OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Asynchronous Updating Boolean Network Encryption Algorithm
Suo Gao, Rui Wu, Xingyuan Wang, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2023) Vol. 33, Iss. 8, pp. 4388-4400
Closed Access | Times Cited: 59

Showing 1-25 of 59 citing articles:

Cross-channel color image encryption through 2D hyperchaotic hybrid map of optimization test functions
Feyza Toktas, Uğur Erkan, Zekí Yetgín
Expert Systems with Applications (2024) Vol. 249, pp. 123583-123583
Closed Access | Times Cited: 52

Design, Hardware Implementation, and Application in Video Encryption of the 2D Memristive Cubic Map
Suo Gao, Herbert Ho‐Ching Iu, Mengjiao Wang, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 12, pp. 21807-21815
Closed Access | Times Cited: 28

Image privacy protection scheme based on high-quality reconstruction DCT compression and nonlinear dynamics
Yiting Lin, Zhiyu Xie, Tingting Chen, et al.
Expert Systems with Applications (2024) Vol. 257, pp. 124891-124891
Closed Access | Times Cited: 23

Temporal action segmentation for video encryption
Suo Gao, Herbert Ho‐Ching Iu, Jun Mou, et al.
Chaos Solitons & Fractals (2024) Vol. 183, pp. 114958-114958
Closed Access | Times Cited: 19

Multiscroll hopfield neural network with extreme multistability and its application in video encryption for IIoT
Fei Yu, Yue Lin, Wei Yao, et al.
Neural Networks (2024) Vol. 182, pp. 106904-106904
Closed Access | Times Cited: 19

A novel chaos-based permutation for image encryption
Moatsum Alawida
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 6, pp. 101595-101595
Open Access | Times Cited: 37

AntEater: When Arnold’s Cat Meets Langton’s Ant to Encrypt Images
Wassim Alexan, Yousef Korayem, Mohamed Gabr, et al.
IEEE Access (2023) Vol. 11, pp. 106249-106276
Open Access | Times Cited: 28

An image encryption method based on multi-space confusion using hyperchaotic 2D Vincent map derived from optimization benchmark function
Uğur Erkan, Abdurrahim Toktaş, Samet Memiş, et al.
Nonlinear Dynamics (2023) Vol. 111, Iss. 21, pp. 20377-20405
Closed Access | Times Cited: 23

Development of a video encryption algorithm for critical areas using 2D extended Schaffer function map and neural networks
Suo Gao, Jiafeng Liu, Herbert Ho‐Ching Iu, et al.
Applied Mathematical Modelling (2024) Vol. 134, pp. 520-537
Closed Access | Times Cited: 14

A Novel Image Encryption Algorithm Based on Cyclic Chaotic Map in Industrial IoT Environments
Moatsum Alawida
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 8, pp. 10530-10541
Closed Access | Times Cited: 12

Medical image encryption based on Josephus scrambling and dynamic cross-diffusion for patient privacy security
Zezong Zhang, Jianeng Tang, Feng Zhang, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2024) Vol. 34, Iss. 10, pp. 9250-9263
Closed Access | Times Cited: 8

Multiobjective Design of 2D Hyperchaotic System Using Leader Pareto Grey Wolf Optimizer
Abdurrahim Toktaş, Uğur Erkan, Deniz Üstün, et al.
IEEE Transactions on Systems Man and Cybernetics Systems (2024) Vol. 54, Iss. 9, pp. 5237-5247
Closed Access | Times Cited: 8

Chaos and Cellular Automata-Based Substitution Box and Its Application in Cryptography
Arslan Shafique, Kashif Hesham Khan, Mohammad Mazyad Hazzazi, et al.
Mathematics (2023) Vol. 11, Iss. 10, pp. 2322-2322
Open Access | Times Cited: 16

Multiple remote sensing image encryption scheme based on saliency extraction and magic cube circular motion
Chang Cai, Yu Wang, Yinghong Cao, et al.
Applied Intelligence (2024) Vol. 54, Iss. 8, pp. 5944-5960
Closed Access | Times Cited: 6

A novel DNA tree-based chaotic image encryption algorithm
Moatsum Alawida
Journal of Information Security and Applications (2024) Vol. 83, pp. 103791-103791
Closed Access | Times Cited: 6

OSMRD-IE: Octal-Based Shuffling and Multilayer Rotational Diffusing Image Encryption Using 2-D Hybrid Michalewicz–Ackley Map
Uğur Erkan, Abdurrahim Toktaş, Samet Memiş, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 21, pp. 35113-35123
Closed Access | Times Cited: 6

Efficient and secure image encryption algorithm using 2D LIM map and Latin square matrix
Xingfan Huang, Jianeng Tang, Zezong Zhang
Nonlinear Dynamics (2024)
Closed Access | Times Cited: 4

Efficient image encryption algorithm based on ECC and dynamic S-box
Ghulam Murtaza, Umar Hayat
Journal of Information Security and Applications (2025) Vol. 90, pp. 104004-104004
Closed Access

Parameter optimization of chaotic system using Pareto-based triple objective artificial bee colony algorithm
Abdurrahim Toktaş, Uğur Erkan, Deniz Üstün, et al.
Neural Computing and Applications (2023) Vol. 35, Iss. 18, pp. 13207-13223
Closed Access | Times Cited: 12

A novel lorenz-sine coupling chaotic system and its application on color image encryption
Ning Zhang, Jie Liu, Xiaojun Tong, et al.
Physica Scripta (2023) Vol. 98, Iss. 9, pp. 095217-095217
Closed Access | Times Cited: 9

New image encryption algorithm based on hyperchaotic 3D-IHAL and a hybrid cryptosystem
Suo Gao, Songbo Liu, Xingyuan Wang, et al.
Applied Intelligence (2023) Vol. 53, Iss. 22, pp. 27826-27843
Closed Access | Times Cited: 9

Securing Dual-Channel Audio Communication With a 2-D Infinite Collapse and Logistic Map
Rui Wu, Suo Gao, Herbert Ho‐Ching Iu, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 6, pp. 10214-10223
Closed Access | Times Cited: 9

Billiard Quantum Chaos: A Pioneering Image Encryption Scheme in the Post-Quantum Era
Seong Oun Hwang, Hafiz Muhammad Waseem, Noor Munir
IEEE Access (2024) Vol. 12, pp. 85150-85164
Open Access | Times Cited: 3

Page 1 - Next Page

Scroll to top