
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Quadratic Function Chaotic System and its Application on Digital Image Encryption
Hongfeng Guo, Xin Zhang, Xinyao Zhao, et al.
IEEE Access (2020) Vol. 8, pp. 55540-55549
Open Access | Times Cited: 20
Hongfeng Guo, Xin Zhang, Xinyao Zhao, et al.
IEEE Access (2020) Vol. 8, pp. 55540-55549
Open Access | Times Cited: 20
Showing 20 citing articles:
Text Encryption: Hybrid cryptographic method using Vigenere and Hill Ciphers
Hamza Touil, Nabil El Akkad, Khalid Satori
(2020), pp. 1-6
Closed Access | Times Cited: 34
Hamza Touil, Nabil El Akkad, Khalid Satori
(2020), pp. 1-6
Closed Access | Times Cited: 34
A Gray Image Encryption Technique Using the Concept of Water Waves, Chaos and Hash Function
Amnah Firdous, Aqeel ur Rehman, Malik Muhammad Saad Missen
IEEE Access (2021) Vol. 9, pp. 11675-11693
Open Access | Times Cited: 30
Amnah Firdous, Aqeel ur Rehman, Malik Muhammad Saad Missen
IEEE Access (2021) Vol. 9, pp. 11675-11693
Open Access | Times Cited: 30
SIEA: Secure Image Encryption Algorithm Based on Chaotic Systems Optimization Algorithms and PUFs
Aina’u Shehu Muhammad, Fatih Özkaynak
Symmetry (2021) Vol. 13, Iss. 5, pp. 824-824
Open Access | Times Cited: 29
Aina’u Shehu Muhammad, Fatih Özkaynak
Symmetry (2021) Vol. 13, Iss. 5, pp. 824-824
Open Access | Times Cited: 29
A chaotic image encryption scheme based on multi-directional confusion and diffusion operations
Muhammad Hussain, Nadeem Iqbal, Zia Bashir
Journal of Information Security and Applications (2022) Vol. 70, pp. 103347-103347
Closed Access | Times Cited: 13
Muhammad Hussain, Nadeem Iqbal, Zia Bashir
Journal of Information Security and Applications (2022) Vol. 70, pp. 103347-103347
Closed Access | Times Cited: 13
An efficient grayscale image encryption scheme based on variable length row-column swapping operations
Nadeem Iqbal, Muhammad Hanif
Multimedia Tools and Applications (2021) Vol. 80, Iss. 30, pp. 36305-36339
Closed Access | Times Cited: 13
Nadeem Iqbal, Muhammad Hanif
Multimedia Tools and Applications (2021) Vol. 80, Iss. 30, pp. 36305-36339
Closed Access | Times Cited: 13
A novel randomized bit-level two-dimensional hyperchaotic image encryption algorithm
Ali Shakiba
Multimedia Tools and Applications (2020) Vol. 79, Iss. 43-44, pp. 32575-32605
Closed Access | Times Cited: 14
Ali Shakiba
Multimedia Tools and Applications (2020) Vol. 79, Iss. 43-44, pp. 32575-32605
Closed Access | Times Cited: 14
Leveraging on Synthetic Data Generation Techniques to Train Machine Learning Models for Tenaga Nasional Berhad Stock Price Movement Prediction
Nur Aliah Syahmina Mohd, Nor Hapiza Mohd Ariffin, Ruhaila Maskat
The International Arab Journal of Information Technology (2024) Vol. 21, Iss. 3
Open Access | Times Cited: 1
Nur Aliah Syahmina Mohd, Nor Hapiza Mohd Ariffin, Ruhaila Maskat
The International Arab Journal of Information Technology (2024) Vol. 21, Iss. 3
Open Access | Times Cited: 1
Performance Analysis of a Lightweight Robust Chaotic Image Re-encryption Scheme for 5G Heterogeneous Networks
Ajay K. Kakkar, Maninder Lal Singh
Wireless Personal Communications (2023) Vol. 129, Iss. 4, pp. 2607-2631
Closed Access | Times Cited: 2
Ajay K. Kakkar, Maninder Lal Singh
Wireless Personal Communications (2023) Vol. 129, Iss. 4, pp. 2607-2631
Closed Access | Times Cited: 2
Perturbed Chaotic Map with Varying Number of Iterations and Application in Image Encryption
Thang Manh Hoang
(2021)
Closed Access | Times Cited: 5
Thang Manh Hoang
(2021)
Closed Access | Times Cited: 5
Securing Sensitive Data Through Corner Filters, Chaotic Maps and LSB Embedding
Wassim Alexan, Eyad Mamdouh, Abdelrahman Elkhateeb, et al.
