Optimized Color Image Encryption Using Arnold Transform, URUK Chaotic Map and GWO Algorithm
Qutaiba K. Abed, Waleed A. Mahmoud Al‐Jawher
Journal Port Science Research (2024) Vol. 7, Iss. 3
Open Access | Times Cited: 3
Qutaiba K. Abed, Waleed A. Mahmoud Al‐Jawher
Journal Port Science Research (2024) Vol. 7, Iss. 3
Open Access | Times Cited: 3
Generation of Face Privacy-Protected Images Based on the Diffusion Model
Xingyi You, Xiaohu Zhao, Yue Wang, et al.
Entropy (2024) Vol. 26, Iss. 6, pp. 479-479
Open Access | Times Cited: 2
Xingyi You, Xiaohu Zhao, Yue Wang, et al.
Entropy (2024) Vol. 26, Iss. 6, pp. 479-479
Open Access | Times Cited: 2
New method of colour image encryption using triple chaotic maps
Khalid M. Hosny, Yasmin M. Elnabawy, Ahmed M. Elshewey, et al.
IET Image Processing (2024) Vol. 18, Iss. 12, pp. 3262-3276
Open Access | Times Cited: 2
Khalid M. Hosny, Yasmin M. Elnabawy, Ahmed M. Elshewey, et al.
IET Image Processing (2024) Vol. 18, Iss. 12, pp. 3262-3276
Open Access | Times Cited: 2
Color image encryption by piecewise function and elliptic curve over the Galois field $ {G}{F}\left({2}^{{n}}\right) $
Hafeez ur Rehman, Mohammad Mazyad Hazzazi, Tariq Shah, et al.
AIMS Mathematics (2024) Vol. 9, Iss. 3, pp. 5722-5745
Open Access | Times Cited: 1
Hafeez ur Rehman, Mohammad Mazyad Hazzazi, Tariq Shah, et al.
AIMS Mathematics (2024) Vol. 9, Iss. 3, pp. 5722-5745
Open Access | Times Cited: 1
Face privacy protection scheme by security-enhanced encryption structure and nonlinear dynamics
Zhiyu Xie, Yiting Lin, Tengyu Liu, et al.
iScience (2024) Vol. 27, Iss. 9, pp. 110768-110768
Open Access | Times Cited: 1
Zhiyu Xie, Yiting Lin, Tengyu Liu, et al.
iScience (2024) Vol. 27, Iss. 9, pp. 110768-110768
Open Access | Times Cited: 1
An efficient confidentiality scheme based on quadratic chaotic map and Fibonacci sequence
Majid Khan, Hafiz Muhammad Waseem
AIMS Mathematics (2024) Vol. 9, Iss. 10, pp. 27220-27246
Open Access | Times Cited: 1
Majid Khan, Hafiz Muhammad Waseem
AIMS Mathematics (2024) Vol. 9, Iss. 10, pp. 27220-27246
Open Access | Times Cited: 1
Dynamic feedback bit-level image privacy protection based on chaos and information hiding
Jinlong Zhang, Heping Wen
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access
Jinlong Zhang, Heping Wen
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access
Visual Privacy Protection Method Based on YOLOv8 and ControlNet
Kesong Li, Guanci Yang
(2024), pp. 1023-1029
Closed Access
Kesong Li, Guanci Yang
(2024), pp. 1023-1029
Closed Access
Secure image communication based on two-layer dynamic feedback encryption and DWT information hiding
Jinlong Zhang, Heping Wen
PLoS ONE (2024) Vol. 19, Iss. 8, pp. e0300228-e0300228
Open Access
Jinlong Zhang, Heping Wen
PLoS ONE (2024) Vol. 19, Iss. 8, pp. e0300228-e0300228
Open Access
Drones and Unmanned Aerial Vehicles Automation Using Reinforcement Learning
Jaskirat Kaur, Sudhakar Kumar, Sunil K. Singh, et al.
Advances in computational intelligence and robotics book series (2024), pp. 257-284
Closed Access
Jaskirat Kaur, Sudhakar Kumar, Sunil K. Singh, et al.
Advances in computational intelligence and robotics book series (2024), pp. 257-284
Closed Access