OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Trusted AI in Multiagent Systems: An Overview of Privacy and Security for Distributed Learning
Chuan Ma, Jun Li, Kang Wei, et al.
Proceedings of the IEEE (2023) Vol. 111, Iss. 9, pp. 1097-1132
Open Access | Times Cited: 31

Showing 1-25 of 31 citing articles:

Distributed Artificial Intelligence Empowered by End-Edge-Cloud Computing: A Survey
Sijing Duan, Dan Wang, Ju Ren, et al.
IEEE Communications Surveys & Tutorials (2022) Vol. 25, Iss. 1, pp. 591-624
Closed Access | Times Cited: 139

A Review of Trustworthy and Explainable Artificial Intelligence (XAI)
Vinay Chamola, Vikas Hassija, A. Razia Sulthana, et al.
IEEE Access (2023) Vol. 11, pp. 78994-79015
Open Access | Times Cited: 88

A Human-Centric Metaverse Enabled by Brain-Computer Interface: A Survey
Howe Yuan Zhu, Nguyen Quang Hieu, Dinh Thai Hoang, et al.
IEEE Communications Surveys & Tutorials (2024) Vol. 26, Iss. 3, pp. 2120-2145
Open Access | Times Cited: 15

Edge Learning for 6G-Enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses
Mohamed Amine Ferrag, Othmane Friha, Burak Kantarcı, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 4, pp. 2654-2713
Open Access | Times Cited: 22

Bidirectional domain transfer knowledge distillation for catastrophic forgetting in federated learning with heterogeneous data
Qi Min, Fei Luo, Wenbo Dong, et al.
Knowledge-Based Systems (2025), pp. 113008-113008
Closed Access

Multi-Agent AI: From Isolated Agents to Cooperative Ecosystems
K. Rajan, David Arango
(2025)
Closed Access

Intentions and Premises
Alp Cenk Arslan
Advances in public policy and administration (APPA) book series (2025), pp. 321-360
Closed Access

Secure and Efficient Federated Learning With Provable Performance Guarantees via Stochastic Quantization
Xinchen Lyu, Xinyun Hou, Chenshan Ren, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 4070-4085
Closed Access | Times Cited: 4

End-Edge Collaborative Lightweight Secure Federated Learning for Anomaly Detection of Wireless Industrial Control Systems
Chi Xu, Xinyi Du, Lin Li, et al.
IEEE Open Journal of the Industrial Electronics Society (2024) Vol. 5, pp. 132-142
Open Access | Times Cited: 2

Over-the-Air Computation for Distributed Systems: Something Old and Something New
Zheng Chen, Erik G. Larsson, Carlo Fischione, et al.
IEEE Network (2023) Vol. 37, Iss. 5, pp. 240-246
Open Access | Times Cited: 7

I/O Efficient Label-Constrained Reachability Queries in Large Graphs
Long Yuan, Xia Li, Zi Chen, et al.
Proceedings of the VLDB Endowment (2024) Vol. 17, Iss. 10, pp. 2590-2602
Closed Access | Times Cited: 2

Privacy-Preserving Edge Intelligence: A Perspective of Constrained Bandits
Tianyi Zhang, Shangshang Wang, Yinxu Tang, et al.
2022 IEEE Wireless Communications and Networking Conference (WCNC) (2024), pp. 1-6
Closed Access | Times Cited: 1

Real Time Poisoning Attacks and Privacy Strategies on Machine Learning Systems
A T Archa, K. Kartheeban
(2024), pp. 183-189
Closed Access | Times Cited: 1

Combining federated learning and control: A survey
Jakob Weber, Markus Gurtner, Amadeus Lobe, et al.
IET Control Theory and Applications (2024)
Open Access | Times Cited: 1

Privacy-Preserving Neural Networks for Smart Manufacturing
Hankang Lee, Daniel A. Finke, Hui Yang
Journal of Computing and Information Science in Engineering (2023) Vol. 24, Iss. 7
Closed Access | Times Cited: 4

طريقة حماية خصوصية الموقع الواعية للسياق
Haohua Qing, Roliana Bt Ibrahim, Hui Wen Nies
Baghdad Science Journal (2024), pp. 3344-3344
Open Access | Times Cited: 1

Designing Security for the Sixth Generation: About Necessity, Concepts and Opportunities
Christoph Lipps, Annika Tjabben, Matthias Rüb, et al.
European Conference on Cyber Warfare and Security (2023) Vol. 22, Iss. 1, pp. 267-275
Open Access | Times Cited: 3

Privacy-Engineered Value Decomposition Networks for Cooperative Multi-Agent Reinforcement Learning
Parham Gohari, Matthew Hale, Ufuk Topcu
(2023), pp. 8038-8044
Open Access | Times Cited: 2

Authentication in a Hyperconnected World: Challenges, Opportunities and Approaches
Christoph Lipps, Jan Herbst, Rekha Reddy, et al.
International Conference on Cyber Warfare and Security (2024) Vol. 19, Iss. 1, pp. 112-120
Open Access

Introduction
Yunqian Wen, Bo Liu, Li Song, et al.
(2024), pp. 3-13
Closed Access

SecureTransfer: A Transfer Learning Based Poison Attack Detection in ML Systems
A T Archa, K. Kartheeban
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 7
Open Access

Decision Transformer-Based Efficient Data Offloading in LEO-IoT
Pengcheng Xia, Mengfei Zang, Jie Zhao, et al.
Entropy (2024) Vol. 26, Iss. 10, pp. 846-846
Open Access

Semantic-based defense mechanism for ai model networks using rich semantic identifier mapping
Linjiang Ba, Jianfeng Guan, Jinheng Jiang
Computers & Electrical Engineering (2024) Vol. 122, pp. 109977-109977
Closed Access

Perspective Chapter: Artificial Intelligence in Security Platform
Hany Helmy, El Diasty Sherif, Shatila Hazem
Artificial intelligence (2024)
Open Access

Page 1 - Next Page

Scroll to top