
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Privacy and Efficiency-Oriented Data Sharing Mechanism for IoTs
Chao Wang, Shuo Wang, Xiaoman Cheng, et al.
IEEE Transactions on Big Data (2022) Vol. 9, Iss. 1, pp. 174-185
Closed Access | Times Cited: 22
Chao Wang, Shuo Wang, Xiaoman Cheng, et al.
IEEE Transactions on Big Data (2022) Vol. 9, Iss. 1, pp. 174-185
Closed Access | Times Cited: 22
Showing 22 citing articles:
Leveraging zero knowledge proofs for blockchain-based identity sharing: A survey of advancements, challenges and opportunities
Abebe Diro, Lu Zhou, Akanksha Saini, et al.
Journal of Information Security and Applications (2024) Vol. 80, pp. 103678-103678
Open Access | Times Cited: 49
Abebe Diro, Lu Zhou, Akanksha Saini, et al.
Journal of Information Security and Applications (2024) Vol. 80, pp. 103678-103678
Open Access | Times Cited: 49
Approximate statistic query via sampling for IoT data trading and sharing
Fan Yang, Di Zhang, Junqing Le, et al.
Computer Networks (2025), pp. 111273-111273
Closed Access
Fan Yang, Di Zhang, Junqing Le, et al.
Computer Networks (2025), pp. 111273-111273
Closed Access
Blockchain-driven decentralized identity management: An interdisciplinary review and research agenda
Zhiyue Yan, Xi Zhao, Yang Liu, et al.
Information & Management (2024) Vol. 61, Iss. 7, pp. 104026-104026
Closed Access | Times Cited: 4
Zhiyue Yan, Xi Zhao, Yang Liu, et al.
Information & Management (2024) Vol. 61, Iss. 7, pp. 104026-104026
Closed Access | Times Cited: 4
HIDE-Healthcare IoT Data Trust ManagEment: Attribute centric intelligent privacy approach
Fasee Ullah, ChiāMan Pun, Omprakash Kaiwartya, et al.
Future Generation Computer Systems (2023) Vol. 148, pp. 326-341
Open Access | Times Cited: 10
Fasee Ullah, ChiāMan Pun, Omprakash Kaiwartya, et al.
Future Generation Computer Systems (2023) Vol. 148, pp. 326-341
Open Access | Times Cited: 10
Enabling privacy-preserving multi-server collaborative search in smart healthcare
Chuan Zhang, Xingqi Luo, Qing Fan, et al.
Future Generation Computer Systems (2023) Vol. 143, pp. 265-276
Closed Access | Times Cited: 7
Chuan Zhang, Xingqi Luo, Qing Fan, et al.
Future Generation Computer Systems (2023) Vol. 143, pp. 265-276
Closed Access | Times Cited: 7
Traffic anomaly detection algorithm for CAN bus using similarity analysis
Chao Wang, X. Q. Xu, Ke Xiao, et al.
High-Confidence Computing (2024) Vol. 4, Iss. 3, pp. 100207-100207
Open Access | Times Cited: 2
Chao Wang, X. Q. Xu, Ke Xiao, et al.
High-Confidence Computing (2024) Vol. 4, Iss. 3, pp. 100207-100207
Open Access | Times Cited: 2
Optimizing Industrial IoT Data Security Through Blockchain-Enabled Incentive-Driven Game Theoretic Approach for Data Sharing
Muhammad Noman Sohail, Adeel Anjum, Iftikhar Ahmed Saeed, et al.
IEEE Access (2024) Vol. 12, pp. 51176-51192
Open Access | Times Cited: 2
Muhammad Noman Sohail, Adeel Anjum, Iftikhar Ahmed Saeed, et al.
IEEE Access (2024) Vol. 12, pp. 51176-51192
Open Access | Times Cited: 2
Efficient and Secure Data Storage for Future Networks: Review and Future Opportunities
Ahmed Saad Alsalim, Muhammad Awais Javed
IEEE Access (2024) Vol. 12, pp. 102619-102636
Open Access | Times Cited: 2
Ahmed Saad Alsalim, Muhammad Awais Javed
IEEE Access (2024) Vol. 12, pp. 102619-102636
Open Access | Times Cited: 2
BCRS-DS: A Privacy-protected data sharing scheme for IoT based on blockchain and certificateless ring signature
Qi Liu, Guijuan Wang, Biwei Yan, et al.
Journal of Information Security and Applications (2024) Vol. 87, pp. 103914-103914
Closed Access | Times Cited: 2
Qi Liu, Guijuan Wang, Biwei Yan, et al.
Journal of Information Security and Applications (2024) Vol. 87, pp. 103914-103914
Closed Access | Times Cited: 2
SBPA: Sybil-Based Backdoor Poisoning Attacks for Distributed Big Data in AIoT-Based Federated Learning System
Xiong Xiao, Zhuo Tang, Chuanying Li, et al.
