
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Multi-agent DRL for joint completion delay and energy consumption with queuing theory in MEC-based IIoT
Guowen Wu, Zhiqi Xu, Hong Zhang, et al.
Journal of Parallel and Distributed Computing (2023) Vol. 176, pp. 80-94
Closed Access | Times Cited: 53
Guowen Wu, Zhiqi Xu, Hong Zhang, et al.
Journal of Parallel and Distributed Computing (2023) Vol. 176, pp. 80-94
Closed Access | Times Cited: 53
Showing 1-25 of 53 citing articles:
Computation Offloading Method Using Stochastic Games for Software-Defined-Network-Based Multiagent Mobile Edge Computing
Guowen Wu, Hui Wang, Hong Zhang, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 20, pp. 17620-17634
Closed Access | Times Cited: 53
Guowen Wu, Hui Wang, Hong Zhang, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 20, pp. 17620-17634
Closed Access | Times Cited: 53
Optimal privacy preservation strategies with signaling Q-learning for edge-computing-based IoT resource grant systems
Shigen Shen, Xiaoping Wu, Panjun Sun, et al.
Expert Systems with Applications (2023) Vol. 225, pp. 120192-120192
Closed Access | Times Cited: 52
Shigen Shen, Xiaoping Wu, Panjun Sun, et al.
Expert Systems with Applications (2023) Vol. 225, pp. 120192-120192
Closed Access | Times Cited: 52
Joint Differential Game and Double Deep Q-Networks for Suppressing Malware Spread in Industrial Internet of Things
Shigen Shen, Lanlan Xie, Yanchun Zhang, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 18, pp. 5302-5315
Closed Access | Times Cited: 46
Shigen Shen, Lanlan Xie, Yanchun Zhang, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 18, pp. 5302-5315
Closed Access | Times Cited: 46
Privacy-preserving offloading scheme in multi-access mobile edge computing based on MADRL
Guowen Wu, Xihang Chen, Zhengjun Gao, et al.
Journal of Parallel and Distributed Computing (2023) Vol. 183, pp. 104775-104775
Closed Access | Times Cited: 41
Guowen Wu, Xihang Chen, Zhengjun Gao, et al.
Journal of Parallel and Distributed Computing (2023) Vol. 183, pp. 104775-104775
Closed Access | Times Cited: 41
Queue stability and dynamic throughput maximization in multi-agent heterogeneous wireless networks
Ting Yang, Jiabao Sun, Amin Mohajer
Wireless Networks (2024) Vol. 30, Iss. 5, pp. 3229-3255
Closed Access | Times Cited: 32
Ting Yang, Jiabao Sun, Amin Mohajer
Wireless Networks (2024) Vol. 30, Iss. 5, pp. 3229-3255
Closed Access | Times Cited: 32
Combining Lyapunov Optimization With Actor–Critic Networks for Privacy-Aware IIoT Computation Offloading
Guowen Wu, Xihang Chen, Yizhou Shen, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 10, pp. 17437-17452
Closed Access | Times Cited: 23
Guowen Wu, Xihang Chen, Yizhou Shen, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 10, pp. 17437-17452
Closed Access | Times Cited: 23
A Survey of IoT Privacy Security: Architecture, Technology, Challenges, and Trends
Panjun Sun, Shigen Shen, Yi Wan, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 21, pp. 34567-34591
Closed Access | Times Cited: 23
Panjun Sun, Shigen Shen, Yi Wan, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 21, pp. 34567-34591
Closed Access | Times Cited: 23
Deep Q-network-based heuristic intrusion detection against edge-based SIoT zero-day attacks
Shigen Shen, Chenpeng Cai, Zhenwei Li, et al.
Applied Soft Computing (2023) Vol. 150, pp. 111080-111080
Closed Access | Times Cited: 23
Shigen Shen, Chenpeng Cai, Zhenwei Li, et al.
Applied Soft Computing (2023) Vol. 150, pp. 111080-111080
Closed Access | Times Cited: 23
SIHQR model with time delay for worm spread analysis in IIoT-enabled PLC network
Guowen Wu, Yanchun Zhang, Hong Zhang, et al.
Ad Hoc Networks (2024) Vol. 160, pp. 103504-103504
Closed Access | Times Cited: 7
Guowen Wu, Yanchun Zhang, Hong Zhang, et al.
Ad Hoc Networks (2024) Vol. 160, pp. 103504-103504
Closed Access | Times Cited: 7
Multitask Computation Offloading Based on Evolutionary Multiobjective Optimization in Industrial Internet of Things
Zhengyi Chai, Ying-Jie Zhao, Ya-Lun Li
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 9, pp. 15894-15908
Closed Access | Times Cited: 6
Zhengyi Chai, Ying-Jie Zhao, Ya-Lun Li
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 9, pp. 15894-15908
Closed Access | Times Cited: 6
MFGD3QN: Enhancing Edge Intelligence Defense against DDoS with Mean-Field Games and Dueling Double Deep Q-network
Shigen Shen, Chenpeng Cai, Yizhou Shen, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 13, pp. 23931-23945
Closed Access | Times Cited: 6
Shigen Shen, Chenpeng Cai, Yizhou Shen, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 13, pp. 23931-23945
Closed Access | Times Cited: 6
A comprehensive review on internet of things task offloading in multi-access edge computing
Wang Dayong, Kamalrulnizam Bin Abu Bakar, Babangida Isyaku, et al.
Heliyon (2024) Vol. 10, Iss. 9, pp. e29916-e29916
Open Access | Times Cited: 5
Wang Dayong, Kamalrulnizam Bin Abu Bakar, Babangida Isyaku, et al.
