OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

5G based Blockchain network for authentic and ethical keyword search engine
M. Poongodi, Mohit Malviya, Mounir Hamdi, et al.
IET Communications (2021) Vol. 16, Iss. 5, pp. 442-448
Closed Access | Times Cited: 73

Showing 1-25 of 73 citing articles:

A Novel Secured Multi-Access Edge Computing based VANET with Neuro fuzzy systems based Blockchain Framework
M. Poongodi, Sami Bourouis, Ahmed Najat Ahmed, et al.
Computer Communications (2022) Vol. 192, pp. 48-56
Closed Access | Times Cited: 93

Efficient Prioritization and Processor Selection Schemes for HEFT Algorithm: A Makespan Optimizer for Task Scheduling in Cloud Environment
Sachi Gupta, Sailesh Iyer, Gaurav Agarwal, et al.
Electronics (2022) Vol. 11, Iss. 16, pp. 2557-2557
Open Access | Times Cited: 72

Image Acquisition, Preprocessing and Classification of Citrus Fruit Diseases: A Systematic Literature Review
Poonam Dhiman, Amandeep Kaur, V. R. Balasaraswathi, et al.
Sustainability (2023) Vol. 15, Iss. 12, pp. 9643-9643
Open Access | Times Cited: 57

A Novel Security Mechanism of 6G for IMD using Authentication and Key Agreement Scheme
M. Poongodi, Mounir Hamdi, Jiechao Gao, et al.
2022 IEEE Globecom Workshops (GC Wkshps) (2021), pp. 1-6
Closed Access | Times Cited: 64

SVM‐based generative adverserial networks for federated learning and edge computing attack model and outpoising
Poongodi Manoharan, Ranjan Walia, Celestine Iwendi, et al.
Expert Systems (2022) Vol. 40, Iss. 5
Closed Access | Times Cited: 58

Autonomous Transaction Model for E-Commerce Management Using Blockchain Technology
Satheeshkumar Sekar, Annamalai Solayappan, J. Srimathi, et al.
International Journal of Information Technology and Web Engineering (2022) Vol. 17, Iss. 1, pp. 1-14
Open Access | Times Cited: 47

An imperative role of 6G communication with perspective of industry 4.0: Challenges and research directions
Yamini Ghildiyal, Rajesh Singh, Ahmed Alkhayyat, et al.
Sustainable Energy Technologies and Assessments (2023) Vol. 56, pp. 103047-103047
Closed Access | Times Cited: 35

Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment
Surjeet Dalal, Poongodi Manoharan, Umesh Kumar Lilhore, et al.
Journal of Cloud Computing Advances Systems and Applications (2023) Vol. 12, Iss. 1
Open Access | Times Cited: 28

Social Network Analysis for Precise Friend Suggestion for Twitter by Associating Multiple Networks Using ML
Dharmendra Kumar Singh, N Ch Sri Nithya, L. Rahunathan, et al.
International Journal of Information Technology and Web Engineering (2022) Vol. 17, Iss. 1, pp. 1-11
Open Access | Times Cited: 27

An Efficient Approach for Object Detection using Deep Learning
Nita Patil, S.M. Patil, C. M. Raut, et al.
Journal of Pharmaceutical Negative Results (2022), pp. 563-572
Open Access | Times Cited: 25

Short range correlation transformer for occluded person re-identification
Yun-Bin Zhao, Songhao Zhu, Dongsheng Wang, et al.
Neural Computing and Applications (2022) Vol. 34, Iss. 20, pp. 17633-17645
Closed Access | Times Cited: 24

A novel hermit crab optimization algorithm
Jia Guo, Guoyuan Zhou, Ke Yan, et al.
Scientific Reports (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 14

Social Network User Profiling With Multilayer Semantic Modeling Using Ego Network
Tamil Selvi P., Kishore Balasubramaniam, S. Vidhya, et al.
International Journal of Information Technology and Web Engineering (2022) Vol. 17, Iss. 1, pp. 1-14
Open Access | Times Cited: 21

Enhanced Machine learning algorithms Lightweight Ensemble Classification of Normal versus Leukemic Cel
K. SRIDHAR, Ajay Reddy Yeruva, P. N. Renjith, et al.
Journal of Pharmaceutical Negative Results (2022), pp. 496-505
Open Access | Times Cited: 21

A Secure Environment Using a New Lightweight AES Encryption Algorithm for E-Commerce Websites
Farah Tawfiq Abdul Hussien, Abdul Monem S. Rahma, Hala Bahjat Abdul Wahab
Security and Communication Networks (2021) Vol. 2021, pp. 1-15
Open Access | Times Cited: 23

Storage Matched Systems for Single-Click Photo Recognition Using CNN
Sunil Kumar, R. Shantha Mary Joshitta, Deepak Dasaratha Rao, et al.
(2023), pp. 1-7
Closed Access | Times Cited: 7

Data Integrity Time Optimization of a Blockchain IoT Smart Home Network Using Different Consensus and Hash Algorithms
Ammar Riadh Kairaldeen, Nor Fadzilah Abdullah, Asma Abu-Samah, et al.
Wireless Communications and Mobile Computing (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 17

Enabling machine learning‐based side‐chaining for improving QoS in blockchain‐powered IoT networks
Rupali Vairagade, S. H. Brahmananda
Transactions on Emerging Telecommunications Technologies (2021) Vol. 33, Iss. 4
Closed Access | Times Cited: 13

Zero-Trust-Based Protection Scheme for Users in Internet of Vehicles
Letian Fang, Chunshang Wu, Yukun Kang, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-17
Open Access | Times Cited: 9

An efficient remote user authentication with key agreement procedure based on convolution-Chebyshev chaotic maps using biometric
Chandrashekhar Meshram, Rabha W. Ibrahim, Sarita Gajbhiye Meshram, et al.
The Journal of Supercomputing (2022) Vol. 78, Iss. 10, pp. 12792-12814
Closed Access | Times Cited: 8

Facial emotion recognition using geometrical features based deep learning techniques
Javaid Iqbal, M. Senthil Kumar, Geetishree Mishra, et al.
International Journal of Computers Communications & Control (2023) Vol. 18, Iss. 4
Open Access | Times Cited: 4

A blockchain-based security system with light cryptography for user authentication security
Imen Hagui, Amina Msolli, Noura Ben Henda, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 17, pp. 52451-52480
Closed Access | Times Cited: 4

Secure computation protocol of Chebyshev distance under the malicious model
Xin Liu, Weitong Chen, Lu Peng, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 1

Intelligent scaling for 6G IoE services for resource provisioning
Abdullah Alharbi, Hashem Alyami, M. Poongodi, et al.
PeerJ Computer Science (2021) Vol. 7, pp. e755-e755
Open Access | Times Cited: 6

Extractive summarization using concept‐space and keyword phrase
Parminder Pal Singh Bedi, Manju Bala, Kapil Sharma
Expert Systems (2022) Vol. 39, Iss. 10
Closed Access | Times Cited: 4

Page 1 - Next Page

Scroll to top