OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

QoS Prediction and Adversarial Attack Protection for Distributed Services Under DLaaS
Wei Liang, Yuhui Li, Jianlong Xu, et al.
IEEE Transactions on Computers (2023) Vol. 73, Iss. 3, pp. 669-682
Closed Access | Times Cited: 30

Showing 1-25 of 30 citing articles:

PDPChain: A Consortium Blockchain-Based Privacy Protection Scheme for Personal Data
Wei Liang, Yang Yang, Ce Yang, et al.
IEEE Transactions on Reliability (2022) Vol. 72, Iss. 2, pp. 586-598
Closed Access | Times Cited: 135

Spatial-Temporal Aware Inductive Graph Neural Network for C-ITS Data Recovery
Wei Liang, Yuhui Li, Kun Xie, et al.
IEEE Transactions on Intelligent Transportation Systems (2022) Vol. 24, Iss. 8, pp. 8431-8442
Closed Access | Times Cited: 93

Deep Neural Network Security Collaborative Filtering Scheme for Service Recommendation in Intelligent Cyber–Physical Systems
Wei Liang, Songyou Xie, Jiahong Cai, et al.
IEEE Internet of Things Journal (2021) Vol. 9, Iss. 22, pp. 22123-22132
Closed Access | Times Cited: 62

A Time-Sensitive Token-Based Anonymous Authentication and Dynamic Group Key Agreement Scheme for Industry 5.0
Zisang Xu, Wei Liang, Kuan‐Ching Li, et al.
IEEE Transactions on Industrial Informatics (2021) Vol. 18, Iss. 10, pp. 7118-7127
Closed Access | Times Cited: 60

T-For: An Adaptable Forecasting Model for Throughput Performance
Ariel L. C. Portela, Silvio E. S. B. Ribeiro, Rafael A. Menezes, et al.
IEEE Transactions on Network and Service Management (2024) Vol. 21, Iss. 3, pp. 2791-2801
Closed Access | Times Cited: 14

On Identity, Transaction, and Smart Contract Privacy on Permissioned and Permissionless Blockchain: A Comprehensive Survey
Wei Liang, Yaqin Liu, Ce Yang, et al.
ACM Computing Surveys (2024) Vol. 56, Iss. 12, pp. 1-35
Closed Access | Times Cited: 14

TrustBCFL: Mitigating Data Bias in IoT Through Blockchain-Enabled Federated Learning
Sisi Zhou, Kuanching Li, Yuxiang Chen, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 15, pp. 25648-25662
Closed Access | Times Cited: 11

Modeling and analysis of port supply chain system based on Fabric blockchain
Na Gao, Dezhi Han, Tien‐Hsiung Weng, et al.
Computers & Industrial Engineering (2022) Vol. 172, pp. 108527-108527
Closed Access | Times Cited: 34

Post-Quantum Security: Opportunities and Challenges
Silong Li, Yuxiang Chen, Lin Chen, et al.
Sensors (2023) Vol. 23, Iss. 21, pp. 8744-8744
Open Access | Times Cited: 18

Predicting Drug-Target Interactions via Dual-Stream Graph Neural Network
Yuhui Li, Wei Liang, Peng Li, et al.
IEEE/ACM Transactions on Computational Biology and Bioinformatics (2022) Vol. 21, Iss. 4, pp. 948-958
Closed Access | Times Cited: 25

Design and analysis of quantum machine learning: a survey
Linshu Chen, Tao Li, Yuxiang Chen, et al.
Connection Science (2024) Vol. 36, Iss. 1
Open Access | Times Cited: 5

TMHD: Twin-Bridge Scheduling of Multi-Heterogeneous Dependent Tasks for Edge Computing
Wei Liang, Jiahong Xiao, Yuxiang Chen, et al.
Future Generation Computer Systems (2024) Vol. 158, pp. 60-72
Closed Access | Times Cited: 4

Blockchain-Enabled Large Language Models for Prognostics and Health Management Framework in Industrial Internet of Things
Dun Li, Hongzhi Li, Jing Li, et al.
Communications in computer and information science (2025), pp. 3-16
Open Access

DPS-IIoT: Non-interactive zero-knowledge poof-inspired access control towards information-centric Industrial Internet of Things
Dun Li, Noël Crespi, Roberto Minerva, et al.
Computer Communications (2025), pp. 108065-108065
Open Access

Momentum-accelerated and Biased Unconstrained Non-negative Latent Factor Model for Handling High-Dimensional and Incomplete Data
Ming‐Wei Lin, Hengshuo Yang, Xiuqin Xu, et al.
ACM Transactions on Knowledge Discovery from Data (2025)
Closed Access

A security protection scheme for abnormal transaction data in smart grid system
Lijun Xiao, Dezhi Han, Xiangwei Meng, et al.
International Journal of Advanced Robotic Systems (2025) Vol. 22, Iss. 2
Open Access

Privacy preserving personalized blockchain reliability prediction via federated learning in IoT environments
Jianlong Xu, Lin Jian, Wei Liang, et al.
Cluster Computing (2021) Vol. 25, Iss. 4, pp. 2515-2526
Closed Access | Times Cited: 28

Securing social platform from misinformation using deep learning
Pradeep Kumar Roy, Asis Kumar Tripathy, Tien‐Hsiung Weng, et al.
Computer Standards & Interfaces (2022) Vol. 84, pp. 103674-103674
Closed Access | Times Cited: 20

An Anonymous Authenticated Group Key Agreement Scheme for Transfer Learning Edge Services Systems
Xiangwei Meng, Wei Liang, Zisang Xu, et al.
ACM Transactions on Sensor Networks (2024) Vol. 20, Iss. 3, pp. 1-23
Open Access | Times Cited: 3

The security and privacy challenges toward cybersecurity of 6G networks: A comprehensive review
Yanlu Li, Yufeng Xiao, Wei Liang, et al.
Computer Science and Information Systems (2024) Vol. 21, Iss. 3, pp. 851-897
Open Access | Times Cited: 2

Federated Anomaly Detection
Chunjiong Zhang, Byeong‐hee Roh, Gaoyang Shan
(2024), pp. 148-149
Closed Access | Times Cited: 2

MWformer: a novel low computational cost image restoration algorithm
Jing Liao, Cheng Peng, Lei Jiang, et al.
The Journal of Supercomputing (2024) Vol. 80, Iss. 14, pp. 21508-21532
Closed Access | Times Cited: 1

Fairness constraint efficiency optimization for multiresource allocation in a cluster system serving internet of things
Shaomiao Chen, Ce Yang, Weihong Huang, et al.
International Journal of Communication Systems (2022) Vol. 36, Iss. 3
Closed Access | Times Cited: 5

NLP Research Based on Transformer Model
Junjie Wu, Xueting Huang, Jingnian Liu, et al.
(2023), pp. 343-348
Closed Access | Times Cited: 2

Page 1 - Next Page

Scroll to top