Heliyon (2024) Vol. 10, Iss. 9, pp. e29916-e29916
Open Access | Times Cited: 5
Vehicle Edge Computing Task Offloading Strategy Based on Multi-Agent Deep Reinforcement Learning
Jin Bo, Xu Zhao
Journal of Grid Computing (2025) Vol. 23, Iss. 2
Closed Access
Jin Bo, Xu Zhao
Journal of Grid Computing (2025) Vol. 23, Iss. 2
Closed Access
Self-Learning Adaptive Power Management Scheme for Energy-Efficient IoT-MEC Systems Using Soft Actor-Critic Algorithm
Amir M. Rahmani, Amir Haider, Komeil Moghaddasi, et al.
Internet of Things (2025), pp. 101587-101587
Closed Access
Amir M. Rahmani, Amir Haider, Komeil Moghaddasi, et al.
Internet of Things (2025), pp. 101587-101587
Closed Access
Deep Q-Network-Based Open-Set Intrusion Detection Solution for Industrial Internet of Things
Shoujian Yu, R. Zhai, Yizhou Shen, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 7, pp. 12536-12550
Closed Access | Times Cited: 14
Shoujian Yu, R. Zhai, Yizhou Shen, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 7, pp. 12536-12550
Closed Access | Times Cited: 14
Deep reinforcement learning‐based resource allocation in multi‐access edge computing
Mohsen Khani, Mohammad Mohsen Sadr, Shahram Jamali
Concurrency and Computation Practice and Experience (2023) Vol. 36, Iss. 15
Closed Access | Times Cited: 12
Mohsen Khani, Mohammad Mohsen Sadr, Shahram Jamali
Concurrency and Computation Practice and Experience (2023) Vol. 36, Iss. 15
Closed Access | Times Cited: 12
Federated Learning on Internet of Things: Extensive and Systematic Review
Meenakshi Aggarwal, Vikas Khullar, Sunita Rani, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 2, pp. 1795-1834
Open Access | Times Cited: 4
Meenakshi Aggarwal, Vikas Khullar, Sunita Rani, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 2, pp. 1795-1834
Open Access | Times Cited: 4
Game-theoretic analytics for privacy preservation in Internet of Things networks: A survey
Yizhou Shen, Carlton Shepherd, Chuadhry Mujeeb Ahmed, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 133, pp. 108449-108449
Closed Access | Times Cited: 3
Yizhou Shen, Carlton Shepherd, Chuadhry Mujeeb Ahmed, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 133, pp. 108449-108449
Closed Access | Times Cited: 3
Deep Reinforcement Learning techniques for dynamic task offloading in the 5G edge-cloud continuum
G. Parra Nieto, Idoia de la Iglesia, Unai López-Novoa, et al.
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 3
G. Parra Nieto, Idoia de la Iglesia, Unai López-Novoa, et al.
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 3
Novel Intrusion Detection Strategies With Optimal Hyper Parameters for Industrial Internet of Things Based On Stochastic Games and Double Deep Q-Networks
Shoujian Yu, X. H. Wang, Yizhou Shen, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 17, pp. 29132-29145
Closed Access | Times Cited: 3
Shoujian Yu, X. H. Wang, Yizhou Shen, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 17, pp. 29132-29145
Closed Access | Times Cited: 3
Time-continuous computing offloading algorithm with user fairness guarantee
Hao Hao, Wei Ding, Weidong Zhang
Journal of Network and Computer Applications (2024) Vol. 223, pp. 103826-103826
Closed Access | Times Cited: 2
Hao Hao, Wei Ding, Weidong Zhang
Journal of Network and Computer Applications (2024) Vol. 223, pp. 103826-103826
Closed Access | Times Cited: 2
QoS Aware Virtual Network Embedding in Space-Air-Ground-Ocean Integrated Network
Yi Zhang, Peiying Zhang, Chunxiao Jiang, et al.
IEEE Transactions on Services Computing (2024) Vol. 17, Iss. 4, pp. 1712-1723
Closed Access | Times Cited: 2
Yi Zhang, Peiying Zhang, Chunxiao Jiang, et al.
IEEE Transactions on Services Computing (2024) Vol. 17, Iss. 4, pp. 1712-1723
Closed Access | Times Cited: 2
Comparative DQN-Improved Algorithms for Stochastic Games-Based Automated Edge Intelligence-Enabled IoT Malware Spread-Suppression Strategies
Yizhou Shen, Carlton Shepherd, Chuadhry Mujeeb Ahmed, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 12, pp. 22550-22561
Open Access | Times Cited: 2
Yizhou Shen, Carlton Shepherd, Chuadhry Mujeeb Ahmed, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 12, pp. 22550-22561
Open Access | Times Cited: 2
SCIRD: Revealing Infection of Malicious Software in Edge Computing-Enabled IoT Networks
J. Ye, Wen Cheng, Xiaolong Liu, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 2, pp. 2743-2769
Open Access | Times Cited: 2
J. Ye, Wen Cheng, Xiaolong Liu, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 2, pp. 2743-2769
Open Access | Times Cited: 2
Multi-agent DRL for edge computing: A real-time proportional compute offloading
Kunkun Jia, Hui Xia, Rui Zhang, et al.
Computer Networks (2024) Vol. 252, pp. 110665-110665
Closed Access | Times Cited: 2
Kunkun Jia, Hui Xia, Rui Zhang, et al.
Computer Networks (2024) Vol. 252, pp. 110665-110665
Closed Access | Times Cited: 2