OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Overcoming Data Limitations: A Few-Shot Specific Emitter Identification Method Using Self-Supervised Learning and Adversarial Augmentation
Chao Liu, Xue Fu, Yu Wang, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 19, pp. 500-513
Closed Access | Times Cited: 50

Showing 1-25 of 50 citing articles:

Adaptive Decomposition and Extraction Network of Individual Fingerprint Features for Specific Emitter Identification
Junning Zhang, Yicen Liu, Guoru Ding, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 8515-8528
Closed Access | Times Cited: 9

Multisource Heterogeneous Specific Emitter Identification Using Attention Mechanism-Based RFF Fusion Method
Yibin Zhang, Qianyun Zhang, Haitao Zhao, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 2639-2650
Closed Access | Times Cited: 8

Contrastive Learning for Efficient Anomaly Detection in Electricity Load Data
Mohit Choubey, Rahul Kumar Chaurasiya, J. S. Yadav
Sustainable Energy Grids and Networks (2025), pp. 101639-101639
Closed Access | Times Cited: 1

FCLGYOLO: Feature Constraint and Local Guided Global Feature for Fire Detection in Unmanned Aerial Vehicle Imagery
Dong Ren, Yang Zhang, Lu Wang, et al.
IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing (2024) Vol. 17, pp. 5864-5875
Open Access | Times Cited: 7

Few-Shot Automatic Modulation Classification Using Architecture Search and Knowledge Transfer in Radar–Communication Coexistence Scenarios
X.P. Zhang, Yu Wang, Hao Huang, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 19, pp. 32067-32078
Closed Access | Times Cited: 4

Intelligent Assessment Method of Communication Interference Speech Quality Based on End-to-end Network
Sen Wang, J. Tao, Zheng Dou, et al.
Mobile Networks and Applications (2025)
Closed Access

HybridBranchNetV2: Towards reliable artificial intelligence in image classification using reinforcement learning
Ebrahim Parcham, Mansoor Fateh, Vahid Abolghasemi
PLoS ONE (2025) Vol. 20, Iss. 2, pp. e0314393-e0314393
Open Access

Radio frequency fingerprint identification towards statistical and deep learning features: Review, recent results and future directions
Gaoli Yan, Xue Fu, Yu Wang, et al.
Peer-to-Peer Networking and Applications (2025) Vol. 18, Iss. 3
Closed Access

Few-Shot Specific Emitter Identification via Asymmetric Dual-Path Masked Autoencoder
Sen Yang, Shui Yu, Qi Li, et al.
Digital Signal Processing (2025), pp. 105201-105201
Closed Access

Transfer Learning-Based Specific Emitter Identification for ADS-B over Satellite System
Mingqian Liu, Yae Chai, Ming Li, et al.
Remote Sensing (2024) Vol. 16, Iss. 12, pp. 2068-2068
Open Access | Times Cited: 3

Physical Layer Spoof Detection and Authentication for IoT Devices Using Deep Learning Methods
Da Huang, Akram Al‐Hourani
IEEE Transactions on Machine Learning in Communications and Networking (2024) Vol. 2, pp. 841-854
Open Access | Times Cited: 3

Multi-UAV-assisted Internet of Remote Things communication within satellite–aerial–terrestrial integrated network
Yuanyuan Yao, Dengyang Dong, Changjun Cai, et al.
EURASIP Journal on Advances in Signal Processing (2024) Vol. 2024, Iss. 1
Open Access | Times Cited: 2

MalDMTP: A Multi-tier Pooling Method for Malware Detection based on Graph Classification
Liang Kou, Cheng Qiu, Meiyu Wang, et al.
Mobile Networks and Applications (2024)
Open Access | Times Cited: 2

Active eavesdropping detection: a novel physical layer security in wireless IoT
Mingfang Li, Zheng Dou
EURASIP Journal on Advances in Signal Processing (2023) Vol. 2023, Iss. 1
Open Access | Times Cited: 5

Cooperative Mission Planning of USVs Based on Intention Recognition
Changting Shi, Yanqiang Wang, Jing Shen, et al.
Mobile Networks and Applications (2024)
Closed Access | Times Cited: 1

A Novel Radio Frequency Fingerprint Concealment Method Based on IQ Imbalance Compensation and Digital Pre-distortion
Zhisheng Yao, Yang Peng, Yu Wang, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 7349-7361
Closed Access | Times Cited: 1

Secure 5G downlink NOMA cognitive relay network: joint the impact of imperfect spectrum sensing and outdated CSI
Min Zhang, Xinjie Wang, Enyu Li, et al.
Wireless Networks (2024) Vol. 30, Iss. 3, pp. 1925-1937
Closed Access | Times Cited: 1

Enhanced Radar Emitter Recognition with Virtual Adversarial Training: A Semi-Supervised Framework
Ziqin Feng, Hong Wan, Guan Gui
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences (2024) Vol. E107.A, Iss. 9, pp. 1534-1541
Open Access | Times Cited: 1

Contrastive Semi-supervised Learning with Pseudo-label for Radar Signal Automatic Modulation Recognition
Dongming Wu, Junpeng Shi, Zhihui Li, et al.
IEEE Sensors Journal (2024) Vol. 24, Iss. 19, pp. 30399-30411
Closed Access | Times Cited: 1

A Class-Incremental Approach With Self-Training and Prototype Augmentation for Specific Emitter Identification
Dingzhao Li, Jie Qi, Shaohua Hong, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 19, pp. 1714-1727
Closed Access | Times Cited: 3

Refined Semi-Supervised Modulation Classification: Integrating Consistency Regularization and Pseudo-Labeling Techniques
Min Ma, Shanrong Liu, Shufei Wang, et al.
Future Internet (2024) Vol. 16, Iss. 2, pp. 38-38
Open Access

Toward the Intelligent OFDM Receiving Method With Hybrid Knowledge and Data Driven in IoT
Bin Wang, Hui Dai, Huaji Zhou, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 10, pp. 17567-17576
Closed Access

CSCNN: Lightweight modulation recognition model for mobile multimedia intelligent information processing
Jun Chen, Yiping Huang, Ling Zhang, et al.
Research Square (Research Square) (2024)
Open Access

Multi-component signal separation based on ALSAE
Tao Chen, Lei Yu, Limin Guo, et al.
Wireless Networks (2024) Vol. 30, Iss. 4, pp. 2855-2862
Closed Access

Page 1 - Next Page

Scroll to top