
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Heterogeneous and Customized Cost-Efficient Reversible Image Degradation for Green IoT
Ruoyu Zhao, Yushu Zhang, Rushi Lan, et al.
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 3, pp. 2630-2645
Closed Access | Times Cited: 16
Ruoyu Zhao, Yushu Zhang, Rushi Lan, et al.
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 3, pp. 2630-2645
Closed Access | Times Cited: 16
Showing 16 citing articles:
A Novel Image Encryption Algorithm Based on Cyclic Chaotic Map in Industrial IoT Environments
Moatsum Alawida
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 8, pp. 10530-10541
Closed Access | Times Cited: 12
Moatsum Alawida
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 8, pp. 10530-10541
Closed Access | Times Cited: 12
Privacy-Preserving TPE-Based JPEG Image Retrieval in Cloud-Assisted Internet of Things
Yakun Ma, Xiuli Chai, Zhihua Gan, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 3, pp. 4842-4856
Closed Access | Times Cited: 21
Yakun Ma, Xiuli Chai, Zhihua Gan, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 3, pp. 4842-4856
Closed Access | Times Cited: 21
RAE-VWP: A Reversible Adversarial Example-Based Privacy and Copyright Protection Method of Medical Images for Internet of Medical Things
Zhen Chen, Xiuli Chai, Zhihua Gan, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 11, pp. 20757-20768
Closed Access | Times Cited: 6
Zhen Chen, Xiuli Chai, Zhihua Gan, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 11, pp. 20757-20768
Closed Access | Times Cited: 6
OSMRD-IE: Octal-Based Shuffling and Multilayer Rotational Diffusing Image Encryption Using 2-D Hybrid Michalewicz–Ackley Map
Uğur Erkan, Abdurrahim Toktaş, Samet Memiş, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 21, pp. 35113-35123
Closed Access | Times Cited: 6
Uğur Erkan, Abdurrahim Toktaş, Samet Memiş, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 21, pp. 35113-35123
Closed Access | Times Cited: 6
All Roads Lead to Rome: Achieving 3D Object Encryption through 2D Image Encryption Methods
Ruoyu Zhao, Yushu Zhang, Rushi Lan, et al.
IEEE Transactions on Image Processing (2025) Vol. 34, pp. 1075-1089
Closed Access
Ruoyu Zhao, Yushu Zhang, Rushi Lan, et al.
IEEE Transactions on Image Processing (2025) Vol. 34, pp. 1075-1089
Closed Access
Usability Enhanced Thumbnail-Preserving Encryption Based on Data Hiding for JPEG Images
Xi Ye, Yushu Zhang, Xiangli Xiao, et al.
IEEE Signal Processing Letters (2023) Vol. 30, pp. 793-797
Closed Access | Times Cited: 11
Xi Ye, Yushu Zhang, Xiangli Xiao, et al.
IEEE Signal Processing Letters (2023) Vol. 30, pp. 793-797
Closed Access | Times Cited: 11
Exploiting Size-Compatible-Match Block Technique for Arbitrary-Size Thumbnail-Preserving Encryption
Dezhi An, Dawei Hao, Jun Lu, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 10, pp. 17357-17371
Closed Access | Times Cited: 2
Dezhi An, Dawei Hao, Jun Lu, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 10, pp. 17357-17371
Closed Access | Times Cited: 2
TPE-AP: Thumbnail-Preserving Encryption Based on Adjustable Precision for JPEG Images
Xiuli Chai, Gongyao Cao, Zhihua Gan, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 22, pp. 37021-37031
Closed Access | Times Cited: 2
Xiuli Chai, Gongyao Cao, Zhihua Gan, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 22, pp. 37021-37031
Closed Access | Times Cited: 2
E-TPE: E fficient T humbnail- P reserving E ncryption for Privacy Protection in Visual Sensor Networks
Ruoyu Zhao, Yushu Zhang, Wenying Wen, et al.
ACM Transactions on Sensor Networks (2023) Vol. 20, Iss. 4, pp. 1-26
Closed Access | Times Cited: 6
Ruoyu Zhao, Yushu Zhang, Wenying Wen, et al.
ACM Transactions on Sensor Networks (2023) Vol. 20, Iss. 4, pp. 1-26
Closed Access | Times Cited: 6
IoT Privacy Protection: JPEG-TPE With Lower File Size Expansion and Lossless Decryption
Yuan Yuan, Hongjie He, Hadi Amirpour, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 13, pp. 23485-23496
Closed Access | Times Cited: 1
Yuan Yuan, Hongjie He, Hadi Amirpour, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 13, pp. 23485-23496
Closed Access | Times Cited: 1
Visually Semantics-Aware Color Image Encryption Based on Cross-Plane Substitution and Permutation
Yongming Zhang, Ruoyu Zhao, Yushu Zhang, et al.
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 8, pp. 10576-10586
Closed Access | Times Cited: 1
Yongming Zhang, Ruoyu Zhao, Yushu Zhang, et al.
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 8, pp. 10576-10586
Closed Access | Times Cited: 1
Enhancing privacy management protection through secure and efficient processing of image information based on the fine-grained thumbnail-preserving encryption
Yun Luo, Yuling Chen, Hui Dou, et al.
Information Processing & Management (2024) Vol. 61, Iss. 5, pp. 103789-103789
Open Access | Times Cited: 1
Yun Luo, Yuling Chen, Hui Dou, et al.
Information Processing & Management (2024) Vol. 61, Iss. 5, pp. 103789-103789
Open Access | Times Cited: 1
3D mesh encryption with differentiated visual effect and high efficiency based on chaotic system
Ruoyu Zhao, Yushu Zhang, Shimin Li, et al.
Expert Systems with Applications (2023) Vol. 238, pp. 122140-122140
Closed Access | Times Cited: 3
Ruoyu Zhao, Yushu Zhang, Shimin Li, et al.
Expert Systems with Applications (2023) Vol. 238, pp. 122140-122140
Closed Access | Times Cited: 3
Chaotic CS Encryption: An Efficient Image Encryption Algorithm Based on Chebyshev Chaotic System and Compressive Sensing
Mingliang Sun, Jie Yuan, Xiaoyong Li, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 2, pp. 2625-2646
Open Access
Mingliang Sun, Jie Yuan, Xiaoyong Li, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 2, pp. 2625-2646
Open Access
Reversible image resolution degradation supporting privacy protection and usability management in the cloud for smart cities
Ruoyu Zhao, Moting Su, Feng’en Li, et al.
Expert Systems with Applications (2024), pp. 125851-125851
Closed Access
Ruoyu Zhao, Moting Su, Feng’en Li, et al.
Expert Systems with Applications (2024), pp. 125851-125851
Closed Access
Seeing is not Believing: An Identity Hider for Human Vision Privacy Protection
Tao Wang, Yushu Zhang, Zixuan Yang, et al.
arXiv (Cornell University) (2023)
Open Access
Tao Wang, Yushu Zhang, Zixuan Yang, et al.
arXiv (Cornell University) (2023)
Open Access