
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
RaSEC: An Intelligent Framework for Reliable and Secure Multi-Level Edge Computing in Industrial Environments
Muhammad Usman, Alireza Jolfaei, Mian Ahmad Jan
IEEE Transactions on Industry Applications (2020), pp. 1-1
Open Access | Times Cited: 26
Muhammad Usman, Alireza Jolfaei, Mian Ahmad Jan
IEEE Transactions on Industry Applications (2020), pp. 1-1
Open Access | Times Cited: 26
Showing 1-25 of 26 citing articles:
Big data analytics for intelligent manufacturing systems: A review
Junliang Wang, Chuqiao Xu, Jie Zhang, et al.
Journal of Manufacturing Systems (2021) Vol. 62, pp. 738-752
Closed Access | Times Cited: 374
Junliang Wang, Chuqiao Xu, Jie Zhang, et al.
Journal of Manufacturing Systems (2021) Vol. 62, pp. 738-752
Closed Access | Times Cited: 374
Lightweight Searchable Encryption Protocol for Industrial Internet of Things
Ke Zhang, Jiahuan Long, Xiaofen Wang, et al.
IEEE Transactions on Industrial Informatics (2020) Vol. 17, Iss. 6, pp. 4248-4259
Closed Access | Times Cited: 87
Ke Zhang, Jiahuan Long, Xiaofen Wang, et al.
IEEE Transactions on Industrial Informatics (2020) Vol. 17, Iss. 6, pp. 4248-4259
Closed Access | Times Cited: 87
Edge Computing for Real-Time Internet of Things Applications: Future Internet Revolution
Nguyễn Minh Quý, Le Anh Ngoc, Nguyễn Tiến Ban, et al.
Wireless Personal Communications (2023) Vol. 132, Iss. 2, pp. 1423-1452
Closed Access | Times Cited: 30
Nguyễn Minh Quý, Le Anh Ngoc, Nguyễn Tiến Ban, et al.
Wireless Personal Communications (2023) Vol. 132, Iss. 2, pp. 1423-1452
Closed Access | Times Cited: 30
A Hybrid Approach With GAN and DP for Privacy Preservation of IIoT Data
Yavuz Selim Hindistan, E. Fatih Yetkin
IEEE Access (2023) Vol. 11, pp. 5837-5849
Open Access | Times Cited: 20
Yavuz Selim Hindistan, E. Fatih Yetkin
IEEE Access (2023) Vol. 11, pp. 5837-5849
Open Access | Times Cited: 20
Toward Industrial Private AI: A Two-Tier Framework for Data and Model Security
Sunder Ali Khowaja, Kapal Dev, Nawab Muhammad Faseeh Qureshi, et al.
IEEE Wireless Communications (2022) Vol. 29, Iss. 2, pp. 76-83
Open Access | Times Cited: 24
Sunder Ali Khowaja, Kapal Dev, Nawab Muhammad Faseeh Qureshi, et al.
IEEE Wireless Communications (2022) Vol. 29, Iss. 2, pp. 76-83
Open Access | Times Cited: 24
Presenting the Secure Collapsible Makerspace with Biometric Authentication
Muhammad Syafiq Abdul Razak, Sundaraja Perumal Gothandapani, Noorfazila Kamal, et al.
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 1, pp. 12880-12886
Open Access | Times Cited: 4
Muhammad Syafiq Abdul Razak, Sundaraja Perumal Gothandapani, Noorfazila Kamal, et al.
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 1, pp. 12880-12886
Open Access | Times Cited: 4
Differential Privacy for Industrial Internet of Things: Opportunities, Applications, and Challenges
Bin Jiang, Jianqiang Li, Guanghui Yue, et al.
IEEE Internet of Things Journal (2021) Vol. 8, Iss. 13, pp. 10430-10451
Open Access | Times Cited: 17
Bin Jiang, Jianqiang Li, Guanghui Yue, et al.
IEEE Internet of Things Journal (2021) Vol. 8, Iss. 13, pp. 10430-10451
Open Access | Times Cited: 17
SFL-TUM: Energy efficient SFRL method for large scale AI model's task offloading in UAV-assisted MEC networks
Prakhar Consul, Ishan Budhiraja, Deepak Garg, et al.
Vehicular Communications (2024) Vol. 48, pp. 100790-100790
Closed Access | Times Cited: 2
Prakhar Consul, Ishan Budhiraja, Deepak Garg, et al.
Vehicular Communications (2024) Vol. 48, pp. 100790-100790
Closed Access | Times Cited: 2
Modeling of Extreme Vulnerability Disclosure in Smart City Industrial Environments
MingJian Tang, Jiao Yin, Mamoun Alazab, et al.
IEEE Transactions on Industrial Informatics (2020) Vol. 17, Iss. 6, pp. 4150-4158
Closed Access | Times Cited: 13
MingJian Tang, Jiao Yin, Mamoun Alazab, et al.
IEEE Transactions on Industrial Informatics (2020) Vol. 17, Iss. 6, pp. 4150-4158
Closed Access | Times Cited: 13
An edge based trustworthy environment establishment for internet of things: an approach for smart cities
Serin V. Simpson, G. Nagarajan
Wireless Networks (2021)
Closed Access | Times Cited: 10
Serin V. Simpson, G. Nagarajan
Wireless Networks (2021)
Closed Access | Times Cited: 10
MobiScan: An enhanced invisible screen‐camera communication system for IoT applications
Zhang Xiao, Jiqiang Liu, Zhongjie Ba, et al.
Transactions on Emerging Telecommunications Technologies (2020) Vol. 33, Iss. 4
Closed Access | Times Cited: 10
Zhang Xiao, Jiqiang Liu, Zhongjie Ba, et al.
