OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Cross-Modal Text Steganography Against Synonym Substitution-Based Text Attack
Wanli Peng, Tao Wang, Zhenxing Qian, et al.
IEEE Signal Processing Letters (2023) Vol. 30, pp. 299-303
Closed Access | Times Cited: 9

Showing 9 citing articles:

A Robust Coverless Video Steganography Based on the Similarity of Inter-Frames
Laijin Meng, Xinghao Jiang, Tanfeng Sun, et al.
IEEE Transactions on Multimedia (2023) Vol. 26, pp. 5996-6011
Closed Access | Times Cited: 5

Expert System for Extracting Hidden Information from Electronic Documents during Outgoing Control
Lingling Tan, Junkai Yi
Electronics (2024) Vol. 13, Iss. 15, pp. 2924-2924
Open Access | Times Cited: 1

Adaptive Domain-Invariant Feature Extraction for Cross-Domain Linguistic Steganalysis
Yiming Xue, Jiaxuan Wu, Ronghua Ji, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 19, pp. 920-933
Closed Access | Times Cited: 3

Text steganography: enhanced character-level embedding algorithm using font attribute with increased resilience to statistical attacks
Shreya Narasimhan KL, R. Balakrishnan
Multimedia Tools and Applications (2024)
Closed Access

A Test-Time Entropy Minimization Method for Cross-Domain Linguistic Steganalysis
Jiaxuan Wu, Xin Chen, Juan Wen, et al.
IEEE Signal Processing Letters (2024) Vol. 31, pp. 1760-1764
Closed Access

A Coverless Image Steganography Based on a Robust Object Detection Network
Laijin Meng, Xinghao Jiang, Qiang Xu, et al.
Lecture notes in computer science (2024), pp. 343-356
Closed Access

Generative Text Steganography with Large Language Model
Jiaxuan Wu, Zhengxian Wu, Yiming Xue, et al.
(2024), pp. 10345-10353
Closed Access

Robust Audio-Image Steganography using Cross-Modal Based Transformer Models
Mark Taremwa, Roger - Nick Anaedevha, Alexander G. Trofimov
Research Square (Research Square) (2024)
Closed Access

A Hybrid Cryptography Method using Extended Letters in Arabic and Persian Language
Eric Ke Wang
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 7
Open Access

Page 1

Scroll to top