
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Legitimate Surveillance of Suspicious Computation Offloading in Mobile Edge Computing Networks
Ding Xu, Hongbo Zhu
IEEE Transactions on Communications (2022) Vol. 70, Iss. 4, pp. 2648-2662
Closed Access | Times Cited: 13
Ding Xu, Hongbo Zhu
IEEE Transactions on Communications (2022) Vol. 70, Iss. 4, pp. 2648-2662
Closed Access | Times Cited: 13
Showing 13 citing articles:
GPDS: A multi-agent deep reinforcement learning game for anti-jamming secure computing in MEC network
Miaojiang Chen, Wei Liu, Ning Zhang, et al.
Expert Systems with Applications (2022) Vol. 210, pp. 118394-118394
Closed Access | Times Cited: 34
Miaojiang Chen, Wei Liu, Ning Zhang, et al.
Expert Systems with Applications (2022) Vol. 210, pp. 118394-118394
Closed Access | Times Cited: 34
Cooperative task offloading and resource allocation for UAV-enabled mobile edge computing systems
Dahu Xu, Ding Xu
Computer Networks (2023) Vol. 223, pp. 109574-109574
Closed Access | Times Cited: 14
Dahu Xu, Ding Xu
Computer Networks (2023) Vol. 223, pp. 109574-109574
Closed Access | Times Cited: 14
Proactive Eavesdropping via Jamming Over Short Packet Suspicious Communications With Finite Blocklength
Ding Xu, Hongbo Zhu
IEEE Transactions on Communications (2022) Vol. 70, Iss. 11, pp. 7505-7519
Closed Access | Times Cited: 16
Ding Xu, Hongbo Zhu
IEEE Transactions on Communications (2022) Vol. 70, Iss. 11, pp. 7505-7519
Closed Access | Times Cited: 16
Proactive Eavesdropping of Physical Layer Security Aided Suspicious Communications in Fading Channels
Ding Xu, Hongbo Zhu
IEEE Transactions on Information Forensics and Security (2023) Vol. 18, pp. 1111-1126
Closed Access | Times Cited: 6
Ding Xu, Hongbo Zhu
IEEE Transactions on Information Forensics and Security (2023) Vol. 18, pp. 1111-1126
Closed Access | Times Cited: 6
Performance Analysis of NOMA-Based MEC Systems With Semi-Grant-Free Transmission
Bailing Chen, Ding Xu
IEEE Wireless Communications Letters (2024) Vol. 13, Iss. 4, pp. 1123-1127
Closed Access | Times Cited: 1
Bailing Chen, Ding Xu
IEEE Wireless Communications Letters (2024) Vol. 13, Iss. 4, pp. 1123-1127
Closed Access | Times Cited: 1
Proactive Eavesdropping of Jamming-Assisted Suspicious Communications in Fading Channels: A Stackelberg Game Approach
Ding Xu
IEEE Transactions on Communications (2024) Vol. 72, Iss. 5, pp. 2913-2928
Closed Access | Times Cited: 1
Ding Xu
IEEE Transactions on Communications (2024) Vol. 72, Iss. 5, pp. 2913-2928
Closed Access | Times Cited: 1
Secure computation offloading assisted by intelligent reflection surface for mobile edge computing network
Xue Chen, Hongbo Xu, Guoping Zhang, et al.
Physical Communication (2023) Vol. 57, pp. 102003-102003
Closed Access | Times Cited: 3
Xue Chen, Hongbo Xu, Guoping Zhang, et al.
Physical Communication (2023) Vol. 57, pp. 102003-102003
Closed Access | Times Cited: 3
Active Reconfigurable Intelligent Surface Aided Surveillance Scheme
Xinyue Hu, Yibo Yi, Kun Li, et al.
IEEE Wireless Communications Letters (2022) Vol. 12, Iss. 2, pp. 356-360
Open Access | Times Cited: 4
Xinyue Hu, Yibo Yi, Kun Li, et al.
IEEE Wireless Communications Letters (2022) Vol. 12, Iss. 2, pp. 356-360
Open Access | Times Cited: 4
Unsuspicious User Enabled Proactive Eavesdropping in Interference Networks Using Improper Gaussian Signaling
Ding Xu, Hongbo Zhu
IEEE Transactions on Communications (2023) Vol. 71, Iss. 5, pp. 2891-2905
Closed Access | Times Cited: 2
Ding Xu, Hongbo Zhu
IEEE Transactions on Communications (2023) Vol. 71, Iss. 5, pp. 2891-2905
Closed Access | Times Cited: 2
Proactive Eavesdropping Over Multiple Suspicious Communication Links With Heterogeneous Services
Ding Xu, Hongbo Zhu
IEEE Transactions on Wireless Communications (2022) Vol. 22, Iss. 5, pp. 3417-3431
Closed Access | Times Cited: 3
Ding Xu, Hongbo Zhu
IEEE Transactions on Wireless Communications (2022) Vol. 22, Iss. 5, pp. 3417-3431
Closed Access | Times Cited: 3
STAR-RIS-Assisted Information Surveillance Over Suspicious Multihop Communications
Guojie Hu, Qingqing Wu, Jiangbo Si, et al.
IEEE Transactions on Mobile Computing (2023) Vol. 23, Iss. 5, pp. 5344-5365
Closed Access | Times Cited: 1
Guojie Hu, Qingqing Wu, Jiangbo Si, et al.
IEEE Transactions on Mobile Computing (2023) Vol. 23, Iss. 5, pp. 5344-5365
Closed Access | Times Cited: 1
Computation Offloading Method for Large-Scale Factory Access in Edge-Edge Collaboration Mode
Junfeng Man, Longqian Zhao, Bowen Xu, et al.
Journal of Database Management (2023) Vol. 34, Iss. 1, pp. 1-29
Open Access
Junfeng Man, Longqian Zhao, Bowen Xu, et al.
Journal of Database Management (2023) Vol. 34, Iss. 1, pp. 1-29
Open Access
An adaptive offloading framework for license plate detection in collaborative edge and cloud computing
Hong Zhang, Penghai Wang, Shouhua Zhang, et al.
Mathematical Biosciences & Engineering (2022) Vol. 20, Iss. 2, pp. 2793-2814
Open Access
Hong Zhang, Penghai Wang, Shouhua Zhang, et al.
Mathematical Biosciences & Engineering (2022) Vol. 20, Iss. 2, pp. 2793-2814
Open Access