
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Towards a Unified Framework for Physical Layer Security in 5G and Beyond Networks
Muhammad Sohaib J. Solaija, Hanadi Salman, Hüseyin Arslan
IEEE Open Journal of Vehicular Technology (2022) Vol. 3, pp. 321-343
Open Access | Times Cited: 33
Muhammad Sohaib J. Solaija, Hanadi Salman, Hüseyin Arslan
IEEE Open Journal of Vehicular Technology (2022) Vol. 3, pp. 321-343
Open Access | Times Cited: 33
Showing 1-25 of 33 citing articles:
Artificial intelligence empowered physical layer security for 6G: State-of-the-art, challenges, and opportunities
Shunliang Zhang, Dali Zhu, Yinlong Liu
Computer Networks (2024) Vol. 242, pp. 110255-110255
Closed Access | Times Cited: 17
Shunliang Zhang, Dali Zhu, Yinlong Liu
Computer Networks (2024) Vol. 242, pp. 110255-110255
Closed Access | Times Cited: 17
Reconfigurable Intelligent Surface for Physical Layer Security in 6G-IoT: Designs, Issues, and Advances
Waqas Khalid, Muhammad Atif Ur Rehman, Trinh Van Chien, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 2, pp. 3599-3613
Open Access | Times Cited: 37
Waqas Khalid, Muhammad Atif Ur Rehman, Trinh Van Chien, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 2, pp. 3599-3613
Open Access | Times Cited: 37
Physical Layer Security for Authentication, Confidentiality, and Malicious Node Detection: A Paradigm Shift in Securing IoT Networks
Elmehdi Illi, Marwa Qaraqe, Saud Althunibat, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 26, Iss. 1, pp. 347-388
Open Access | Times Cited: 29
Elmehdi Illi, Marwa Qaraqe, Saud Althunibat, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 26, Iss. 1, pp. 347-388
Open Access | Times Cited: 29
A Survey of Symbiotic Radio: Methodologies, Applications, and Future Directions
Muhammad Bilal Janjua, Hüseyin Arslan
Sensors (2023) Vol. 23, Iss. 5, pp. 2511-2511
Open Access | Times Cited: 13
Muhammad Bilal Janjua, Hüseyin Arslan
Sensors (2023) Vol. 23, Iss. 5, pp. 2511-2511
Open Access | Times Cited: 13
Physical Layer Authentication and Security Design in the Machine Learning Era
Tiep M. Hoang, Alireza Vahid, Hoang Duong Tuan, et al.
IEEE Communications Surveys & Tutorials (2024) Vol. 26, Iss. 3, pp. 1830-1860
Open Access | Times Cited: 5
Tiep M. Hoang, Alireza Vahid, Hoang Duong Tuan, et al.
IEEE Communications Surveys & Tutorials (2024) Vol. 26, Iss. 3, pp. 1830-1860
Open Access | Times Cited: 5
Secrecy Rate Maximization for Symbiotic Radio Network with Relay-Obstacle
Muhammed Yusuf Onay
International Journal of Computational and Experimental Science and Engineering (2024) Vol. 10, Iss. 3
Open Access | Times Cited: 5
Muhammed Yusuf Onay
International Journal of Computational and Experimental Science and Engineering (2024) Vol. 10, Iss. 3
Open Access | Times Cited: 5
A Survey on Physical Layer Security for 5G/6G Communications over Different Fading Channels: Approaches, Challenges, and Future Directions
Parmila Devi, Manoranjan Rai Bharti, Dikshant Gautam
Vehicular Communications (2025), pp. 100891-100891
Closed Access
Parmila Devi, Manoranjan Rai Bharti, Dikshant Gautam
Vehicular Communications (2025), pp. 100891-100891
Closed Access
Physical layer security techniques for grant-free massive Machine-Type Communications in 5G and beyond: A survey, challenges, and future directions
Uchenna P. Enwereonye, Ahmad Salehi S., Hooman Alavizadeh, et al.
