
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Blockchain Meets Covert Communication: A Survey
Zhuo Chen, Liehuang Zhu, Peng Jiang, et al.
IEEE Communications Surveys & Tutorials (2022) Vol. 24, Iss. 4, pp. 2163-2192
Closed Access | Times Cited: 25
Zhuo Chen, Liehuang Zhu, Peng Jiang, et al.
IEEE Communications Surveys & Tutorials (2022) Vol. 24, Iss. 4, pp. 2163-2192
Closed Access | Times Cited: 25
Showing 25 citing articles:
Covert channels in blockchain and blockchain based covert communication: Overview, state-of-the-art, and future directions
Tao Zhang, Bingyu Li, Yan Zhu, et al.
Computer Communications (2023) Vol. 205, pp. 136-146
Closed Access | Times Cited: 22
Tao Zhang, Bingyu Li, Yan Zhu, et al.
Computer Communications (2023) Vol. 205, pp. 136-146
Closed Access | Times Cited: 22
Exploring Embedded Content in the Ethereum Blockchain: Data Restoration and Analysis
Mingdong Tang, Xingyu Feng, Weili Chen
Communications in computer and information science (2025), pp. 81-94
Closed Access
Mingdong Tang, Xingyu Feng, Weili Chen
Communications in computer and information science (2025), pp. 81-94
Closed Access
BlockWhisper: A Blockchain-Based Hybrid Covert Communication Scheme with Strong Ability to Evade Detection
Zehui Wu, Yuwei Xu, Ranfeng Huang, et al.
Lecture notes in computer science (2025), pp. 161-181
Closed Access
Zehui Wu, Yuwei Xu, Ranfeng Huang, et al.
Lecture notes in computer science (2025), pp. 161-181
Closed Access
Privacy-Preserving and Traceable Blockchain-Based Charging Payment Scheme for Electric Vehicles
Yan Wu, Can Zhang, Liehuang Zhu
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 24, pp. 21254-21265
Closed Access | Times Cited: 10
Yan Wu, Can Zhang, Liehuang Zhu
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 24, pp. 21254-21265
Closed Access | Times Cited: 10
A Blockchain-Based Secure Covert Communication Method via Shamir Threshold and STC Mapping
Pei Zhang, Qingfeng Cheng, Mingliang Zhang, et al.
IEEE Transactions on Dependable and Secure Computing (2024) Vol. 21, Iss. 5, pp. 4469-4480
Closed Access | Times Cited: 3
Pei Zhang, Qingfeng Cheng, Mingliang Zhang, et al.
IEEE Transactions on Dependable and Secure Computing (2024) Vol. 21, Iss. 5, pp. 4469-4480
Closed Access | Times Cited: 3
A Stealthy Communication Model with Blockchain Smart Contract for Bidding Systems
Qi Liang, Ning Shi, Yu‐an Tan, et al.
Electronics (2024) Vol. 13, Iss. 13, pp. 2523-2523
Open Access | Times Cited: 3
Qi Liang, Ning Shi, Yu‐an Tan, et al.
Electronics (2024) Vol. 13, Iss. 13, pp. 2523-2523
Open Access | Times Cited: 3
Covert communication via blockchain: Hiding patterns and communication patterns
Tao Zhang, Qianhong Wu, Qin Wang, et al.
Computer Standards & Interfaces (2024) Vol. 90, pp. 103851-103851
Closed Access | Times Cited: 2
Tao Zhang, Qianhong Wu, Qin Wang, et al.
Computer Standards & Interfaces (2024) Vol. 90, pp. 103851-103851
Closed Access | Times Cited: 2
A Systematic Survey On Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization
Daichong Chao, Dawei Xu, Feng Gao, et al.
IEEE Communications Surveys & Tutorials (2024) Vol. 26, Iss. 3, pp. 1775-1829
Closed Access | Times Cited: 2
Daichong Chao, Dawei Xu, Feng Gao, et al.
IEEE Communications Surveys & Tutorials (2024) Vol. 26, Iss. 3, pp. 1775-1829
Closed Access | Times Cited: 2
Digital Money in the Indian Context: An In-depth Exploration of its Evolution, Implications, and Future Prospects within the Framework of Central Bank Digital Currency
Et al. August Keshav
Deleted Journal (2024) Vol. 20, Iss. 1, pp. 350-361
Open Access | Times Cited: 2
Et al. August Keshav
Deleted Journal (2024) Vol. 20, Iss. 1, pp. 350-361
Open Access | Times Cited: 2
A secure and privacy preserving model for healthcare applications based on blockchain-layered architecture
Adla Sanober, Shamama Anwar
International Journal of Computers and Applications (2024) Vol. 46, Iss. 12, pp. 1206-1218
Closed Access | Times Cited: 2
Adla Sanober, Shamama Anwar
International Journal of Computers and Applications (2024) Vol. 46, Iss. 12, pp. 1206-1218
Closed Access | Times Cited: 2
A covert channel over blockchain based on label tree without long waiting times
Zhujun Wang, Lejun Zhang, Ran Guo, et al.
Computer Networks (2023) Vol. 232, pp. 109843-109843
Closed Access | Times Cited: 6
Zhujun Wang, Lejun Zhang, Ran Guo, et al.
Computer Networks (2023) Vol. 232, pp. 109843-109843
Closed Access | Times Cited: 6
Exploring consensus algorithms: A comprehensive examination and comparative analysis
Arun Kumar Tripathi, Apoorv Jain, Amit Kumar, et al.
