
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Secure Data Aggregation Strategy in Edge Computing and Blockchain-Empowered Internet of Things
Xiaoding Wang, Sahil Garg, Hui Lin, et al.
IEEE Internet of Things Journal (2020) Vol. 9, Iss. 16, pp. 14237-14246
Closed Access | Times Cited: 78
Xiaoding Wang, Sahil Garg, Hui Lin, et al.
IEEE Internet of Things Journal (2020) Vol. 9, Iss. 16, pp. 14237-14246
Closed Access | Times Cited: 78
Showing 1-25 of 78 citing articles:
Edge-computing-driven Internet of Things: A Survey
Linghe Kong, Jinlin Tan, Junqin Huang, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 8, pp. 1-41
Closed Access | Times Cited: 119
Linghe Kong, Jinlin Tan, Junqin Huang, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 8, pp. 1-41
Closed Access | Times Cited: 119
Integration of blockchain and edge computing in internet of things: A survey
He Xue, Dajiang Chen, Ning Zhang, et al.
Future Generation Computer Systems (2022) Vol. 144, pp. 307-326
Open Access | Times Cited: 82
He Xue, Dajiang Chen, Ning Zhang, et al.
Future Generation Computer Systems (2022) Vol. 144, pp. 307-326
Open Access | Times Cited: 82
Data aggregation protocols for WSN and IoT applications – A comprehensive survey
Beneyaz A. Begum, Satyanarayana V. Nandury
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 2, pp. 651-681
Open Access | Times Cited: 46
Beneyaz A. Begum, Satyanarayana V. Nandury
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 2, pp. 651-681
Open Access | Times Cited: 46
Blockchain-Enabled Decentralized Edge Intelligence for Trustworthy 6G Consumer Electronics
Xin Wang, Achyut Shankar, Keqin Li, et al.
IEEE Transactions on Consumer Electronics (2024) Vol. 70, Iss. 1, pp. 1214-1225
Closed Access | Times Cited: 18
Xin Wang, Achyut Shankar, Keqin Li, et al.
IEEE Transactions on Consumer Electronics (2024) Vol. 70, Iss. 1, pp. 1214-1225
Closed Access | Times Cited: 18
Multi-Access Edge Computing Architecture, Data Security and Privacy: A Review
Belal Ali, Mark Gregory, Shuo Li
IEEE Access (2021) Vol. 9, pp. 18706-18721
Open Access | Times Cited: 96
Belal Ali, Mark Gregory, Shuo Li
IEEE Access (2021) Vol. 9, pp. 18706-18721
Open Access | Times Cited: 96
Edge Blockchain Assisted Lightweight Privacy-Preserving Data Aggregation for Smart Grid
Weifeng Lu, Zhihao Ren, Jia Xu, et al.
IEEE Transactions on Network and Service Management (2021) Vol. 18, Iss. 2, pp. 1246-1259
Closed Access | Times Cited: 81
Weifeng Lu, Zhihao Ren, Jia Xu, et al.
IEEE Transactions on Network and Service Management (2021) Vol. 18, Iss. 2, pp. 1246-1259
Closed Access | Times Cited: 81
Deep reinforcement learning for blockchain in industrial IoT: A survey
Yulei Wu, Zehua Wang, Yuxiang Ma, et al.
Computer Networks (2021) Vol. 191, pp. 108004-108004
Closed Access | Times Cited: 81
Yulei Wu, Zehua Wang, Yuxiang Ma, et al.
Computer Networks (2021) Vol. 191, pp. 108004-108004
Closed Access | Times Cited: 81
Enabling Secure Authentication in Industrial IoT With Transfer Learning Empowered Blockchain
Xiaoding Wang, Sahil Garg, Hui Lin, et al.
IEEE Transactions on Industrial Informatics (2021) Vol. 17, Iss. 11, pp. 7725-7733
Closed Access | Times Cited: 75
Xiaoding Wang, Sahil Garg, Hui Lin, et al.
IEEE Transactions on Industrial Informatics (2021) Vol. 17, Iss. 11, pp. 7725-7733
Closed Access | Times Cited: 75
Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT
K. Arumugam, J. Srimathi, Sudhanshu Maurya, et al.
Sensors (2021) Vol. 21, Iss. 23, pp. 7793-7793
Open Access | Times Cited: 72
K. Arumugam, J. Srimathi, Sudhanshu Maurya, et al.
Sensors (2021) Vol. 21, Iss. 23, pp. 7793-7793
Open Access | Times Cited: 72
Trust in Edge-based Internet of Things Architectures: State of the Art and Research Challenges
Lidia Fotia, Flávia C. Delicato, Giancarlo Fortino
ACM Computing Surveys (2022) Vol. 55, Iss. 9, pp. 1-34
Open Access | Times Cited: 47
Lidia Fotia, Flávia C. Delicato, Giancarlo Fortino
ACM Computing Surveys (2022) Vol. 55, Iss. 9, pp. 1-34
Open Access | Times Cited: 47
Blockchain-empowered security and privacy protection technologies for smart grid
Yanan Cao, Yujue Wang, Yong Ding, et al.
Computer Standards & Interfaces (2022) Vol. 85, pp. 103708-103708
Closed Access | Times Cited: 44
Yanan Cao, Yujue Wang, Yong Ding, et al.
Computer Standards & Interfaces (2022) Vol. 85, pp. 103708-103708
Closed Access | Times Cited: 44
A novel autoencoder based feature independent GA optimised XGBoost classifier for IoMT malware detection
L. Dhanya, R. Chitra
Expert Systems with Applications (2023) Vol. 237, pp. 121618-121618
Closed Access | Times Cited: 25
L. Dhanya, R. Chitra
Expert Systems with Applications (2023) Vol. 237, pp. 121618-121618
Closed Access | Times Cited: 25
Key Technologies for 6G-Enabled Smart Sustainable City
Nahyun Kim, Gayeong Kim, Sunghoon Shim, et al.
