
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Multisource Heterogeneous Specific Emitter Identification Using Attention Mechanism-Based RFF Fusion Method
Yibin Zhang, Qianyun Zhang, Haitao Zhao, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 2639-2650
Closed Access | Times Cited: 8
Yibin Zhang, Qianyun Zhang, Haitao Zhao, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 2639-2650
Closed Access | Times Cited: 8
Showing 8 citing articles:
Modality Fusion Vision Transformer for Hyperspectral and LiDAR Data Collaborative Classification
Bin Yang, Xuan Wang, Ying Xing, et al.
IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing (2024) Vol. 17, pp. 17052-17065
Open Access | Times Cited: 21
Bin Yang, Xuan Wang, Ying Xing, et al.
IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing (2024) Vol. 17, pp. 17052-17065
Open Access | Times Cited: 21
Adaptive Decomposition and Extraction Network of Individual Fingerprint Features for Specific Emitter Identification
Junning Zhang, Yicen Liu, Guoru Ding, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 8515-8528
Closed Access | Times Cited: 9
Junning Zhang, Yicen Liu, Guoru Ding, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 8515-8528
Closed Access | Times Cited: 9
Enhanced Specific Emitter Identification With Limited Data Through Dual Implicit Regularization
Yang Peng, Xile Zhang, Lantu Guo, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 15, pp. 26395-26405
Closed Access
Yang Peng, Xile Zhang, Lantu Guo, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 15, pp. 26395-26405
Closed Access
Smart Secure Authentication Sensing for Maritime Traffic: Sensor Individual Recognition Perspective
Dingzhao Li, Xiaowei Chen, Mingyuan Shao, et al.
IEEE Sensors Journal (2024) Vol. 24, Iss. 15, pp. 25082-25093
Closed Access
Dingzhao Li, Xiaowei Chen, Mingyuan Shao, et al.
IEEE Sensors Journal (2024) Vol. 24, Iss. 15, pp. 25082-25093
Closed Access
Enhanced Radar Signal Recognition through Attention-Driven Multi-Domain Fusion Mechanism
Siyuan Wu, Hao Huang, Shengnan Shi, et al.
2022 IEEE/CIC International Conference on Communications in China (ICCC) (2024), pp. 1293-1297
Closed Access
Siyuan Wu, Hao Huang, Shengnan Shi, et al.
2022 IEEE/CIC International Conference on Communications in China (ICCC) (2024), pp. 1293-1297
Closed Access
SFCNN: Separation and Fusion Convolutional Neural Network for Radio Frequency Fingerprint Identification
S S Wang, Rugui Yao, Xiaoya Zuo, et al.
International Journal of Intelligent Systems (2024) Vol. 2024, Iss. 1
Open Access
S S Wang, Rugui Yao, Xiaoya Zuo, et al.
International Journal of Intelligent Systems (2024) Vol. 2024, Iss. 1
Open Access
Enhancing 5G Spectrum Sensing: Non-Coherent Neyman Pearson Detector Design and Interference Suppression Method
Dan Jiang, Jun Hu, Yue Zhang, et al.
IEEE Transactions on Instrumentation and Measurement (2024) Vol. 73, pp. 1-15
Closed Access
Dan Jiang, Jun Hu, Yue Zhang, et al.
IEEE Transactions on Instrumentation and Measurement (2024) Vol. 73, pp. 1-15
Closed Access
Online Two-Stage Channel-Based Lightweight Authentication Method for Time-Varying Scenarios
Yuhong Xue, Zhutian Yang, Zhilu Wu, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 20, pp. 781-795
Closed Access
Yuhong Xue, Zhutian Yang, Zhilu Wu, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 20, pp. 781-795
Closed Access