OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Using Granule to Search Privacy Preserving Voice in Home IoT Systems
Wei Li, Yumin Chen, Huosheng Hu, et al.
IEEE Access (2020) Vol. 8, pp. 31957-31969
Open Access | Times Cited: 13

Showing 13 citing articles:

On the Security and Privacy Challenges of Virtual Assistants
Tom Bolton, Tooska Dargahi, Sana Belguith, et al.
Sensors (2021) Vol. 21, Iss. 7, pp. 2312-2312
Open Access | Times Cited: 78

Privacy-Preservation Techniques for IoT Devices: A Systematic Mapping Study
Damiano Torre, Anitha Chennamaneni, Alex R. Rodriguez
IEEE Access (2023) Vol. 11, pp. 16323-16345
Open Access | Times Cited: 10

Multilevel Fine Fingerprint Authentication Method for Key Operating Equipment Identification in Cyber-Physical Systems
Yang Li, Chenglin Wen, Tao Wen
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 2, pp. 1217-1226
Closed Access | Times Cited: 11

Voice assistants in private households: a conceptual framework for future research in an interdisciplinary field
Bettina Minder, Patricia Wolf, Matthias Baldauf, et al.
Humanities and Social Sciences Communications (2023) Vol. 10, Iss. 1
Open Access | Times Cited: 6

Searchable encryption over encrypted speech retrieval scheme in cloud storage
Qiuyu Zhang, Minrui Fu, Zhenyu Zhao, et al.
Journal of Information Security and Applications (2023) Vol. 76, pp. 103542-103542
Closed Access | Times Cited: 4

Secure speech retrieval method using deep hashing and CKKS fully homomorphic encryption
Qiuyu Zhang, Yong-wang Wen, Yibo Huang, et al.
Multimedia Tools and Applications (2024) Vol. 83, Iss. 26, pp. 67469-67500
Closed Access | Times Cited: 1

Random Fuzzy Granular Decision Tree
Wei Li, Xiaoyu Ma, Yumin Chen, et al.
Mathematical Problems in Engineering (2021) Vol. 2021, pp. 1-17
Open Access | Times Cited: 8

A Survey on Privacy Preservation in Fog-Enabled Internet of Things
Kinza Sarwar, Sira Yongchareon, Jian Yu, et al.
ACM Computing Surveys (2021) Vol. 55, Iss. 1, pp. 1-39
Closed Access | Times Cited: 8

Encrypted Speech Retrieval Scheme Based on Multiuser Searchable Encryption in Cloud Storage
Qiuyu Zhang, Minrui Fu, Yibo Huang, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-14
Open Access | Times Cited: 5

Random Fuzzy Clustering Granular Hyperplane Classifier
Wei Li, Kaiqiang Zhang, Yumin Chen, et al.
IEEE Access (2020) Vol. 8, pp. 228767-228778
Open Access | Times Cited: 5

Fuzzy Granular Hyperplane Classifiers
Wei Li, Zhongnan Wei, Yumin Chen, et al.
IEEE Access (2020) Vol. 8, pp. 112066-112077
Open Access | Times Cited: 3

Fuzzy Granule Manifold Alignment Preserving Local Topology
Wei Li, Jianwu Xue, Yumin Chen, et al.
IEEE Access (2020) Vol. 8, pp. 178695-178705
Open Access | Times Cited: 2

Multi-User and multi-keyword verifiable encrypted speech retrieval method based on blockchain
Fang-Peng Li, Qiuyu Zhang, Yibo Huang, et al.
Research Square (Research Square) (2023)
Open Access

Page 1

Scroll to top