Electronics (2024) Vol. 13, Iss. 2, pp. 268-268
Open Access | Times Cited: 8
Nahyun Kim, Gayeong Kim, Sunghoon Shim, et al.
Electronics (2024) Vol. 13, Iss. 2, pp. 268-268
Open Access | Times Cited: 8
Security of federated learning in 6G era: A review on conceptual techniques and software platforms used for research and analysis
Syed Hussain Ali Kazmi, Faizan Qamar, Rosilah Hassan, et al.
Computer Networks (2024) Vol. 245, pp. 110358-110358
Closed Access | Times Cited: 8
Syed Hussain Ali Kazmi, Faizan Qamar, Rosilah Hassan, et al.
Computer Networks (2024) Vol. 245, pp. 110358-110358
Closed Access | Times Cited: 8
A Blockchain-Based Dual-Side Privacy-Preserving Multiparty Computation Scheme for Edge-Enabled Smart Grid
Zhitao Guan, Xiao Zhou, Peng Liu, et al.
IEEE Internet of Things Journal (2021) Vol. 9, Iss. 16, pp. 14287-14299
Closed Access | Times Cited: 44
Zhitao Guan, Xiao Zhou, Peng Liu, et al.
IEEE Internet of Things Journal (2021) Vol. 9, Iss. 16, pp. 14287-14299
Closed Access | Times Cited: 44
Privacy-preserving and Byzantine-robust Federated Learning Framework using Permissioned Blockchain
Harsh Kasyap, Somanath Tripathy
Expert Systems with Applications (2023) Vol. 238, pp. 122210-122210
Closed Access | Times Cited: 17
Harsh Kasyap, Somanath Tripathy
Expert Systems with Applications (2023) Vol. 238, pp. 122210-122210
Closed Access | Times Cited: 17
Blockchain-driven integration technology for the AEC industry
Botao Zhong, Xing Pan, Lieyun Ding, et al.
Automation in Construction (2023) Vol. 150, pp. 104791-104791
Closed Access | Times Cited: 16
Botao Zhong, Xing Pan, Lieyun Ding, et al.
Automation in Construction (2023) Vol. 150, pp. 104791-104791
Closed Access | Times Cited: 16
Enhancing cybersecurity in Edge IIoT networks: An asynchronous federated learning approach with a deep hybrid detection model
Syed Muhammad Salman Bukhari, Muhammad Hamza Zafar, Mohamad Abou Houran, et al.
Internet of Things (2024) Vol. 27, pp. 101252-101252
Open Access | Times Cited: 7
Syed Muhammad Salman Bukhari, Muhammad Hamza Zafar, Mohamad Abou Houran, et al.
Internet of Things (2024) Vol. 27, pp. 101252-101252
Open Access | Times Cited: 7
A lightweight mini-batch federated learning approach for attack detection in IoT
Mir Shahnawaz Ahmad, Shahid Mehraj Shah
Internet of Things (2024) Vol. 25, pp. 101088-101088
Closed Access | Times Cited: 5
Mir Shahnawaz Ahmad, Shahid Mehraj Shah
Internet of Things (2024) Vol. 25, pp. 101088-101088
Closed Access | Times Cited: 5
Fed-MPS: Federated learning with local differential privacy using model parameter selection for resource-constrained CPS
Shui Jiang, Xiaoding Wang, Youxiong Que, et al.
Journal of Systems Architecture (2024) Vol. 150, pp. 103108-103108
Closed Access | Times Cited: 5
Shui Jiang, Xiaoding Wang, Youxiong Que, et al.
Journal of Systems Architecture (2024) Vol. 150, pp. 103108-103108
Closed Access | Times Cited: 5
Combatting ransomware in ZephyrOS-activated industrial IoT environments
Usman Tariq
Heliyon (2024) Vol. 10, Iss. 9, pp. e29917-e29917
Open Access | Times Cited: 5
Usman Tariq
Heliyon (2024) Vol. 10, Iss. 9, pp. e29917-e29917
Open Access | Times Cited: 5
Meta-Fed IDS: Meta-Learning and Federated Learning Based Fog-Cloud Approach to Detect Known and Zero-Day Cyber Attacks in IoMT Networks
Umer Zukaib, Xiaohui Cui, Chengliang Zheng, et al.
Journal of Parallel and Distributed Computing (2024) Vol. 192, pp. 104934-104934
Closed Access | Times Cited: 5
Umer Zukaib, Xiaohui Cui, Chengliang Zheng, et al.
Journal of Parallel and Distributed Computing (2024) Vol. 192, pp. 104934-104934
Closed Access | Times Cited: 5
Towards Secure and Efficient Data Aggregation in Blockchain‐Driven IoT Environments: A Comprehensive and Systematic Study
Xiaofang Tong, Marzieh Hamzei, Nima Jafari
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 2
Closed Access
Xiaofang Tong, Marzieh Hamzei, Nima Jafari
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 2
Closed Access
GuardianAI: Privacy-preserving Federated Anomaly Detection with Differential Privacy
Abdulatif Alabdulatif
Array (2025), pp. 100381-100381
Open Access
Abdulatif Alabdulatif
Array (2025), pp. 100381-100381
Open Access
Heuristic and approximate steiner tree algorithms for ensuring network connectivity in mobile wireless sensor networks
Son Nguyen, Thi Nguyen, Trinh Minh, et al.
Journal of Network and Computer Applications (2025), pp. 104155-104155
Closed Access
Son Nguyen, Thi Nguyen, Trinh Minh, et al.
Journal of Network and Computer Applications (2025), pp. 104155-104155
Closed Access