(2021), pp. 359-364
Closed Access | Times Cited: 5
Wassim Alexan, Eyad Mamdouh, Abdelrahman Elkhateeb, et al.
(2021), pp. 359-364
Closed Access | Times Cited: 5
Cryptographic Algorithm Using Newton-Raphson Method and General Bischi-Naimzadah Duopoly System
A. A. Karawia
Entropy (2020) Vol. 23, Iss. 1, pp. 57-57
Open Access | Times Cited: 4
A. A. Karawia
Entropy (2020) Vol. 23, Iss. 1, pp. 57-57
Open Access | Times Cited: 4
test
Vinayak Jagtap, Kulkarni Parag, Joshi Pallavi
The International Arab Journal of Information Technology (2024) Vol. 21, Iss. 2
Open Access
Vinayak Jagtap, Kulkarni Parag, Joshi Pallavi
The International Arab Journal of Information Technology (2024) Vol. 21, Iss. 2
Open Access
test
Jawad Alkhatib, Ehsan Owaidah, Aiman Turani, et al.
The International Arab Journal of Information Technology (2024) Vol. 21, Iss. 2
Open Access
Jawad Alkhatib, Ehsan Owaidah, Aiman Turani, et al.
The International Arab Journal of Information Technology (2024) Vol. 21, Iss. 2
Open Access
FD Technology for HSs based on Deep Convolutional Generative Adversarial Networks
Jun Wang, Yuanxi Wang
The International Arab Journal of Information Technology (2024) Vol. 21, Iss. 2
Open Access
Jun Wang, Yuanxi Wang
The International Arab Journal of Information Technology (2024) Vol. 21, Iss. 2
Open Access
Comparative Analysis of Intrusion Detection Models using Big Data Analytics and Machine Learning Techniques
Alaketu Muyideen, Abiodun Oguntimilehin, Kehinde Adebola Olatunji, et al.
The International Arab Journal of Information Technology (2024) Vol. 21, Iss. 2
Open Access
Alaketu Muyideen, Abiodun Oguntimilehin, Kehinde Adebola Olatunji, et al.
The International Arab Journal of Information Technology (2024) Vol. 21, Iss. 2
Open Access
Word Embedding as a Semantic Feature Extraction Technique in Arabic Natural Language Processing: An Overview
Ghizlane Bourahoua, Manar Abourezq, Najima Daoudi
The International Arab Journal of Information Technology (2024) Vol. 21, Iss. 2
Open Access
Ghizlane Bourahoua, Manar Abourezq, Najima Daoudi
The International Arab Journal of Information Technology (2024) Vol. 21, Iss. 2
Open Access
Detecting Spam Reviews in Arabic by Deep Learning
Eman Aljadani, Fatmah Yousef Assiri, Areej Alshutayri
The International Arab Journal of Information Technology (2024) Vol. 21, Iss. 3
Open Access
Eman Aljadani, Fatmah Yousef Assiri, Areej Alshutayri
The International Arab Journal of Information Technology (2024) Vol. 21, Iss. 3
Open Access
The Strategy of Discriminating False Comments on the Internet by Fusing Probabilistic Topic and Word Vector Models
Fei Long
The International Arab Journal of Information Technology (2024) Vol. 21, Iss. 3
Open Access
Fei Long
The International Arab Journal of Information Technology (2024) Vol. 21, Iss. 3
Open Access
Smart camera with image encryption: a secure solution for real-time monitoring in Industry 4.0
C. Sekar, Vinod Ramesh Falmari, M. Brindha
Journal of Real-Time Image Processing (2023) Vol. 20, Iss. 4
Closed Access | Times Cited: 1
C. Sekar, Vinod Ramesh Falmari, M. Brindha
Journal of Real-Time Image Processing (2023) Vol. 20, Iss. 4
Closed Access | Times Cited: 1
Local Dynamics of a New Four-Dimensional Quadratic Autonomous System
Sengen Hu, Liangqiang Zhou
Journal of Applied Mathematics and Physics (2022) Vol. 10, Iss. 09, pp. 2632-2648
Open Access | Times Cited: 1
Sengen Hu, Liangqiang Zhou
Journal of Applied Mathematics and Physics (2022) Vol. 10, Iss. 09, pp. 2632-2648
Open Access | Times Cited: 1