OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Blockchain and Deep Learning Empowered Secure Data Sharing Framework for Softwarized UAVs
Prabhat Kumar, Randhir Kumar, Abhinav Kumar, et al.
2022 IEEE International Conference on Communications Workshops (ICC Workshops) (2022)
Closed Access | Times Cited: 27

Showing 1-25 of 27 citing articles:

A Review of Blockchain Technology in Knowledge-Defined Networking, Its Application, Benefits, and Challenges
Patikiri Arachchige Don Shehan Nilmantha Wijesekara, Subodha Gunawardena
Network (2023) Vol. 3, Iss. 3, pp. 343-421
Open Access | Times Cited: 18

Blockchain-Based Controller Recovery and SDN Forwarding Device Rule Migration for UAVs
Afifa Islam Ananna, Mahedul Hasan Rifat, Towshick Intesir Ahmed Rain, et al.
Lecture notes in networks and systems (2025), pp. 268-277
Closed Access

Increasing Crop Quality and Yield with a Machine Learning-Based Crop Monitoring System
Anas Bilal, Xiaowen Liu, Haixia Long, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 76, Iss. 2, pp. 2401-2426
Open Access | Times Cited: 14

An efficient privacy-preserving authentication scheme for internet of vehicles based on blockchain technology with hybrid adaptive network
V. L. Raja, S. Selvakumarasamy
Peer-to-Peer Networking and Applications (2025) Vol. 18, Iss. 3
Closed Access

A secure and efficient framework for internet of medical things through blockchain driven customized federated learning
Abdul Mazid, Sheeraz Kirmani, Manaullah Abid, et al.
Cluster Computing (2025) Vol. 28, Iss. 4
Closed Access

Security-aware IoT botnet attack detection framework using dilated and cascaded deep learning mechanism with conditional adversarial autoencoder-based features
N. Sakthipriya, V. Govindasamy, V. Akila
Peer-to-Peer Networking and Applications (2024) Vol. 17, Iss. 3, pp. 1467-1485
Closed Access | Times Cited: 3

Data protection in internet of medical things using blockchain and secret sharing method
Shreyshi Shree, Zhou Chen, Masoud Barati
The Journal of Supercomputing (2023) Vol. 80, Iss. 4, pp. 5108-5135
Closed Access | Times Cited: 8

Dynamic behavioral profiling for anomaly detection in software-defined IoT networks: A machine learning approach
P. Senthilraja, Kanmani Palaniappan, Brindha Duraipandi, et al.
Peer-to-Peer Networking and Applications (2024) Vol. 17, Iss. 4, pp. 2450-2469
Closed Access | Times Cited: 2

How to Protect Key Drones in Unmanned Aerial Vehicle Networks? An SDN-Based Topology Deception Scheme
Yawen Tan, Jiajia Liu, Jiadai Wang
IEEE Transactions on Vehicular Technology (2022) Vol. 71, Iss. 12, pp. 13320-13331
Closed Access | Times Cited: 10

BlockCrime: Blockchain and Deep Learning-Based Collaborative Intelligence Framework to Detect Malicious Activities for Public Safety
Dev Patel, Harshil Sanghvi, Nilesh Kumar Jadav, et al.
Mathematics (2022) Vol. 10, Iss. 17, pp. 3195-3195
Open Access | Times Cited: 10

Device Identification in Blockchain-Based Internet of Things
Ali Dorri, Clemence Roulin, Shantanu Pal, et al.
IEEE Internet of Things Journal (2022) Vol. 9, Iss. 24, pp. 24767-24776
Open Access | Times Cited: 8

DASLog: Decentralized Auditable Secure Logging for UAV Ecosystems
Roozbeh Sarenche, Farhad Aghili, Takahito Yoshizawa, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 23, pp. 20264-20284
Open Access | Times Cited: 4

Blockchain-Based Controller Recovery and SDN Packet Filtering Scheme for Softwarized UAVs
Mahedul Hasan Rifat, Afifa Islam Ananna, Towshick Intesir Ahmed, et al.
(2024), pp. 1-5
Closed Access | Times Cited: 1

An Efficient Approach to Reduce Energy Consumption in a Fog Computing Environment Using a Moth Flame Optimization Algorithm
Razieh Asgarnezhad
SN Computer Science (2024) Vol. 5, Iss. 6
Closed Access | Times Cited: 1

Empowering UAV Communications with AI-Assisted Software-Defined Networks: A Review on Performance, Security, and Efficiency
Mohamed Amine Ould Rabah, Hamza Drid, Mohamed Rahouti, et al.
Journal of Network and Systems Management (2024) Vol. 32, Iss. 4
Closed Access | Times Cited: 1

Evaluating a Proposed E-Government Stage Model in Terms of Personal Data Protection
Hemin Muhammad, Martin Hromada
Applied Sciences (2023) Vol. 13, Iss. 6, pp. 3913-3913
Open Access | Times Cited: 3

Secure transfer of robust healthcare data using blockchain-based privacy
Maddila Suresh Kumar, V. Naga Lakshmi
Cluster Computing (2023) Vol. 27, Iss. 2, pp. 1275-1291
Closed Access | Times Cited: 3

A Modified PointNet-Based DDoS Attack Classification and Segmentation in Blockchain
Jieren Cheng, Xiulai Li, Xinbing Xu, et al.
Computer Systems Science and Engineering (2023) Vol. 47, Iss. 1, pp. 975-992
Open Access | Times Cited: 3

Modelling of Metaheuristics with Machine Learning-Enabled Cybersecurity in Unmanned Aerial Vehicles
Mohammed Aljebreen, Hanan Abdullah Mengash, Mohammad Alamgeer, et al.
Sustainability (2022) Vol. 14, Iss. 24, pp. 16741-16741
Open Access | Times Cited: 4

Secure and Privacy-Preserving Framework for IoT-Enabled Smart Grid Environment
Chandan Kumar, Prakash Chittora
Arabian Journal for Science and Engineering (2023) Vol. 49, Iss. 3, pp. 3063-3078
Closed Access | Times Cited: 2

ConFIDe: A PWM-Driven Control-Fused Intrusion Detection System for Hardware Security in Unmanned Aerial Vehicles
Muneeba Asif, Mohammad Ashiqur Rahman, Kemal Akkaya, et al.
(2024), pp. 886-901
Closed Access

MACAE: memory module-assisted convolutional autoencoder for intrusion detection in IoT networks
Jiaqi Gao, Mingrui Fan, Yaru He, et al.
The Journal of Supercomputing (2024) Vol. 81, Iss. 1
Closed Access

LILP: A Lightweight Enciphering Algorithm to Encrypt Arbitrary-Length Messages
Xing Zhang, Jian Chen, Tianning Li, et al.
Symmetry (2023) Vol. 15, Iss. 1, pp. 177-177
Open Access | Times Cited: 1

A Distributed and Secure Software Architecture Based on Blockchain Technology for Application Software
Ali Kooshari, Mehdi Fartash
Wireless Personal Communications (2023) Vol. 130, Iss. 1, pp. 219-240
Closed Access | Times Cited: 1

Page 1 - Next Page

Scroll to top