Computer Networks (2025), pp. 111268-111268
Closed Access
Uchenna P. Enwereonye, Ahmad Salehi S., Hooman Alavizadeh, et al.
Computer Networks (2025), pp. 111268-111268
Closed Access
Full-Duplex Constant-Envelope Jamceiver and Self-Interference Suppression by Highpass Filter: Experimental Validation for Wi-Fi Security
Jaakko Marin, Micael Bernhardt, Taneli Riihonen
IEEE Journal on Selected Areas in Communications (2023) Vol. 41, Iss. 9, pp. 2937-2950
Open Access | Times Cited: 9
Jaakko Marin, Micael Bernhardt, Taneli Riihonen
IEEE Journal on Selected Areas in Communications (2023) Vol. 41, Iss. 9, pp. 2937-2950
Open Access | Times Cited: 9
A Physical-Layer Security Cooperative Framework for Mitigating Interference and Eavesdropping Attacks in Internet of Things Environments
Abdallah Farraj, Eman Hammad
Sensors (2024) Vol. 24, Iss. 16, pp. 5171-5171
Open Access | Times Cited: 3
Abdallah Farraj, Eman Hammad
Sensors (2024) Vol. 24, Iss. 16, pp. 5171-5171
Open Access | Times Cited: 3
PLS-IoT Enhancement Against Eavesdropping via Spatially Distributed Constellation Obfuscation
Hanadi Salman, Hüseyin Arslan
IEEE Wireless Communications Letters (2023) Vol. 12, Iss. 9, pp. 1508-1512
Closed Access | Times Cited: 8
Hanadi Salman, Hüseyin Arslan
IEEE Wireless Communications Letters (2023) Vol. 12, Iss. 9, pp. 1508-1512
Closed Access | Times Cited: 8
Federated Learning-Enabled Smart Jammer Detection in Terrestrial and Non-Terrestrial Heterogeneous Joint Sensing and Communication Networks
Hamda Bouzabia, Aida Meftah, Georges Kaddoum
IEEE Communications Letters (2024) Vol. 28, Iss. 9, pp. 2026-2030
Closed Access | Times Cited: 2
Hamda Bouzabia, Aida Meftah, Georges Kaddoum
IEEE Communications Letters (2024) Vol. 28, Iss. 9, pp. 2026-2030
Closed Access | Times Cited: 2
A systematic survey on physical layer security oriented to reconfigurable intelligent surface empowered 6G
Shunliang Zhang, Weiqing Huang, Yinlong Liu
Computers & Security (2024) Vol. 148, pp. 104100-104100
Closed Access | Times Cited: 2
Shunliang Zhang, Weiqing Huang, Yinlong Liu
Computers & Security (2024) Vol. 148, pp. 104100-104100
Closed Access | Times Cited: 2
Security-aware energy-efficient design for mobile edge computing network operating with finite blocklength codes
Chenhao Shi, Yulin Hu, Yao Zhu, et al.
EURASIP Journal on Wireless Communications and Networking (2024) Vol. 2024, Iss. 1
Open Access | Times Cited: 1
Chenhao Shi, Yulin Hu, Yao Zhu, et al.
EURASIP Journal on Wireless Communications and Networking (2024) Vol. 2024, Iss. 1
Open Access | Times Cited: 1
FPLA: A Flexible Physical Layer Authentication Mechanism for Distributing Quantum Keys Securely via Wireless 5G Channels
Yuxuan Li, Jingyuan Han, Gang Liu, et al.
Applied Sciences (2023) Vol. 13, Iss. 13, pp. 7699-7699
Open Access | Times Cited: 2
Yuxuan Li, Jingyuan Han, Gang Liu, et al.
Applied Sciences (2023) Vol. 13, Iss. 13, pp. 7699-7699
Open Access | Times Cited: 2
Secure Pilot Allocation for Integrated Sensing and Communication
Muhammad Bilal Janjua, Ebubekir Memişoğlu, Khalid Qaraqe, et al.
2022 IEEE Globecom Workshops (GC Wkshps) (2022)
Closed Access | Times Cited: 3
Muhammad Bilal Janjua, Ebubekir Memişoğlu, Khalid Qaraqe, et al.
