
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
EmIr-Auth: Eye Movement and Iris-Based Portable Remote Authentication for Smart Grid
Zhuo Ma, Yilong Yang, Ximeng Liu, et al.
IEEE Transactions on Industrial Informatics (2019) Vol. 16, Iss. 10, pp. 6597-6606
Closed Access | Times Cited: 36
Zhuo Ma, Yilong Yang, Ximeng Liu, et al.
IEEE Transactions on Industrial Informatics (2019) Vol. 16, Iss. 10, pp. 6597-6606
Closed Access | Times Cited: 36
Showing 1-25 of 36 citing articles:
A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities
Koen Tange, Michele De Donno, Xenofon Fafoutis, et al.
IEEE Communications Surveys & Tutorials (2020) Vol. 22, Iss. 4, pp. 2489-2520
Open Access | Times Cited: 306
Koen Tange, Michele De Donno, Xenofon Fafoutis, et al.
IEEE Communications Surveys & Tutorials (2020) Vol. 22, Iss. 4, pp. 2489-2520
Open Access | Times Cited: 306
EPPDA: An Efficient and Privacy‐Preserving Data Aggregation Scheme with Authentication and Authorization for IoT‐Based Healthcare Applications
Faris A. Almalki, Ben Othman Soufiene
Wireless Communications and Mobile Computing (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 68
Faris A. Almalki, Ben Othman Soufiene
Wireless Communications and Mobile Computing (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 68
Gait Recognition Based on Deep Learning: A Survey
Claudio Filipi Gonçalves dos Santos, Diego de Souza Oliveira, Leandro A. Passos, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 2, pp. 1-34
Open Access | Times Cited: 59
Claudio Filipi Gonçalves dos Santos, Diego de Souza Oliveira, Leandro A. Passos, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 2, pp. 1-34
Open Access | Times Cited: 59
Edge-Assisted Intelligent Device Authentication in Cyber–Physical Systems
Yanrong Lu, Ding Wang, Mohammad S. Obaidat, et al.
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 4, pp. 3057-3070
Closed Access | Times Cited: 39
Yanrong Lu, Ding Wang, Mohammad S. Obaidat, et al.
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 4, pp. 3057-3070
Closed Access | Times Cited: 39
Machine learning based approaches for clinical and non-clinical depression recognition and depression relapse prediction using audiovisual and EEG modalities: A comprehensive review
Sana Yasin, Alice Othmani, Imran Raza, et al.
Computers in Biology and Medicine (2023) Vol. 159, pp. 106741-106741
Closed Access | Times Cited: 30
Sana Yasin, Alice Othmani, Imran Raza, et al.
Computers in Biology and Medicine (2023) Vol. 159, pp. 106741-106741
Closed Access | Times Cited: 30
Provably secure authentication protocol for traffic exchanges in unmanned aerial vehicles
Vincent Omollo Nyangaresi
High-Confidence Computing (2023) Vol. 3, Iss. 4, pp. 100154-100154
Open Access | Times Cited: 23
Vincent Omollo Nyangaresi
High-Confidence Computing (2023) Vol. 3, Iss. 4, pp. 100154-100154
Open Access | Times Cited: 23
Healthcare Internet of Things: Security Threats, Challenges, and Future Research Directions
Muhammad Adil, Muhammad Khurram Khan, Neeraj Kumar, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 11, pp. 19046-19069
Closed Access | Times Cited: 13
Muhammad Adil, Muhammad Khurram Khan, Neeraj Kumar, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 11, pp. 19046-19069
Closed Access | Times Cited: 13
An efficient aggregation scheme resisting on malicious data mining attacks for smart grid
Hua Shen, Yajing Liu, Zhe Xia, et al.
Information Sciences (2020) Vol. 526, pp. 289-300
Closed Access | Times Cited: 68
Hua Shen, Yajing Liu, Zhe Xia, et al.
