OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Robust Risk-Sensitive Task Offloading for Edge-Enabled Industrial Internet of Things
Sheng Zhou, Amjad Ali, Ala Al‐Fuqaha, et al.
IEEE Transactions on Consumer Electronics (2023) Vol. 70, Iss. 1, pp. 1403-1413
Closed Access | Times Cited: 15

Showing 15 citing articles:

Decision Trees Unleashed
Derek Mohammed, Marwan Omar
Advances in medical technologies and clinical practice book series (2024), pp. 240-258
Closed Access | Times Cited: 6

Computation Cost-Driven Offloading Strategy Based on Reinforcement Learning for Consumer Devices
Rui Zhang, Hui Xia, Zijun Chen, et al.
IEEE Transactions on Consumer Electronics (2024) Vol. 70, Iss. 1, pp. 4120-4131
Closed Access | Times Cited: 3

Automated Evidence Collection and Analysis Using AI
Luay Albtosh
Advances in information security, privacy, and ethics book series (2024), pp. 143-186
Closed Access | Times Cited: 2

Scene Understanding Method Utilizing Global Visual and Spatial Interaction Features for Safety Production
Fuqi Ma, Bo Wang, Xuzhu Dong, et al.
Information Fusion (2024) Vol. 114, pp. 102668-102668
Closed Access | Times Cited: 1

Digital Forensic Data Mining and Pattern Recognition
Luay Albtosh
Advances in information security, privacy, and ethics book series (2024), pp. 245-294
Closed Access | Times Cited: 1

Beyond Traditional Learning
Rebet Jones
Advances in medical technologies and clinical practice book series (2024), pp. 208-228
Closed Access | Times Cited: 1

Enhancing IoT Security
Rebet Jones
Advances in information security, privacy, and ethics book series (2024), pp. 56-71
Closed Access | Times Cited: 1

Combatting Deepfakes
Ngozi Tracy Aleke
Advances in information security, privacy, and ethics book series (2024), pp. 375-412
Closed Access | Times Cited: 1

Advances in Cybersecurity and AI: Integrating Machine Learning, IoT, and Smart Systems for Resilience and Innovation Across Domains
Yara Shamoo
World Journal of Advanced Research and Reviews (2024) Vol. 23, Iss. 2, pp. 2450-2461
Open Access

Novel Data Fusion Scheme for Enhanced User Experiences in Terahertz-Enabled IoNT
Amjad Ali, Mohammad Aazam, Maryam M. Al Dabel, et al.
IEEE Consumer Electronics Magazine (2024) Vol. 14, Iss. 2, pp. 90-102
Closed Access

Improving mobile security: A study on android malware detection using LOF
Luay Albtosh, Marwan Omar
International Journal of Mathematics and Computer in Engineering (2024)
Closed Access

Comparative Analysis of LLMs vs. Traditional Methods in Vulnerability Detection
Yara Shamoo
Advances in information security, privacy, and ethics book series (2024), pp. 335-374
Closed Access

A risk-aware and recommender distributed intrusion detection system for home robots
Mohammadreza Shahlaei, Seyyed Mohsen Hashemi
Journal of Information Security and Applications (2024) Vol. 83, pp. 103777-103777
Closed Access

Source Code Analysis With Deep Neural Networks
Rebet Jones
Advances in information security, privacy, and ethics book series (2024), pp. 355-378
Closed Access

The Role of Cybersecurity Legislation in Promoting Data Privacy
Ngozi Tracy Aleke
Advances in information security, privacy, and ethics book series (2024), pp. 205-244
Closed Access

Page 1

Scroll to top