OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Boosting image watermarking authenticity spreading secrecy from counting‐based secret‐sharing
Adnan Gutub
CAAI Transactions on Intelligence Technology (2022) Vol. 8, Iss. 2, pp. 440-452
Open Access | Times Cited: 69

Showing 1-25 of 69 citing articles:

Ensemble-Learning Framework for Intrusion Detection to Enhance Internet of Things’ Devices Security
Yazeed Alotaibi, Mohammad Ilyas
Sensors (2023) Vol. 23, Iss. 12, pp. 5568-5568
Open Access | Times Cited: 40

A secure cryptosystem using DNA cryptography and DNA steganography for the cloud-based IoT infrastructure
Suyel Namasudra
Computers & Electrical Engineering (2022) Vol. 104, pp. 108426-108426
Closed Access | Times Cited: 44

Quantum Mayfly Optimization with Encoder-Decoder Driven LSTM Networks for Malware Detection and Classification Model
Omar A. Alzubi, Jafar A. Alzubi, Tareq Mahmod Alzubi, et al.
Mobile Networks and Applications (2023) Vol. 28, Iss. 2, pp. 795-807
Closed Access | Times Cited: 34

R 3—Rescale, Rotate, and Randomize: A Novel Image Cryptosystem Utilizing Chaotic and Hyper-Chaotic Systems
Mohamed Gabr, Yousef Korayem, Yen‐Lin Chen, et al.
IEEE Access (2023) Vol. 11, pp. 119284-119312
Open Access | Times Cited: 31

Digitalization of the Business Environment and Innovation Efficiency of Chinese ICT Firms
Jian Ding, Baoliu Liu, Jiaxin Wang, et al.
Journal of Organizational and End User Computing (2023) Vol. 35, Iss. 3, pp. 1-25
Open Access | Times Cited: 30

Lightweight and efficient privacy‐preserving mutual authentication scheme to secure Internet of Things‐based smart healthcare
Sangjukta Das, Suyel Namasudra
Transactions on Emerging Telecommunications Technologies (2023) Vol. 34, Iss. 11
Closed Access | Times Cited: 27

Securing IoT-Based Smart Healthcare Systems by Using Advanced Lightweight Privacy-Preserving Authentication Scheme
Sangjukta Das, Suyel Namasudra, Suman Deb, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 21, pp. 18486-18494
Closed Access | Times Cited: 26

A Novel Digital Signature Scheme for Advanced Asymmetric Encryption Techniques
Farid Lalem, Abdelkader Laouid, Mostefa Kara, et al.
Applied Sciences (2023) Vol. 13, Iss. 8, pp. 5172-5172
Open Access | Times Cited: 24

Impact of Using the Internet of Medical Things on e-Healthcare Performance: Blockchain Assist in Improving Smart Contract
Mounir El Khatib, Haitham M. Alzoubi, Samer Hamidi, et al.
ClinicoEconomics and Outcomes Research (2023) Vol. Volume 15, pp. 397-411
Open Access | Times Cited: 24

A new pseudorandom number generator based on chaos in digital filters for image encryption
Z. B. Madouri, Naima Hadj Said, A. Ali Pacha
Journal of Optics (2024)
Closed Access | Times Cited: 7

Achieving a Decentralized and Secure Cab Sharing System Using Blockchain Technology
Suyel Namasudra, Pratima Sharma
IEEE Transactions on Intelligent Transportation Systems (2022) Vol. 24, Iss. 12, pp. 15568-15577
Closed Access | Times Cited: 36

A Lightweight and Anonymous Mutual Authentication Scheme for Medical Big Data in Distributed Smart Healthcare Systems
Sangjukta Das, Suyel Namasudra
IEEE/ACM Transactions on Computational Biology and Bioinformatics (2022) Vol. 21, Iss. 4, pp. 1106-1116
Closed Access | Times Cited: 30

Enhancing Security of Medical Images Using Deep Learning, Chaotic Map, and Hash Table
Piyush Kumar, Mobashshirur Rahman, Suyel Namasudra, et al.
Mobile Networks and Applications (2023)
Closed Access | Times Cited: 21

Reconfigurable color medical image encryptor using hardware accelerated Chao(S)-box triplets
Vinoth Raj, Siva Janakiraman, Rengarajan Amirtharajan
Journal of Real-Time Image Processing (2023) Vol. 20, Iss. 2
Closed Access | Times Cited: 17

An image encryption scheme based on a modified AES algorithm by using a variable S-box
A. Hadj Brahim, A. Ali Pacha, Naima Hadj Said
Journal of Optics (2023) Vol. 53, Iss. 2, pp. 1170-1185
Closed Access | Times Cited: 17

Latest Trends in Deep Learning Techniques for Image Steganography
Vijay Kumar, Sahil Sharma, Chandan Kumar, et al.
International Journal of Digital Crime and Forensics (2023) Vol. 15, Iss. 1, pp. 1-14
Open Access | Times Cited: 16

High performance image steganography integrating IWT and Hamming code within secret sharing
Zahra Saeidi, Ameneh Yazdi, Samaneh Mashhadi, et al.
IET Image Processing (2023) Vol. 18, Iss. 1, pp. 129-139
Open Access | Times Cited: 16

Improve the Security of Industrial Control System: A Fine-Grained Classification Method for DoS Attacks on Modbus/TCP
Hao Zhang, Yuandong Min, Sannyuya Liu, et al.
Mobile Networks and Applications (2023) Vol. 28, Iss. 2, pp. 839-852
Closed Access | Times Cited: 13

Hybrid Metaheuristics With Machine Learning Based Botnet Detection in Cloud Assisted Internet of Things Environment
Latifah Almuqren, Hamed Alqahtani, Sumayh S. Aljameel, et al.
IEEE Access (2023) Vol. 11, pp. 115668-115676
Open Access | Times Cited: 12

Single-Objective Particle Swarm Optimization-Based Chaotic Image Encryption Scheme
Jingya Wang, Xianhua Song, Ahmed A. Abd El‐Latif
Electronics (2022) Vol. 11, Iss. 16, pp. 2628-2628
Open Access | Times Cited: 21

Dynamic smart random preference for higher medical image confidentiality
Adnan Gutub
Journal of Engineering Research (2022)
Open Access | Times Cited: 19

Is blind image steganalysis practical using feature-based classification?
Ahd Aljarf, Haneen Zamzami, Adnan Gutub
Multimedia Tools and Applications (2023) Vol. 83, Iss. 2, pp. 4579-4612
Closed Access | Times Cited: 11

Efficient Robust Reversible Watermarking Based on ZMs and Integer Wavelet Transform
Guangyong Gao, Min Wang, Bin Wu
IEEE Transactions on Industrial Informatics (2023) Vol. 20, Iss. 3, pp. 4115-4123
Closed Access | Times Cited: 11

A lightweight intrusion detection system for internet of vehicles based on transfer learning and MobileNetV2 with hyper-parameter optimization
Yingqing Wang, Guihe Qin, Mi Zou, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 8, pp. 22347-22369
Closed Access | Times Cited: 10

Page 1 - Next Page

Scroll to top