Information Sciences (2020) Vol. 526, pp. 289-300
Closed Access | Times Cited: 68
Smart Home Security Solutions using Facial Authentication and Speaker Recognition through Artificial Neural Networks
Navya Saxena, Devina Varshney
International Journal of Cognitive Computing in Engineering (2021) Vol. 2, pp. 154-164
Open Access | Times Cited: 41
Navya Saxena, Devina Varshney
International Journal of Cognitive Computing in Engineering (2021) Vol. 2, pp. 154-164
Open Access | Times Cited: 41
Cryptanalysis of Biometric Based Secure User Authentication Protocol for IoT Applications
RVS Praveen, P. Pabitha
(2022), pp. 1-6
Closed Access | Times Cited: 23
RVS Praveen, P. Pabitha
(2022), pp. 1-6
Closed Access | Times Cited: 23
An efficient three-factor remote user authentication protocol based on BPV-FourQ for internet of drones
Naijian Zhang, Qi Jiang, Long Li, et al.
Peer-to-Peer Networking and Applications (2021) Vol. 14, Iss. 5, pp. 3319-3332
Closed Access | Times Cited: 31
Naijian Zhang, Qi Jiang, Long Li, et al.
Peer-to-Peer Networking and Applications (2021) Vol. 14, Iss. 5, pp. 3319-3332
Closed Access | Times Cited: 31
Image splicing forgery detection by combining synthetic adversarial networks and hybrid dense U‐net based on multiple spaces
Wei Yang, Jianfeng Ma, Zhuzhu Wang, et al.
International Journal of Intelligent Systems (2022) Vol. 37, Iss. 11, pp. 8291-8308
Open Access | Times Cited: 19
Wei Yang, Jianfeng Ma, Zhuzhu Wang, et al.
International Journal of Intelligent Systems (2022) Vol. 37, Iss. 11, pp. 8291-8308
Open Access | Times Cited: 19
An improved lightweight and privacy preserving authentication scheme for smart grid communication
Yi Li
Journal of Systems Architecture (2024) Vol. 152, pp. 103176-103176
Closed Access | Times Cited: 4
Yi Li
Journal of Systems Architecture (2024) Vol. 152, pp. 103176-103176
Closed Access | Times Cited: 4
EV-GazeLock: A User Authentication System Based on Micro Eye Movement with Event Cameras
Yishuo Zhao, Xurui Song, X. T. Huang, et al.
ACM Transactions on Sensor Networks (2025)
Closed Access
Yishuo Zhao, Xurui Song, X. T. Huang, et al.
ACM Transactions on Sensor Networks (2025)
Closed Access
Identification With Your Mind: A Hybrid BCI-Based Authentication Approach for Anti-Shoulder-Surfing Attacks Using EEG and Eye Movement Data
Shiwei Cheng, Jialing Wang, Danyi Sheng, et al.
IEEE Transactions on Instrumentation and Measurement (2023) Vol. 72, pp. 1-14
Closed Access | Times Cited: 10
Shiwei Cheng, Jialing Wang, Danyi Sheng, et al.
IEEE Transactions on Instrumentation and Measurement (2023) Vol. 72, pp. 1-14
Closed Access | Times Cited: 10
BTNC: A blockchain based trusted network connection protocol in IoT
Junwei Zhang, Zhuzhu Wang, Lei Shang, et al.
Journal of Parallel and Distributed Computing (2020) Vol. 143, pp. 1-16
Closed Access | Times Cited: 26
Junwei Zhang, Zhuzhu Wang, Lei Shang, et al.
Journal of Parallel and Distributed Computing (2020) Vol. 143, pp. 1-16
Closed Access | Times Cited: 26
An Effective Gaze-Based Authentication Method with the Spatiotemporal Feature of Eye Movement
Jinghui Yin, Jiande Sun, Jing Li, et al.
Sensors (2022) Vol. 22, Iss. 8, pp. 3002-3002
Open Access | Times Cited: 15
Jinghui Yin, Jiande Sun, Jing Li, et al.