IEEE Transactions on Big Data (2022) Vol. 10, Iss. 6, pp. 827-838
Closed Access | Times Cited: 9
Xiong Xiao, Zhuo Tang, Chuanying Li, et al.
IEEE Transactions on Big Data (2022) Vol. 10, Iss. 6, pp. 827-838
Closed Access | Times Cited: 9
Advancements in Security of Internet of Things Using Blockchains
Shahid Ul Haq, Ash Mohammad Abbas
(2023), pp. 1-6
Closed Access | Times Cited: 2
Shahid Ul Haq, Ash Mohammad Abbas
(2023), pp. 1-6
Closed Access | Times Cited: 2
Age of Information-Based Channel Scheduling Policy in IoT Networks Under Dynamic Channel Conditions
Chao Wang, Lu Jiang, Yunhua He, et al.
Communications in computer and information science (2024), pp. 88-98
Closed Access
Chao Wang, Lu Jiang, Yunhua He, et al.
Communications in computer and information science (2024), pp. 88-98
Closed Access
A Novel Blockchain-Based Privacy-Preserved Data Sharing Using Deep Maxout Network in Federated Learning
S. Suganthi, T. Sree Kala
International Journal of Computational Intelligence and Applications (2024) Vol. 23, Iss. 04
Closed Access
S. Suganthi, T. Sree Kala
International Journal of Computational Intelligence and Applications (2024) Vol. 23, Iss. 04
Closed Access
BFFDT: Blockchain-Based Fair and Fine-Grained Data Trading Using Proxy Re-Encryption and Verifiable Commitment
Yangyang Long, Changgen Peng, Yuling Chen, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 23, pp. 38508-38520
Closed Access
Yangyang Long, Changgen Peng, Yuling Chen, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 23, pp. 38508-38520
Closed Access
Secure Reinsurance Data Sharing Scheme Based on Blockchain and Multi-level Attribute-Based Encryption
Xiaolin Yue, Ziqiang Ma, Juanyang Zhang, et al.
Lecture notes in computer science (2024), pp. 428-435
Closed Access
Xiaolin Yue, Ziqiang Ma, Juanyang Zhang, et al.
Lecture notes in computer science (2024), pp. 428-435
Closed Access
Privacy-preserving OLAP against big query workloads: innovative theories and theorems
Alfredo Cuzzocrea
Distributed and Parallel Databases (2024) Vol. 43, Iss. 1
Closed Access
Alfredo Cuzzocrea
Distributed and Parallel Databases (2024) Vol. 43, Iss. 1
Closed Access
Poisoning the Competition: Fake Gradient Attacks on Distributed Generative Adversarial Networks
Chao Wang, Xiuyuan Liu, Yunhua He, et al.
2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems (MASS) (2023), pp. 487-495
Closed Access | Times Cited: 1
Chao Wang, Xiuyuan Liu, Yunhua He, et al.
2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems (MASS) (2023), pp. 487-495
Closed Access | Times Cited: 1
A Blockchain-Based Searchable Encryption Scheme for Efficient Data Sharing
Shusheng Ge, Shuming Xiong, Pengchao Chen, et al.
(2023), pp. 80-85
Closed Access | Times Cited: 1
Shusheng Ge, Shuming Xiong, Pengchao Chen, et al.
(2023), pp. 80-85
Closed Access | Times Cited: 1
Achieving Privacy-preserving Data Sharing for Dual Clouds
Xingqi Luo, Haotian Wang, Jinyang Dong, et al.
2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics) (2022), pp. 139-146
Closed Access | Times Cited: 2
Xingqi Luo, Haotian Wang, Jinyang Dong, et al.
2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics) (2022), pp. 139-146
Closed Access | Times Cited: 2
Leveraging Blockchain for Zero Knowledge Identify Sharing: A Survey of Advancements, Challenges and Opportunities
Abebe Diro, Lu Lu Zhou, Akanksha Saini, et al.
(2023)
Closed Access
Abebe Diro, Lu Lu Zhou, Akanksha Saini, et al.
(2023)
Closed Access
Prototype Traceability Blockchain for Security-Regulated Industries
Zheng Feng, Huiming Shen, Yingjie Lv, et al.
(2023), pp. 377-383
Closed Access
Zheng Feng, Huiming Shen, Yingjie Lv, et al.
(2023), pp. 377-383
Closed Access
IoT Data Sharing Scheme Based on Blockchain and Homomorphic Encryption
CaoYi Yu, Niansong Mei, Chong Du, et al.
(2023), pp. 554-560
Closed Access
CaoYi Yu, Niansong Mei, Chong Du, et al.
(2023), pp. 554-560
Closed Access
TSFed: A Two-Stage Federated Learning Framework via Cloud-Edge Collaboration for Services QoS Prediction
Lin Jian, Yusen Li, Zhuo Xu, et al.
Lecture notes in computer science (2022), pp. 58-72
Closed Access
Lin Jian, Yusen Li, Zhuo Xu, et al.
Lecture notes in computer science (2022), pp. 58-72
Closed Access