OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A game-based deep reinforcement learning approach for energy-efficient computation in MEC systems
Miaojiang Chen, Wei Liu, Tian Wang, et al.
Knowledge-Based Systems (2021) Vol. 235, pp. 107660-107660
Closed Access | Times Cited: 85

Showing 1-25 of 85 citing articles:

A comprehensive study of DDoS attacks over IoT network and their countermeasures
Pooja Kumari, Ankit Kumar Jain
Computers & Security (2023) Vol. 127, pp. 103096-103096
Closed Access | Times Cited: 121

Computation Offloading Method Using Stochastic Games for Software-Defined-Network-Based Multiagent Mobile Edge Computing
Guowen Wu, Hui Wang, Hong Zhang, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 20, pp. 17620-17634
Closed Access | Times Cited: 54

Communication Technologies for Interoperable Smart Microgrids in Urban Energy Community: A Broad Review of the State of the Art, Challenges, and Research Perspectives
G. Pradeep Reddy, Y. V. Pavan Kumar, M. Kalyan Chakravarthi
Sensors (2022) Vol. 22, Iss. 15, pp. 5881-5881
Open Access | Times Cited: 44

A QoS-Aware Technique for Computation Offloading in IoT-Edge Platforms Using a Convolutional Neural Network and Markov Decision Process
Arash Heidari, Mohammad Ali Jabraeil Jamali, Nima Jafari Navimipour, et al.
IT Professional (2023) Vol. 25, Iss. 1, pp. 24-39
Closed Access | Times Cited: 39

Cloud-Native Workload Orchestration at the Edge: A Deployment Review and Future Directions
Rafael Vaño, Ignacio Lacalle, Piotr Sowiński, et al.
Sensors (2023) Vol. 23, Iss. 4, pp. 2215-2215
Open Access | Times Cited: 30

Fused Weighted Federated Deep Extreme Machine Learning Based on Intelligent Lung Cancer Disease Prediction Model for Healthcare 5.0
Sagheer Abbas, Ghassan F. Issa, Areej Fatima, et al.
International Journal of Intelligent Systems (2023) Vol. 2023, pp. 1-14
Open Access | Times Cited: 27

Optimizing task offloading and resource allocation in edge-cloud networks: a DRL approach
Ihsan Ullah, Hyun-Kyo Lim, Yeong-Jun Seok, et al.
Journal of Cloud Computing Advances Systems and Applications (2023) Vol. 12, Iss. 1
Open Access | Times Cited: 23

A novel deep policy gradient action quantization for trusted collaborative computation in intelligent vehicle networks
Miaojiang Chen, Meng Yi, Mingfeng Huang, et al.
Expert Systems with Applications (2023) Vol. 221, pp. 119743-119743
Closed Access | Times Cited: 22

Stackelberg-Game-Based Intelligent Offloading Incentive Mechanism for a Multi-UAV-Assisted Mobile-Edge Computing System
Maoli Wang, Lu Zhang, Peng Gao, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 17, pp. 15679-15689
Closed Access | Times Cited: 22

Credit and quality intelligent learning based multi-armed bandit scheme for unknown worker selection in multimedia MCS
Jianheng Tang, Feijiang Han, Kejia Fan, et al.
Information Sciences (2023) Vol. 647, pp. 119444-119444
Closed Access | Times Cited: 22

GPDS: A multi-agent deep reinforcement learning game for anti-jamming secure computing in MEC network
Miaojiang Chen, Wei Liu, Ning Zhang, et al.
Expert Systems with Applications (2022) Vol. 210, pp. 118394-118394
Closed Access | Times Cited: 34

Artificial Intelligence-Enabled Game-Based Learning and Quality of Experience: A Novel and Secure Framework (B-AIQoE)
Asif Ali Wagan, Abdullah Ayub Khan, Yen‐Lin Chen, et al.
Sustainability (2023) Vol. 15, Iss. 6, pp. 5362-5362
Open Access | Times Cited: 21

A traceable and revocable decentralized multi-authority privacy protection scheme for social metaverse
Shaobo Zhang, Yuechao Wang, Entao Luo, et al.
Journal of Systems Architecture (2023) Vol. 140, pp. 102899-102899
Closed Access | Times Cited: 18

Energy efficient resource allocation method for 5G access network based on reinforcement learning algorithm
Shasha Zhao
Sustainable Energy Technologies and Assessments (2023) Vol. 56, pp. 103020-103020
Closed Access | Times Cited: 17

MADRLOM: A Computation offloading mechanism for software-defined cloud-edge computing power network
Yinzhi Guo, Xiaolong Xu, Fu Xiao
Computer Networks (2024) Vol. 245, pp. 110352-110352
Closed Access | Times Cited: 6

CCGN: Centralized collaborative graphical transformer multi-agent reinforcement learning for multi-intersection signal free-corridor
Hamza Mukhtar, A. Afzal, Sultan Alahmari, et al.
Neural Networks (2023) Vol. 166, pp. 396-409
Open Access | Times Cited: 13

A Review of the NIST Lightweight Cryptography Finalists and Their Fault Analyses
H.M.P.S. Madushan, Iftekhar Salam, Janaka Alawatugoda
Electronics (2022) Vol. 11, Iss. 24, pp. 4199-4199
Open Access | Times Cited: 21

A DRL-Driven Intelligent Joint Optimization Strategy for Computation Offloading and Resource Allocation in Ubiquitous Edge IoT Systems
Meng Yi, Peng Yang, Miaojiang Chen, et al.
IEEE Transactions on Emerging Topics in Computational Intelligence (2022) Vol. 7, Iss. 1, pp. 39-54
Closed Access | Times Cited: 20

Task Scheduling for Distributed AUV Network Target Hunting and Searching: An Energy-Efficient AoI-Aware DMAPPO Approach
Ziyuan Wang, Jun Du, Chunxiao Jiang, et al.
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 9, pp. 8271-8285
Closed Access | Times Cited: 20

MMDS: A secure and verifiable multimedia data search scheme for cloud-assisted edge computing
Shiwen Zhang, Jiayi He, Wei Liang, et al.
Future Generation Computer Systems (2023) Vol. 151, pp. 32-44
Closed Access | Times Cited: 12

Timely reliability modeling and evaluation of wireless sensor networks with adaptive N-policy sleep scheduling
Changzhen Zhang, Jun Yang, Ning Wang
Reliability Engineering & System Safety (2023) Vol. 235, pp. 109270-109270
Closed Access | Times Cited: 11

Protocol-Specific and Sensor Network-Inherited Attack Detection in IoT Using Machine Learning
F. Zahra, N. Z. Jhanjhi, Navid Ali Khan, et al.
Applied Sciences (2022) Vol. 12, Iss. 22, pp. 11598-11598
Open Access | Times Cited: 17

Computing Offloading With Fairness Guarantee: A Deep Reinforcement Learning Method
Hao Hao, Changqiao Xu, Wei Zhang, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2023) Vol. 33, Iss. 10, pp. 6117-6130
Open Access | Times Cited: 10

ALPS: Achieving accuracy-aware location privacy service via assisted regions
Shaobo Zhang, Tao Guo, Qin Liu, et al.
Future Generation Computer Systems (2023) Vol. 145, pp. 189-199
Closed Access | Times Cited: 10

Page 1 - Next Page

Scroll to top