Sensors (2022) Vol. 22, Iss. 8, pp. 3002-3002
Open Access | Times Cited: 15
Biometrics for Industry 4.0: a survey of recent applications
Lucia Cascone, Zhiwei Gao, Michele Nappi
Journal of Ambient Intelligence and Humanized Computing (2023) Vol. 14, Iss. 8, pp. 11239-11261
Open Access | Times Cited: 7
Lucia Cascone, Zhiwei Gao, Michele Nappi
Journal of Ambient Intelligence and Humanized Computing (2023) Vol. 14, Iss. 8, pp. 11239-11261
Open Access | Times Cited: 7
Iris-ocular-periocular: toward more accurate biometrics for off-angle images
Mahmut Karakaya
Journal of Electronic Imaging (2021) Vol. 30, Iss. 03
Open Access | Times Cited: 14
Mahmut Karakaya
Journal of Electronic Imaging (2021) Vol. 30, Iss. 03
Open Access | Times Cited: 14
SE-LAKAF: Security enhanced lightweight authentication and key agreement framework for smart grid network
Prarthana J. Mehta, Balu L. Parne, Sankita J. Patel
Peer-to-Peer Networking and Applications (2023) Vol. 16, Iss. 3, pp. 1513-1535
Closed Access | Times Cited: 4
Prarthana J. Mehta, Balu L. Parne, Sankita J. Patel
Peer-to-Peer Networking and Applications (2023) Vol. 16, Iss. 3, pp. 1513-1535
Closed Access | Times Cited: 4
Biometric Recognition Based on Recurrence Plot and InceptionV3 Model Using Eye Movements
Huibin Jin, Shouyi Chen
IEEE Journal of Biomedical and Health Informatics (2023) Vol. 27, Iss. 11, pp. 5554-5563
Closed Access | Times Cited: 4
Huibin Jin, Shouyi Chen
IEEE Journal of Biomedical and Health Informatics (2023) Vol. 27, Iss. 11, pp. 5554-5563
Closed Access | Times Cited: 4
Zero Trust-Based Mobile Network Security Architecture
Yiliang Liu, Zhou Su, Haixia Peng, et al.
IEEE Wireless Communications (2024) Vol. 31, Iss. 2, pp. 82-88
Closed Access | Times Cited: 1
Yiliang Liu, Zhou Su, Haixia Peng, et al.
IEEE Wireless Communications (2024) Vol. 31, Iss. 2, pp. 82-88
Closed Access | Times Cited: 1
A Supervised ML Biometric Continuous Authentication System for Industry 4.0
Juan M. Espín, Alberto Huertas Celdrán, Francisco Esquembre, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 18, Iss. 12, pp. 9132-9140
Closed Access | Times Cited: 6
Juan M. Espín, Alberto Huertas Celdrán, Francisco Esquembre, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 18, Iss. 12, pp. 9132-9140
Closed Access | Times Cited: 6
Guest Editorial: Special Section on Security and Privacy in Industry 4.0
Cristina Alcaraz, P. Zhang, Prof. Alvaro Cardenas, et al.
IEEE Transactions on Industrial Informatics (2020) Vol. 16, Iss. 10, pp. 6530-6531
Open Access | Times Cited: 6
Cristina Alcaraz, P. Zhang, Prof. Alvaro Cardenas, et al.
IEEE Transactions on Industrial Informatics (2020) Vol. 16, Iss. 10, pp. 6530-6531
Open Access | Times Cited: 6
AcoPalm: Acoustical Palmprint-Based Noncontact Identity Authentication
Lin Wang, Wenshuang Chen, Nan Jing, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 18, Iss. 12, pp. 9122-9131
Closed Access | Times Cited: 4
Lin Wang, Wenshuang Chen, Nan Jing, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 18, Iss. 12, pp. 9122-9131
Closed Access | Times Cited: 4