OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Privacy-Preserving Face Recognition With Multi-Edge Assistance for Intelligent Security Systems
Wenjing Gao, Jia Yu, Rong Hao, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 12, pp. 10948-10958
Closed Access | Times Cited: 14

Showing 14 citing articles:

Maintaining Privacy in Face Recognition Using Federated Learning Method
Abraham Woubie, Enoch Solomon, Joseph Attieh
IEEE Access (2024) Vol. 12, pp. 39603-39613
Open Access | Times Cited: 6

Machine Learning Assisted Self‐Powered Identity Recognition Based on Thermogalvanic Hydrogel for Intelligent Security
Xueliang Ma, Wenxu Wang, Xiaojing Cui, et al.
Small (2024)
Closed Access | Times Cited: 5

Privacy-Preserving Face Recognition Using Trainable Feature Subtraction
Yuxi Mi, Z. Zhong, Yuge Huang, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2024), pp. 297-307
Closed Access | Times Cited: 5

MRFE: A Deep-Learning-Based Multidimensional Radio Frequency Fingerprinting Enhancement Approach for IoT Device Identification
Qian Lu, Zaikai Yang, Hanlin Zhang, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 18, pp. 30442-30454
Closed Access | Times Cited: 3

Lightweight Secure Deduplication Based on Data Popularity
Zhiqiang Wang, Wenjing Gao, Jia Yu, et al.
IEEE Systems Journal (2023) Vol. 17, Iss. 4, pp. 5531-5542
Closed Access | Times Cited: 4

Privacy-Preserving Edge Assistance for Solving Matrix Eigenvalue Problem
Xiaotong Zhao, Hanlin Zhang, Jie Lin, et al.
(2024), pp. 1-6
Closed Access

An efficient position-sensitive fuzzy keyword search scheme for encrypted data on hybrid cloud
Nan Li, Qianqian Su
Cluster Computing (2024) Vol. 28, Iss. 1
Closed Access

Privacy-preserving and verifiable convolution neural network inference and training in cloud computing
Wei Cao, Wenting Shen, Jing Qin, et al.
Future Generation Computer Systems (2024), pp. 107560-107560
Closed Access

Time-limited ownership delegation scheme with revocation security for healthcare
Xiaoping Zhao, Qianqian Su
Cluster Computing (2024)
Closed Access

Enabling Privacy-Preserving Parallel Computation of Linear Regression in Edge Computing Networks
Wenjing Gao, Jia Yu, Huaqun Wang
IEEE Transactions on Cloud Computing (2024) Vol. 12, Iss. 4, pp. 1103-1115
Closed Access

An Efficient Privacy-Preserving Face Authentication Scheme Using Local Sensitive Hashing
Hui Zhu, Ling Xiong, XuCheng Zhang
(2024) Vol. 17, pp. 123-128
Closed Access

Secure and Efficient Face Recognition via Supervised Federated Learning
Enoch Solomon, Abraham Woubie, Eyael Solomon Emiru, et al.
(2024), pp. 291-296
Closed Access

Table of Contents

IEEE Internet of Things Journal (2023) Vol. 10, Iss. 12, pp. i-iii
Open Access

An Efficient and Privacy preserving Computation Framework for Tibetan medicine
Ruoli Zhao, Yong Xie, Lijun Zhang, et al.
(2023), pp. 53-58
Closed Access

Page 1

Scroll to top