OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Generative Adversarial Learning for Trusted and Secure Clustering in Industrial Wireless Sensor Networks
Liu Yang, Simon X. Yang, Yun Li, et al.
IEEE Transactions on Industrial Electronics (2022) Vol. 70, Iss. 8, pp. 8377-8387
Open Access | Times Cited: 14

Showing 14 citing articles:

An Enhanced Energy Optimization Model for Industrial Wireless Sensor Networks Using Machine Learning
Ashish Bagwari, J. Logeshwaran, K. Usha, et al.
IEEE Access (2023) Vol. 11, pp. 96343-96362
Open Access | Times Cited: 56

Generative AI for Physical Layer Communications: A Survey
Nguyễn Văn Huynh, Jiacheng Wang, Hongyang Du, et al.
IEEE Transactions on Cognitive Communications and Networking (2024) Vol. 10, Iss. 3, pp. 706-728
Open Access | Times Cited: 11

A Multi‐cluster Security Framework for Healthcare IoT: The Synergy of Redundant Byzantine Fault Tolerance with Extensions and Coati‐Based Network
Rohit Beniwal, Vinod Kumar, Vishal Sharma
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 3
Closed Access

Time-Sensitive Networking-Driven Deterministic Low-Latency Communication for Real-Time Telemedicine and e-Health Services
Yinzhi Lu, Guofeng Zhao, Chinmay Chakraborty, et al.
IEEE Transactions on Consumer Electronics (2023) Vol. 69, Iss. 4, pp. 734-744
Closed Access | Times Cited: 9

Secure architecture for Industrial Edge of Things(IEoT): A hierarchical perspective
Pengyong Li, Jiaqi Xia, Qian Wang, et al.
Computer Networks (2024) Vol. 251, pp. 110641-110641
Closed Access | Times Cited: 3

GTR: GAN-Based Trusted Routing Algorithm for Underwater Wireless Sensor Networks
Bin Wang, Kerong Ben
Sensors (2024) Vol. 24, Iss. 15, pp. 4879-4879
Open Access | Times Cited: 3

A Multi-Layered Assessment System for Trustworthiness Enhancement and Reliability for Industrial Wireless Sensor Networks
Mohd Anas Khan, Shalu, Quadri Noorulhasan Naveed, et al.
Wireless Personal Communications (2024) Vol. 137, Iss. 4, pp. 1997-2036
Closed Access | Times Cited: 3

Adversarial Learning for Intrusion Detection in Wireless Sensor Networks
Swaminathan Kalyanaraman, Sivaram Ponnusamy, S. Saju, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 39-52
Closed Access | Times Cited: 2

Energy efficient and multi-hop routing for constrained wireless sensor networks
K. Phani Rama Krishna, Ramakrishna Thirumuru
Sustainable Computing Informatics and Systems (2023) Vol. 38, pp. 100866-100866
Closed Access | Times Cited: 5

IoMT Type‐2 Fuzzy Logic Implementation
Sasanko Sekhar Gantayat, K. M. Pimple, Pokkuluri Kiran Sree
(2024), pp. 179-194
Closed Access | Times Cited: 1

A secure and lightweight trust evaluation model for enhancing decision-making in resource-constrained industrial WSNs
Vinay Kumar Pathak, Karan Singh, Tayyab Khan, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 1

Real- Time Anomaly Detection with Generative Adversarial Networks for Network Security Management
Rakesh Kumar Yadav, Swati Gupta, D Preethi
(2024), pp. 1-6
Closed Access | Times Cited: 1

Satellite Network Security Routing Technology Based on Deep Learning and Trust Management
Zhiguo Liu, Junlin Rong, Yingru Jiang, et al.
Sensors (2023) Vol. 23, Iss. 20, pp. 8474-8474
Open Access | Times Cited: 3

Improving the Efficiency of IoMT Using Fuzzy Logic Methods
K Kiran Kumar, S. Sivakumar, Pramoda Patro, et al.
(2024), pp. 107-120
Closed Access

Page 1

Scroll to top