
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
AI-Enabled Trust in Distributed Networks
Zhiqi Li, Weidong Fang, Chunsheng Zhu, et al.
IEEE Access (2023) Vol. 11, pp. 88116-88134
Open Access | Times Cited: 13
Zhiqi Li, Weidong Fang, Chunsheng Zhu, et al.
IEEE Access (2023) Vol. 11, pp. 88116-88134
Open Access | Times Cited: 13
Showing 13 citing articles:
Machine learning and deep learning for user authentication and authorization in cybersecurity: A state-of-the-art review
Zinniya Taffannum Pritee, Mehedi Hasan Anik, Saida Binta Alam, et al.
Computers & Security (2024) Vol. 140, pp. 103747-103747
Closed Access | Times Cited: 11
Zinniya Taffannum Pritee, Mehedi Hasan Anik, Saida Binta Alam, et al.
Computers & Security (2024) Vol. 140, pp. 103747-103747
Closed Access | Times Cited: 11
Understanding the Trustworthiness Management in the Social Internet of Things: A Survey
Subhash Sagar, Adnan Mahmood, Quan Z. Sheng, et al.
(2023)
Open Access | Times Cited: 18
Subhash Sagar, Adnan Mahmood, Quan Z. Sheng, et al.
(2023)
Open Access | Times Cited: 18
Understanding the trustworthiness management in the social Internet of Things: A survey
Subhash Sagar, Adnan Mahmood, Quan Z. Sheng, et al.
Computer Networks (2024) Vol. 251, pp. 110611-110611
Open Access | Times Cited: 5
Subhash Sagar, Adnan Mahmood, Quan Z. Sheng, et al.
Computer Networks (2024) Vol. 251, pp. 110611-110611
Open Access | Times Cited: 5
Trust Evaluation with Deep Learning in Online Social Networks: A State-of-the-Art Review
Zhiqi Li, Weidong Fang, Chunsheng Zhu, et al.
Lecture notes in computer science (2024), pp. 3-12
Closed Access | Times Cited: 1
Zhiqi Li, Weidong Fang, Chunsheng Zhu, et al.
Lecture notes in computer science (2024), pp. 3-12
Closed Access | Times Cited: 1
Unraveling trust management in cybersecurity: insights from a systematic literature review
Angélica Pigola, Fernando de Souza Meirelles
Information Technology and Management (2024)
Closed Access
Angélica Pigola, Fernando de Souza Meirelles
Information Technology and Management (2024)
Closed Access
Graph Neural Network-Based Malicious Node Detection to Improve the Security of Wireless Sensor Networks
K. Kumar, M. Khari
Lecture notes in networks and systems (2024), pp. 363-372
Closed Access
K. Kumar, M. Khari
Lecture notes in networks and systems (2024), pp. 363-372
Closed Access
Weibo-FA: A Benchmark Dataset for Fake Account Detection in Weibo Platform
Zhiqi Li, Weidong Fang, Wuxiong Zhang
Lecture notes in computer science (2024), pp. 166-176
Closed Access
Zhiqi Li, Weidong Fang, Wuxiong Zhang
Lecture notes in computer science (2024), pp. 166-176
Closed Access
Intelligent Computing Making Access Control More Secure: From Cipher to Trust
Tian Wang, Weidong Fang, Mufan Ni, et al.
Lecture notes in computer science (2024), pp. 307-317
Closed Access
Tian Wang, Weidong Fang, Mufan Ni, et al.
Lecture notes in computer science (2024), pp. 307-317
Closed Access
Deep Neural Network-Based Intrusion Detection in Internet of Things: A State-of-the-Art Review
Zhiqi Li, Weidong Fang, Chunsheng Zhu, et al.
Lecture notes in computer science (2024), pp. 13-23
Closed Access
Zhiqi Li, Weidong Fang, Chunsheng Zhu, et al.
Lecture notes in computer science (2024), pp. 13-23
Closed Access
Fuzzy-based Trust in Distributed Networks: A State-of-the-art Review
Dongsheng Jia, Weidong Fang, Wuxiong Zhang
(2024) Vol. 2, pp. 60-67
Closed Access
Dongsheng Jia, Weidong Fang, Wuxiong Zhang
(2024) Vol. 2, pp. 60-67
Closed Access
Toward Deep Learning based Intrusion Detection System: A Survey
Zhiqi Li, Weidong Fang, Chunsheng Zhu, et al.
(2024), pp. 25-32
Closed Access
Zhiqi Li, Weidong Fang, Chunsheng Zhu, et al.
(2024), pp. 25-32
Closed Access
Access Control for IoT-based Big Data: a State-of-the-art Review
Tian Wang, Weidong Fang, Wuxiong Zhang
(2024), pp. 81-87
Closed Access
Tian Wang, Weidong Fang, Wuxiong Zhang
(2024), pp. 81-87
Closed Access
WSN Implementation to Prevent Train Track Collapse
Eman Elbehiry, A Mostafa Salama
International Journal of Telecommunications (2023) Vol. 03, Iss. 02, pp. 1-8
Open Access
Eman Elbehiry, A Mostafa Salama
International Journal of Telecommunications (2023) Vol. 03, Iss. 02, pp. 1-8
Open Access