Transactions on Emerging Telecommunications Technologies (2020) Vol. 33, Iss. 4
Closed Access | Times Cited: 10
Con-Pi: A Distributed Container-Based Edge and Fog Computing Framework
Redowan Mahmud, Adel N. Toosi
IEEE Internet of Things Journal (2021) Vol. 9, Iss. 6, pp. 4125-4138
Open Access | Times Cited: 9
Redowan Mahmud, Adel N. Toosi
IEEE Internet of Things Journal (2021) Vol. 9, Iss. 6, pp. 4125-4138
Open Access | Times Cited: 9
Deep learning-enabled block scrambling algorithm for securing telemedicine data of table tennis players
Bo Yang, Bojin Cheng, Yixuan Liu, et al.
Neural Computing and Applications (2021) Vol. 35, Iss. 20, pp. 14667-14680
Closed Access | Times Cited: 8
Bo Yang, Bojin Cheng, Yixuan Liu, et al.
Neural Computing and Applications (2021) Vol. 35, Iss. 20, pp. 14667-14680
Closed Access | Times Cited: 8
Privacy-Preserving Spatial Keyword Search With Lightweight Access Control in Cloud Environments
Xingwen Zhao, Luhui Gan, Kai Fan
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 7, pp. 12377-12387
Closed Access | Times Cited: 3
Xingwen Zhao, Luhui Gan, Kai Fan
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 7, pp. 12377-12387
Closed Access | Times Cited: 3
Risk Minimization Against Transmission Failures of Federated Learning in Mobile Edge Networks
Yuting Yan, Songhua Liu, Yibo Jin, et al.
IEEE Access (2020) Vol. 8, pp. 98205-98217
Open Access | Times Cited: 6
Yuting Yan, Songhua Liu, Yibo Jin, et al.
IEEE Access (2020) Vol. 8, pp. 98205-98217
Open Access | Times Cited: 6
A Tensor-Train-Based P2 Blockchain for Internet of Things Services
Xiaokang Wang, Laurence T. Yang, Dongdong Huo, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 11, pp. 19394-19405
Closed Access
Xiaokang Wang, Laurence T. Yang, Dongdong Huo, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 11, pp. 19394-19405
Closed Access
Maximizing Coverage and Energy Conservation in B5G Networks Using Hexagonal Tiling to Deploy FT-S2ES
Vaibhav Tiwari, Chandrasen Pandey, Satyendra Singh Yadav, et al.
IEEE Open Journal of the Communications Society (2024) Vol. 5, pp. 2541-2554
Open Access
Vaibhav Tiwari, Chandrasen Pandey, Satyendra Singh Yadav, et al.
IEEE Open Journal of the Communications Society (2024) Vol. 5, pp. 2541-2554
Open Access
Hybrid Grid Search and Bellman Optimization-Based Random Forest Regression for Predicting Material Compression Pressure in Manufacturing Processes
Youcheng Zong, Yi Nian, Chaojie Zhang, et al.
(2024)
Closed Access
Youcheng Zong, Yi Nian, Chaojie Zhang, et al.
(2024)
Closed Access
Hybrid Grid Search and Bayesian optimization-based random forest regression for predicting material compression pressure in manufacturing processes
Youcheng Zong, Yi Nian, Chaojie Zhang, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 141, pp. 109580-109580
Closed Access
Youcheng Zong, Yi Nian, Chaojie Zhang, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 141, pp. 109580-109580
Closed Access
Towards Industrial Private AI: A two-tier framework for data and model security.
Sunder Ali Khowaja, Kapal Dev, Nawab Muhammad Faseeh Qureshi, et al.
arXiv (Cornell University) (2021)
Closed Access | Times Cited: 3
Sunder Ali Khowaja, Kapal Dev, Nawab Muhammad Faseeh Qureshi, et al.
arXiv (Cornell University) (2021)
Closed Access | Times Cited: 3
Con-Pi: A Distributed Container-based Edge and Fog Computing Framework for Raspberry Pis.
Redowan Mahmud, Adel N. Toosi
(2021)
Closed Access | Times Cited: 2
Redowan Mahmud, Adel N. Toosi
(2021)
Closed Access | Times Cited: 2
Data Privacy Preservation and Security Approaches for Sensitive Data in Big Data
Rohit Ravindra Nikam, Rekha Shahapurkar
Advances in parallel computing (2021)
Open Access | Times Cited: 2
Rohit Ravindra Nikam, Rekha Shahapurkar
Advances in parallel computing (2021)
Open Access | Times Cited: 2
Financial Asset Risk Measurement Based on Smart Sensor Big Data Security Analysis and Bayesian Posterior Probability Model
Zixin Lu
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-12
Open Access | Times Cited: 1
Zixin Lu
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-12
Open Access | Times Cited: 1
Research and Design of an Optimal Management Strategy for Simultaneous Wireless Power and Information Transmission for Highway Vehicles
Li Ji, Kaixin Yan, Jingxuan Ma, et al.
IEEE Transactions on Industry Applications (2023) Vol. 60, Iss. 1, pp. 1093-1104
Closed Access
Li Ji, Kaixin Yan, Jingxuan Ma, et al.
IEEE Transactions on Industry Applications (2023) Vol. 60, Iss. 1, pp. 1093-1104
Closed Access
Bulwark Security in an Edge Cloud Model
Jeremy Lynn Reed, Ali Şaman Tosun, Turgay Korkmaz
(2023), pp. 1-8
Closed Access
Jeremy Lynn Reed, Ali Şaman Tosun, Turgay Korkmaz
(2023), pp. 1-8
Closed Access