AIP conference proceedings (2024) Vol. 3168, pp. 020036-020036
Closed Access | Times Cited: 1
Arun Kumar Tripathi, Apoorv Jain, Amit Kumar, et al.
AIP conference proceedings (2024) Vol. 3168, pp. 020036-020036
Closed Access | Times Cited: 1
SPYIPv6: Locating Covert Data in One or a Combination of IPv6 Header Field(s)
Punam Bedi, Vinita Jindal, Arti Dua
IEEE Access (2023) Vol. 11, pp. 103486-103501
Closed Access | Times Cited: 3
Punam Bedi, Vinita Jindal, Arti Dua
IEEE Access (2023) Vol. 11, pp. 103486-103501
Closed Access | Times Cited: 3
A Generic Blockchain-based Steganography Framework with High Capacity via Reversible GAN
Zhuo Chen, Liehuang Zhu, Peng Jiang, et al.
IEEE INFOCOM 2022 - IEEE Conference on Computer Communications (2024), pp. 241-250
Closed Access
Zhuo Chen, Liehuang Zhu, Peng Jiang, et al.
IEEE INFOCOM 2022 - IEEE Conference on Computer Communications (2024), pp. 241-250
Closed Access
Embedding Data in Bitcoin Transaction Values with Restricted Boltzmann Machine
Jubai An, Haibo Tian
Lecture notes in computer science (2024), pp. 21-38
Closed Access
Jubai An, Haibo Tian
Lecture notes in computer science (2024), pp. 21-38
Closed Access
Bcdh: Blockchain-Based Covert Elliptic-Curve Diffie-Hellman Key Exchange Scheme
Qinghua Hu, Chunxiang Xu, Wanpeng Li
(2024)
Closed Access
Qinghua Hu, Chunxiang Xu, Wanpeng Li
(2024)
Closed Access
Secure and Efficient Covert Communication for Blockchain-Integrated SAGINs
Weijia Li, Yuan Zhang, Xinyu He, et al.
Security and Safety (2024) Vol. 3, pp. 2024006-2024006
Open Access
Weijia Li, Yuan Zhang, Xinyu He, et al.
Security and Safety (2024) Vol. 3, pp. 2024006-2024006
Open Access
Behavioral intentions towards the use of digital wallets
Jonathan C Gano-an, Xueting Pan
(2024), pp. 1-18
Open Access
Jonathan C Gano-an, Xueting Pan
(2024), pp. 1-18
Open Access
Joint Power Allocation for Transmitter and Relay in a Full-Duplex Relay Covert Communication System
Gui Fang, Jin Chen, Guoxin Li, et al.
IEEE Open Journal of the Communications Society (2024) Vol. 5, pp. 6674-6685
Open Access
Gui Fang, Jin Chen, Guoxin Li, et al.
IEEE Open Journal of the Communications Society (2024) Vol. 5, pp. 6674-6685
Open Access
Covert Channel Detection and Generation Techniques: A Survey
Nesmah A. AL-Khulaidi, Ammar T. Zahary, Muneer A. S. Hazaa, et al.
(2023), pp. 01-09
Closed Access | Times Cited: 1
Nesmah A. AL-Khulaidi, Ammar T. Zahary, Muneer A. S. Hazaa, et al.
(2023), pp. 01-09
Closed Access | Times Cited: 1
DarkTrans: A Blockchain-based Covert Communication Scheme with High Channel Capacity and Strong Concealment
Yuwei Xu, Zehui Wu, Jie Cao, et al.
(2023)
Closed Access | Times Cited: 1
Yuwei Xu, Zehui Wu, Jie Cao, et al.
(2023)
Closed Access | Times Cited: 1
A Novel Localization Method of Wireless Covert Communication Entity for Post-Steganalysis
Guo Wei, Shichang Ding, Haifeng Yang, et al.
Applied Sciences (2022) Vol. 12, Iss. 23, pp. 12224-12224
Open Access | Times Cited: 2
Guo Wei, Shichang Ding, Haifeng Yang, et al.
Applied Sciences (2022) Vol. 12, Iss. 23, pp. 12224-12224
Open Access | Times Cited: 2
Achieving Anonymous and Covert Reporting on Public Blockchain Networks
Liehuang Zhu, Jiaqi Zhang, Can Zhang, et al.
Mathematics (2023) Vol. 11, Iss. 7, pp. 1621-1621
Open Access
Liehuang Zhu, Jiaqi Zhang, Can Zhang, et al.
Mathematics (2023) Vol. 11, Iss. 7, pp. 1621-1621
Open Access
The Idea of Digital Currency for India based on Blockchain Technology: A Conceptual Study
Et al. August Keshav
International Journal on Recent and Innovation Trends in Computing and Communication (2023) Vol. 11, Iss. 10, pp. 1260-1269
Open Access
Et al. August Keshav
International Journal on Recent and Innovation Trends in Computing and Communication (2023) Vol. 11, Iss. 10, pp. 1260-1269
Open Access
Editorial: Fourth Quarter 2022 IEEE Communications Surveys and Tutorials
Dusit Niyato
IEEE Communications Surveys & Tutorials (2022) Vol. 24, Iss. 4, pp. i-v
Open Access
Dusit Niyato
IEEE Communications Surveys & Tutorials (2022) Vol. 24, Iss. 4, pp. i-v
Open Access