OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

SmartPatch: Verifying the Authenticity of the Trigger-Event in the IoT Platform
Bin Yuan, Yuhan Wu, Maogen Yang, et al.
IEEE Transactions on Dependable and Secure Computing (2022) Vol. 20, Iss. 2, pp. 1656-1674
Open Access | Times Cited: 10

Showing 10 citing articles:

Evasion Attacks and Defenses on Smart Home Physical Event Verification
Muslum Ozgur Ozmen, Ruoyu Song, Habiba Farrukh, et al.
(2023)
Open Access | Times Cited: 12

CCDF-TAP: A Context-Aware Conflict Detection Framework for IoT Trigger-Action Programming With Graph Neural Network
Yongheng Xing, Liang Hu, Xinqi Du, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 19, pp. 31534-31544
Closed Access | Times Cited: 2

MQTTactic: Security Analysis and Verification for Logic Flaws in MQTT Implementations
Bin Yuan, Zhanxiang Song, Jia Yan, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2024), pp. 2385-2403
Closed Access | Times Cited: 2

Detection and Analysis of Broken Access Control Vulnerabilities in App–Cloud Interaction in IoT
Zehui Zhang, Futai Zou, Jianan Hong, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 17, pp. 28267-28280
Closed Access

Moving from the Developer Machine to IoT Devices: An Empirical Study
Md Rabbi Alam, Jinpeng Wei, Md Sajidul Islam Sajid, et al.
(2024), pp. 140-152
Closed Access

TrustEvent: Cross-Platform IoT Trigger Event Verification Using Edge Computing
Trent Reichenbach, Chenglong Fu, Xiaojiang Du, et al.
ICC 2022 - IEEE International Conference on Communications (2024), pp. 4084-4089
Closed Access

Risk assessment and detection of API abuse in the IoT cloud
Yuan Bin, Kaimin Zheng, Wan Jun, et al.
Scientia Sinica Informationis (2023) Vol. 53, Iss. 12, pp. 2355-2355
Closed Access

Interior design applications based on IoT as detection and es-timation methods
Ahmed Amin, Tamer Soliman, Ayman Hasanein, et al.
International Journal of Telecommunications (2023) Vol. 03, Iss. 02, pp. 1-13
Open Access

Leakage of Authorization-Data in IoT Device Sharing: New Attacks and Countermeasure
Bin Yuan, Maogen Yang, Zhen Xu, et al.
IEEE Transactions on Dependable and Secure Computing (2023) Vol. 21, Iss. 4, pp. 3196-3210
Open Access

Page 1

Scroll to top