2022 IEEE Globecom Workshops (GC Wkshps) (2022)
Closed Access | Times Cited: 3
Physical Layer Security for AI-Generated Content: Power and Elements Allocation for Active RIS
Junhao Duan, Ying Zhang, Jinyuan Gu, et al.
IEEE Transactions on Consumer Electronics (2024) Vol. 70, Iss. 1, pp. 839-848
Closed Access
Junhao Duan, Ying Zhang, Jinyuan Gu, et al.
IEEE Transactions on Consumer Electronics (2024) Vol. 70, Iss. 1, pp. 839-848
Closed Access
Wireless Network Analytics for the New Era of Spectrum Patrolling and Monitoring
Enrico Testi, Andrea Giorgetti
IEEE Wireless Communications (2024) Vol. 31, Iss. 4, pp. 230-236
Closed Access
Enrico Testi, Andrea Giorgetti
IEEE Wireless Communications (2024) Vol. 31, Iss. 4, pp. 230-236
Closed Access
Resource allocation algorithm for downlink secure transmission in wireless EH cooperative networks with idle relay-assisted jamming
Xintong Zhou, Kun Xiao, Feng Ke
Digital Communications and Networks (2024)
Open Access
Xintong Zhou, Kun Xiao, Feng Ke
Digital Communications and Networks (2024)
Open Access
Physical layer security for confidential transmissions in frequency hopping-based downlink NOMA networks
Amani Benamor, Oussama Habachi, Jean‐Pierre Cances, et al.
Computer Networks (2024) Vol. 254, pp. 110821-110821
Open Access
Amani Benamor, Oussama Habachi, Jean‐Pierre Cances, et al.
Computer Networks (2024) Vol. 254, pp. 110821-110821
Open Access
Secure short-packet communications in power beacon-assisted IoT networks over Nakagami-m fading channels
Dechuan Chen, Jin Li, Jianwei Hu, et al.
EURASIP Journal on Wireless Communications and Networking (2024) Vol. 2024, Iss. 1
Open Access
Dechuan Chen, Jin Li, Jianwei Hu, et al.
EURASIP Journal on Wireless Communications and Networking (2024) Vol. 2024, Iss. 1
Open Access
Secrecy Rate Performance Analysis of Jammer-Aided Symbiotic Radio with Sensing Errors for Fifth Generation Wireless Networks
Muhammed Yusuf Onay
Applied Sciences (2024) Vol. 15, Iss. 1, pp. 289-289
Open Access
Muhammed Yusuf Onay
Applied Sciences (2024) Vol. 15, Iss. 1, pp. 289-289
Open Access
Secrecy Performance Enhancement Using Self-Interference Cancellation in Wireless Mutual Broadcast Networks for Proximity-Based Services
Taesoo Kwon, HyeonWoo Lee
Sensors (2024) Vol. 24, Iss. 11, pp. 3389-3389
Open Access
Taesoo Kwon, HyeonWoo Lee
Sensors (2024) Vol. 24, Iss. 11, pp. 3389-3389
Open Access
On the physical layer security of visible light communications empowered by gold nanoparticles
Geonho Han, Hyuckjin Choi, Ryeong Myeong Kim, et al.
Journal of Optical Communications and Networking (2024) Vol. 16, Iss. 7, pp. 750-750
Open Access
Geonho Han, Hyuckjin Choi, Ryeong Myeong Kim, et al.
Journal of Optical Communications and Networking (2024) Vol. 16, Iss. 7, pp. 750-750
Open Access
Secrecy Capacity Analysis Using Nonlinear Transmissions for Physical Layer Security
Jieling Wang, Zhiqian Wang, Mathini Sellathurai, et al.
Wireless Personal Communications (2024) Vol. 136, Iss. 2, pp. 883-897
Closed Access
Jieling Wang, Zhiqian Wang, Mathini Sellathurai, et al.
Wireless Personal Communications (2024) Vol. 136, Iss. 2, pp. 883-897
Closed Access