OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Blockchain Meets Covert Communication: A Survey
Zhuo Chen, Liehuang Zhu, Peng Jiang, et al.
IEEE Communications Surveys & Tutorials (2022) Vol. 24, Iss. 4, pp. 2163-2192
Closed Access | Times Cited: 25

Showing 25 citing articles:

Covert channels in blockchain and blockchain based covert communication: Overview, state-of-the-art, and future directions
Tao Zhang, Bingyu Li, Yan Zhu, et al.
Computer Communications (2023) Vol. 205, pp. 136-146
Closed Access | Times Cited: 22

Exploring Embedded Content in the Ethereum Blockchain: Data Restoration and Analysis
Mingdong Tang, Xingyu Feng, Weili Chen
Communications in computer and information science (2025), pp. 81-94
Closed Access

BlockWhisper: A Blockchain-Based Hybrid Covert Communication Scheme with Strong Ability to Evade Detection
Zehui Wu, Yuwei Xu, Ranfeng Huang, et al.
Lecture notes in computer science (2025), pp. 161-181
Closed Access

Privacy-Preserving and Traceable Blockchain-Based Charging Payment Scheme for Electric Vehicles
Yan Wu, Can Zhang, Liehuang Zhu
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 24, pp. 21254-21265
Closed Access | Times Cited: 10

A Blockchain-Based Secure Covert Communication Method via Shamir Threshold and STC Mapping
Pei Zhang, Qingfeng Cheng, Mingliang Zhang, et al.
IEEE Transactions on Dependable and Secure Computing (2024) Vol. 21, Iss. 5, pp. 4469-4480
Closed Access | Times Cited: 3

A Stealthy Communication Model with Blockchain Smart Contract for Bidding Systems
Qi Liang, Ning Shi, Yu‐an Tan, et al.
Electronics (2024) Vol. 13, Iss. 13, pp. 2523-2523
Open Access | Times Cited: 3

Covert communication via blockchain: Hiding patterns and communication patterns
Tao Zhang, Qianhong Wu, Qin Wang, et al.
Computer Standards & Interfaces (2024) Vol. 90, pp. 103851-103851
Closed Access | Times Cited: 2

A Systematic Survey On Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization
Daichong Chao, Dawei Xu, Feng Gao, et al.
IEEE Communications Surveys & Tutorials (2024) Vol. 26, Iss. 3, pp. 1775-1829
Closed Access | Times Cited: 2

A secure and privacy preserving model for healthcare applications based on blockchain-layered architecture
Adla Sanober, Shamama Anwar
International Journal of Computers and Applications (2024) Vol. 46, Iss. 12, pp. 1206-1218
Closed Access | Times Cited: 2

A covert channel over blockchain based on label tree without long waiting times
Zhujun Wang, Lejun Zhang, Ran Guo, et al.
Computer Networks (2023) Vol. 232, pp. 109843-109843
Closed Access | Times Cited: 6

Exploring consensus algorithms: A comprehensive examination and comparative analysis
Arun Kumar Tripathi, Apoorv Jain, Amit Kumar, et al.
AIP conference proceedings (2024) Vol. 3168, pp. 020036-020036
Closed Access | Times Cited: 1

SPYIPv6: Locating Covert Data in One or a Combination of IPv6 Header Field(s)
Punam Bedi, Vinita Jindal, Arti Dua
IEEE Access (2023) Vol. 11, pp. 103486-103501
Closed Access | Times Cited: 3

A Generic Blockchain-based Steganography Framework with High Capacity via Reversible GAN
Zhuo Chen, Liehuang Zhu, Peng Jiang, et al.
IEEE INFOCOM 2022 - IEEE Conference on Computer Communications (2024), pp. 241-250
Closed Access

Embedding Data in Bitcoin Transaction Values with Restricted Boltzmann Machine
Jubai An, Haibo Tian
Lecture notes in computer science (2024), pp. 21-38
Closed Access

Bcdh: Blockchain-Based Covert Elliptic-Curve Diffie-Hellman Key Exchange Scheme
Qinghua Hu, Chunxiang Xu, Wanpeng Li
(2024)
Closed Access

Secure and Efficient Covert Communication for Blockchain-Integrated SAGINs
Weijia Li, Yuan Zhang, Xinyu He, et al.
Security and Safety (2024) Vol. 3, pp. 2024006-2024006
Open Access

Behavioral intentions towards the use of digital wallets
Jonathan C Gano-an, Xueting Pan
(2024), pp. 1-18
Open Access

Joint Power Allocation for Transmitter and Relay in a Full-Duplex Relay Covert Communication System
Gui Fang, Jin Chen, Guoxin Li, et al.
IEEE Open Journal of the Communications Society (2024) Vol. 5, pp. 6674-6685
Open Access

Covert Channel Detection and Generation Techniques: A Survey
Nesmah A. AL-Khulaidi, Ammar T. Zahary, Muneer A. S. Hazaa, et al.
(2023), pp. 01-09
Closed Access | Times Cited: 1

A Novel Localization Method of Wireless Covert Communication Entity for Post-Steganalysis
Guo Wei, Shichang Ding, Haifeng Yang, et al.
Applied Sciences (2022) Vol. 12, Iss. 23, pp. 12224-12224
Open Access | Times Cited: 2

Achieving Anonymous and Covert Reporting on Public Blockchain Networks
Liehuang Zhu, Jiaqi Zhang, Can Zhang, et al.
Mathematics (2023) Vol. 11, Iss. 7, pp. 1621-1621
Open Access

The Idea of Digital Currency for India based on Blockchain Technology: A Conceptual Study
Et al. August Keshav
International Journal on Recent and Innovation Trends in Computing and Communication (2023) Vol. 11, Iss. 10, pp. 1260-1269
Open Access

Editorial: Fourth Quarter 2022 IEEE Communications Surveys and Tutorials
Dusit Niyato
IEEE Communications Surveys & Tutorials (2022) Vol. 24, Iss. 4, pp. i-v
Open Access

Page 1

Scroll to top