OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Method of Information Protection for Collaborative Deep Learning under GAN Model Attack
Xiaodan Yan, Baojiang Cui, Yang Xu, et al.
IEEE/ACM Transactions on Computational Biology and Bioinformatics (2019) Vol. 18, Iss. 3, pp. 871-881
Closed Access | Times Cited: 70

Showing 1-25 of 70 citing articles:

Blockchain Empowered Arbitrable Data Auditing Scheme for Network Storage as a Service
Yang Xu, Ju Ren, Yan Zhang, et al.
IEEE Transactions on Services Computing (2019), pp. 1-1
Closed Access | Times Cited: 209

Metaverse Security and Privacy: An Overview
Zefeng Chen, Jiayang Wu, Wensheng Gan, et al.
2021 IEEE International Conference on Big Data (Big Data) (2022), pp. 2950-2959
Open Access | Times Cited: 97

Unsupervised learning for fault detection and diagnosis of air handling units
Ke Yan, Jing Huang, Wen Shen, et al.
Energy and Buildings (2019) Vol. 210, pp. 109689-109689
Closed Access | Times Cited: 142

Multi-Task Learning Model Based on Multi-Scale CNN and LSTM for Sentiment Classification
Ning Jin, Jiaxian Wu, Xiang Ma, et al.
IEEE Access (2020) Vol. 8, pp. 77060-77072
Open Access | Times Cited: 104

A blockchain-empowered AAA scheme in the large-scale HetNet
Na Shi, Liang Tan, Wenjuan Li, et al.
Digital Communications and Networks (2020) Vol. 7, Iss. 3, pp. 308-316
Open Access | Times Cited: 97

Trustworthy Network Anomaly Detection Based on an Adaptive Learning Rate and Momentum in IIoT
Xiaodan Yan, Yang Xu, Xiaofei Xing, et al.
IEEE Transactions on Industrial Informatics (2020) Vol. 16, Iss. 9, pp. 6182-6192
Closed Access | Times Cited: 94

Learning URL Embedding for Malicious Website Detection
Xiaodan Yan, Yang Xu, Baojiang Cui, et al.
IEEE Transactions on Industrial Informatics (2020) Vol. 16, Iss. 10, pp. 6673-6681
Closed Access | Times Cited: 78

A Survey on Securing Federated Learning: Analysis of Applications, Attacks, Challenges, and Trends
Helio N. Cunha Neto, Jernej Hribar, Ivana Dusparić, et al.
IEEE Access (2023) Vol. 11, pp. 41928-41953
Open Access | Times Cited: 30

Hierarchical Bidirectional RNN for Safety-Enhanced B5G Heterogeneous Networks
Yang Xu, Xiaodan Yan, Yulei Wu, et al.
IEEE Transactions on Network Science and Engineering (2021) Vol. 8, Iss. 4, pp. 2946-2957
Closed Access | Times Cited: 48

BSSPD: A Blockchain‐Based Security Sharing Scheme for Personal Data with Fine‐Grained Access Control
Hongmin Gao, Zhaofeng Ma, Shoushan Luo, et al.
Wireless Communications and Mobile Computing (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 40

BacS: A blockchain-based access control scheme in distributed internet of things
Na Shi, Liang Tan, Ciaxia Yang, et al.
Peer-to-Peer Networking and Applications (2020) Vol. 14, Iss. 5, pp. 2585-2599
Closed Access | Times Cited: 40

Security and Privacy in Physical–Digital Environments: Trends and Opportunities
Carolina Alves Pereira, Anabela Marto, Roberto Ribeiro, et al.
Future Internet (2025) Vol. 17, Iss. 2, pp. 83-83
Open Access

Tunnel Surface Settlement Forecasting with Ensemble Learning
Ke Yan, Yuting Dai, Meiling Xu, et al.
Sustainability (2019) Vol. 12, Iss. 1, pp. 232-232
Open Access | Times Cited: 40

Classification of multi-type bearing fault features based on semi-supervised generative adversarial network (GAN)
Xiao Li, Feng‐Liang Zhang
Measurement Science and Technology (2023) Vol. 35, Iss. 2, pp. 025107-025107
Closed Access | Times Cited: 12

Generative Adversarial Networks: A Survey on Attack and Defense Perspective
Chenhan Zhang, Shui Yu, Zhiyi Tian, et al.
ACM Computing Surveys (2023) Vol. 56, Iss. 4, pp. 1-35
Open Access | Times Cited: 11

Generative Adversarial Networks: A Survey Towards Private and Secure Applications
Zhipeng Cai, Zuobin Xiong, Honghui Xu, et al.
arXiv (Cornell University) (2021)
Open Access | Times Cited: 23

Enhancing Privacy and Security in Online Education Using Generative Adversarial Networks
Gnanasankaran Natarajan, Elakkiya Elango, A. L. Hanees, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 206-230
Closed Access | Times Cited: 3

Symmetry GAN Detection Network: An Automatic One-Stage High-Accuracy Detection Network for Various Types of Lesions on CT Images
Yan Zhang, Shupeng He, Shiyun Wa, et al.
Symmetry (2022) Vol. 14, Iss. 2, pp. 234-234
Open Access | Times Cited: 15

Artificial intelligence and neuroscience: An update on fascinating relationships
Nishanth Gopinath
Process Biochemistry (2022) Vol. 125, pp. 113-120
Closed Access | Times Cited: 14

HFuzz: Towards automatic fuzzing testing of NB-IoT core network protocols implementations
Xinyao Liu, Baojiang Cui, Junsong Fu, et al.
Future Generation Computer Systems (2020) Vol. 108, pp. 390-400
Closed Access | Times Cited: 22

A Blockchain-Based Node Selection Algorithm in Cognitive Wireless Networks
Tangsen Huang, Xiaowu Li, Xiangdong Ying
IEEE Access (2020) Vol. 8, pp. 207156-207166
Open Access | Times Cited: 22

Fast and Accurate Deep Leakage from Gradients Based on Wasserstein Distance
Xing He, Changgen Peng, Weijie Tan
International Journal of Intelligent Systems (2023) Vol. 2023, pp. 1-12
Open Access | Times Cited: 7

A Robust Adversary Detection-Deactivation Method for Metaverse-Oriented Collaborative Deep Learning
Pengfei Li, Zhibo Zhang, Ameena Saad Al‐Sumaiti, et al.
IEEE Sensors Journal (2023) Vol. 24, Iss. 14, pp. 22011-22022
Open Access | Times Cited: 7

A face recognition algorithm based on feature fusion
Jiwei Zhang, Xiaodan Yan, Zelei Cheng, et al.
Concurrency and Computation Practice and Experience (2020) Vol. 34, Iss. 14
Closed Access | Times Cited: 19

Fast Detection and Classification of Dangerous Urban Sounds Using Deep Learning
Zeinel Momynkulov, Zhandos Dosbayev, Azizah Suliman, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 75, Iss. 1, pp. 2191-2208
Open Access | Times Cited: 6

Page 1 - Next Page

Scroll to top