OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Toward Lightweight, Privacy-Preserving Cooperative Object Classification for Connected Autonomous Vehicles
Jinbo Xiong, Renwan Bi, Youliang Tian, et al.
IEEE Internet of Things Journal (2021) Vol. 9, Iss. 4, pp. 2787-2801
Closed Access | Times Cited: 55

Showing 1-25 of 55 citing articles:

Collaborative Perception in Autonomous Driving: Methods, Datasets, and Challenges
Yushan Han, Hui Zhang, Huifang Li, et al.
IEEE Intelligent Transportation Systems Magazine (2023) Vol. 15, Iss. 6, pp. 131-151
Open Access | Times Cited: 52

Privacy and Security Concerns in Generative AI: A Comprehensive Survey
Abenezer Golda, Kidus Abebe Mekonen, Amit Pandey, et al.
IEEE Access (2024) Vol. 12, pp. 48126-48144
Open Access | Times Cited: 47

Robust and Privacy-Preserving Decentralized Deep Federated Learning Training: Focusing on Digital Healthcare Applications
Youliang Tian, Shuai Wang, Jinbo Xiong, et al.
IEEE/ACM Transactions on Computational Biology and Bioinformatics (2023) Vol. 21, Iss. 4, pp. 890-901
Closed Access | Times Cited: 46

Federated Vehicular Transformers and Their Federations: Privacy-Preserving Computing and Cooperation for Autonomous Driving
Yonglin Tian, Jiangong Wang, Yutong Wang, et al.
IEEE Transactions on Intelligent Vehicles (2022) Vol. 7, Iss. 3, pp. 456-465
Closed Access | Times Cited: 48

Secure, Efficient, and Weighted Access Control for Cloud-Assisted Industrial IoT
Qi Li, Qianqian Zhang, Haiping Huang, et al.
IEEE Internet of Things Journal (2022) Vol. 9, Iss. 18, pp. 16917-16927
Closed Access | Times Cited: 35

Achieving Lightweight and Privacy-Preserving Object Detection for Connected Autonomous Vehicles
Renwan Bi, Jinbo Xiong, Youliang Tian, et al.
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 3, pp. 2314-2329
Closed Access | Times Cited: 24

Long Term Indian Ocean Dipole (IOD) Index Prediction Used Deep Learning by convLSTM
Chen Li, Yuan Feng, Tianying Sun, et al.
Remote Sensing (2022) Vol. 14, Iss. 3, pp. 523-523
Open Access | Times Cited: 22

Privacy-Enhanced Multi-Region Data Aggregation for Internet of Vehicles
H. L. Dai, Yuanyuan Zhang, Li Lin, et al.
Vehicular Communications (2025), pp. 100886-100886
Closed Access

Advanced Data Classification Framework for Enhancing Cyber Security in Autonomous Vehicles
Shiva Ram Neupane, Weiqing Sun
Automation (2025) Vol. 6, Iss. 1, pp. 5-5
Open Access

Edge-Cooperative Privacy-Preserving Object Detection Over Random Point Cloud Shares for Connected Autonomous Vehicles
Renwan Bi, Jinbo Xiong, Youliang Tian, et al.
IEEE Transactions on Intelligent Transportation Systems (2022) Vol. 23, Iss. 12, pp. 24979-24990
Closed Access | Times Cited: 20

ALPS: Achieving accuracy-aware location privacy service via assisted regions
Shaobo Zhang, Tao Guo, Qin Liu, et al.
Future Generation Computer Systems (2023) Vol. 145, pp. 189-199
Closed Access | Times Cited: 10

Outsourced and Privacy-Preserving Collaborative k-Prototype Clustering for Mixed Data via Additive Secret Sharing
Renwan Bi, Da‐Long Guo, Yuanyuan Zhang, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 18, pp. 15810-15821
Closed Access | Times Cited: 9

Securing Dual-Channel Audio Communication With a 2-D Infinite Collapse and Logistic Map
Rui Wu, Suo Gao, Herbert Ho‐Ching Iu, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 6, pp. 10214-10223
Closed Access | Times Cited: 9

PCNNCEC: Efficient and Privacy-Preserving Convolutional Neural Network Inference Based on Cloud-Edge-Client Collaboration
Jing Wang, Debiao He, Aniello Castiglione, et al.
IEEE Transactions on Network Science and Engineering (2022) Vol. 10, Iss. 5, pp. 2906-2923
Closed Access | Times Cited: 15

Privacy-preserving DeepFake face image detection
Beijing Chen, Xin Liu, Zhihua Xia, et al.
Digital Signal Processing (2023) Vol. 143, pp. 104233-104233
Closed Access | Times Cited: 8

Privacy-preserving image retrieval based on additive secret sharing in cloud environment
Bo Zhang, Yanyan Xu, Yuejing Yan, et al.
Cluster Computing (2024) Vol. 27, Iss. 4, pp. 5021-5045
Open Access | Times Cited: 2

A fine‐grained medical data sharing scheme based on federated learning
Wei Liu, Yinghui Zhang, Yi‐Fei Li, et al.
Concurrency and Computation Practice and Experience (2022) Vol. 35, Iss. 20
Closed Access | Times Cited: 8

Improved Vessel Trajectory Prediction Model Based on Stacked-BiGRUs
Yang Xu, Jilin Zhang, Yongjian Ren, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-17
Open Access | Times Cited: 8

The Performance Analysis of Complex-Valued Neural Network in Radio Signal Recognition
Jie Xu, Chengyu Wu, Shuangshuang Ying, et al.
IEEE Access (2022) Vol. 10, pp. 48708-48718
Open Access | Times Cited: 8

Employing cross-domain modelings for robust object detection in dynamic environment of autonomous vehicles
Oshin Rawlley, Shashank Gupta, Hardik Kathera, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 1

Differentially Private Recurrent Variational Autoencoder For Text Privacy Preservation
Yuyang Wang, Xianjia Meng, Ximeng Liu
Mobile Networks and Applications (2023) Vol. 28, Iss. 5, pp. 1565-1580
Open Access | Times Cited: 4

A Vehicle Classification System for Intelligent Transport System using Machine Learning in Constrained Environment
Ahmed S. Alghamdi, Talha Imran, Khalid T. Mursi, et al.
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 7
Open Access | Times Cited: 3

Multi-Authorization Attribute-Based Verifiable Encryption Scheme Based on Blockchain
Tao Feng, Fanqi Kong, Chunyan Liu, et al.
Mobile Networks and Applications (2023) Vol. 28, Iss. 5, pp. 1617-1624
Closed Access | Times Cited: 3

Mobility-Aware Federated Learning Considering Multiple Networks
D.O. Macedo, Danilo F. S. Santos, Ângelo Perkusich, et al.
Sensors (2023) Vol. 23, Iss. 14, pp. 6286-6286
Open Access | Times Cited: 2

Page 1 - Next Page

Scroll to top