OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

An ACP-Based Parallel Approach for Color Image Encryption Using Redundant Blocks
Wenbo Zheng, Lan Yan, Chao Gou, et al.
IEEE Transactions on Cybernetics (2021) Vol. 52, Iss. 12, pp. 13181-13196
Closed Access | Times Cited: 27

Showing 1-25 of 27 citing articles:

Color-Gray Multi-Image Hybrid Compression–Encryption Scheme Based on BP Neural Network and Knight Tour
Xinyu Gao, Jun Mou, Santo Banerjee, et al.
IEEE Transactions on Cybernetics (2023) Vol. 53, Iss. 8, pp. 5037-5047
Closed Access | Times Cited: 94

ACP-Incorporated Perturbation-Resistant Neural Dynamics Controller for Autonomous Vehicles
Ying Liufu, Long Jin, Mingsheng Shang, et al.
IEEE Transactions on Intelligent Vehicles (2024) Vol. 9, Iss. 4, pp. 4675-4686
Closed Access | Times Cited: 24

ACP-Based Modeling of the Parallel Vehicular Crowd Sensing System: Framework, Components and an Application Example
Yilong Ren, Han Jiang, Xiaoyuan Feng, et al.
IEEE Transactions on Intelligent Vehicles (2022) Vol. 8, Iss. 2, pp. 1536-1548
Closed Access | Times Cited: 43

An image encryption algorithm based on a compound-coupled chaotic system
Hangming Zhang, Hanping Hu
Digital Signal Processing (2023) Vol. 146, pp. 104367-104367
Closed Access | Times Cited: 25

A blind signature scheme for IoV based on 2D-SCML image encryption and lattice cipher
Mengli Gao, Jinqing Li, Xiaoqiang Di, et al.
Expert Systems with Applications (2024) Vol. 246, pp. 123215-123215
Open Access | Times Cited: 6

Multiple remote sensing image encryption scheme based on saliency extraction and magic cube circular motion
Chang Cai, Yu Wang, Yinghong Cao, et al.
Applied Intelligence (2024) Vol. 54, Iss. 8, pp. 5944-5960
Closed Access | Times Cited: 6

Parallel Intelligent Monitoring System of Port Water Quality Based on the ACP Method
Jianqun Guo, Zhonglian Jiang, Xiao Chu, et al.
Journal of Marine Science and Engineering (2024) Vol. 12, Iss. 2, pp. 218-218
Open Access | Times Cited: 5

Remote sensing image encryption algorithm based on DNA convolution
Jingxi Tian, Xiaoqiang Zhang, Mi Liu, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 4
Closed Access

A novel multi-color image compression encryption algorithm based on the reconstruction coefficient matrix and DNA point mutation operation
Meng Tang, Guo Du, Yanping Lin
Expert Systems with Applications (2025) Vol. 270, pp. 126620-126620
Closed Access

A family of image encryption schemes based on hyperchaotic system and cellular automata neighborhood
Qiang Lai, Yuan Liu
Science China Technological Sciences (2025) Vol. 68, Iss. 3
Closed Access

Parameter optimization of chaotic system using Pareto-based triple objective artificial bee colony algorithm
Abdurrahim Toktaş, Uğur Erkan, Deniz Üstün, et al.
Neural Computing and Applications (2023) Vol. 35, Iss. 18, pp. 13207-13223
Closed Access | Times Cited: 12

A compressive sensing encryption scheme for dual color images based on discrete memristor map and Rubik’s cube scramble
Haofu Zheng, Guodong Li, Wenxia Xu, et al.
Optik (2023) Vol. 286, pp. 170991-170991
Closed Access | Times Cited: 9

Image encryption algorithm based on Hilbert sorting vector and new spatiotemporal chaotic system
Hangming Zhang, Hanping Hu, Weiping Ding
Optics & Laser Technology (2023) Vol. 167, pp. 109655-109655
Closed Access | Times Cited: 8

Visually secure traffic image encryption scheme using new two-dimensional Sigmoid-type memristive chaotic map and Laguerre transform embedding
Lajie Wang, Lichang Xu, Guoqiang Long, et al.
Physica Scripta (2024) Vol. 99, Iss. 7, pp. 075266-075266
Closed Access | Times Cited: 2

A Novel Image Encryption Scheme Based on ABC Algorithm and Elliptic Curves
Takreem Haider, Naveed Ahmed Azam, Umar Hayat
Arabian Journal for Science and Engineering (2022) Vol. 48, Iss. 8, pp. 9827-9847
Closed Access | Times Cited: 8

Two-dimensional-lag complex logistic map with complex parameters and its encryption application
Fangfang 芳芳 Zhang 张, Jinbo 金波 Wu 武, Lei 磊 Kou 寇, et al.
Chinese Physics B (2024) Vol. 33, Iss. 5, pp. 050505-050505
Open Access | Times Cited: 1

Secure Reversible Data Hiding in Encrypted Image Based on 2D Labeling and Block Classification Coding
Yaolin Yang, Hongjie He, Fan Chen, et al.
Journal of Information Security and Applications (2024) Vol. 83, pp. 103771-103771
Closed Access

An improved Dijkstra cross-plane image encryption algorithm based on a chaotic system
Pijun Hou, Yuepeng Wang, Ziming Shi, et al.
Frontiers in Artificial Intelligence (2024) Vol. 7
Open Access

Artistic Color Matching Technology Based on Silhouette Coefficient and Visual Perception
Huizhou Li, Wubin Zhu
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 6
Open Access

A novel image encryption method based on the cycle replacement
P S P Wang, Xiaojun Liu, Jing Xu, et al.
Physica Scripta (2024) Vol. 99, Iss. 10, pp. 105260-105260
Closed Access

Rotary Combination Permutation and image tiling to safeguard real-time image-based systems through a new 1D-chaotic map
Mohamed Amine Midoun, Xinye Cai, Mohamed Zakariya Talhaoui, et al.
Expert Systems with Applications (2024), pp. 126201-126201
Closed Access

Enhancing IoT Security: A Comprehensive Review of Lightweight Security Mechanisms for IoT
Aditya Pradana, Fahmi Candra Permana, Kusprasapta Mutijarsa, et al.
(2024), pp. 1-7
Closed Access

The Image Encryption Algorithm Based on Artificial Images and Complex Logistics Mapping
Jinbo Wu, Zhe Huang, Fangfang Zhang, et al.
(2022), pp. 274-279
Closed Access | Times Cited: 2

Page 1 - Next Page

Scroll to top