
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
How to Mitigate DDoS Intelligently in SD-IoV: A Moving Target Defense Approach
Tao Zhang, Changqiao Xu, Ping Zou, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 1, pp. 1097-1106
Closed Access | Times Cited: 44
Tao Zhang, Changqiao Xu, Ping Zou, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 1, pp. 1097-1106
Closed Access | Times Cited: 44
Showing 1-25 of 44 citing articles:
SDN-Based VANET Routing: A Comprehensive Survey on Architectures, Protocols, Analysis, and Future Challenges
Nehad Hameed Hussein, Siaw Paw Koh, Chong Tak Yaw, et al.
IEEE Access (2024), pp. 1-1
Open Access | Times Cited: 15
Nehad Hameed Hussein, Siaw Paw Koh, Chong Tak Yaw, et al.
IEEE Access (2024), pp. 1-1
Open Access | Times Cited: 15
When Moving Target Defense Meets Attack Prediction in Digital Twins: A Convolutional and Hierarchical Reinforcement Learning Approach
Tao Zhang, Changqiao Xu, Yibo Lian, et al.
IEEE Journal on Selected Areas in Communications (2023) Vol. 41, Iss. 10, pp. 3293-3305
Closed Access | Times Cited: 29
Tao Zhang, Changqiao Xu, Yibo Lian, et al.
IEEE Journal on Selected Areas in Communications (2023) Vol. 41, Iss. 10, pp. 3293-3305
Closed Access | Times Cited: 29
How to Disturb Network Reconnaissance: A Moving Target Defense Approach Based on Deep Reinforcement Learning
Tao Zhang, Changqiao Xu, Jiahao Shen, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 18, pp. 5735-5748
Closed Access | Times Cited: 24
Tao Zhang, Changqiao Xu, Jiahao Shen, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 18, pp. 5735-5748
Closed Access | Times Cited: 24
Network Security Management in Heterogeneous Networks
Tao Zhang, Xiangyun Tang, Jiacheng Wang, et al.
Electronics (2025) Vol. 14, Iss. 3, pp. 568-568
Open Access | Times Cited: 1
Tao Zhang, Xiangyun Tang, Jiacheng Wang, et al.
Electronics (2025) Vol. 14, Iss. 3, pp. 568-568
Open Access | Times Cited: 1
Optimal Joint Defense and Monitoring for Networks Security under Uncertainty: A POMDP-Based Approach
Armita Kazeminajafabadi, Mahdi Imani
IET Information Security (2024) Vol. 2024, pp. 1-20
Open Access | Times Cited: 6
Armita Kazeminajafabadi, Mahdi Imani
IET Information Security (2024) Vol. 2024, pp. 1-20
Open Access | Times Cited: 6
DecFFD: A Personalized Federated Learning Framework for Cross-Location Fault Diagnosis
Dongshang Deng, Wei Zhao, Xuangou Wu, et al.
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 5, pp. 7082-7091
Closed Access | Times Cited: 5
Dongshang Deng, Wei Zhao, Xuangou Wu, et al.
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 5, pp. 7082-7091
Closed Access | Times Cited: 5
RSU-Based Online Intrusion Detection and Mitigation for VANET
Ammar Haydari, Yasin Yılmaz
Sensors (2022) Vol. 22, Iss. 19, pp. 7612-7612
Open Access | Times Cited: 24
Ammar Haydari, Yasin Yılmaz
Sensors (2022) Vol. 22, Iss. 19, pp. 7612-7612
Open Access | Times Cited: 24
Toward Attack-Resistant Route Mutation for VANETs: An Online and Adaptive Multiagent Reinforcement Learning Approach
Tao Zhang, Changqiao Xu, Bingchi Zhang, et al.
IEEE Transactions on Intelligent Transportation Systems (2022) Vol. 23, Iss. 12, pp. 23254-23267
Closed Access | Times Cited: 17
Tao Zhang, Changqiao Xu, Bingchi Zhang, et al.
IEEE Transactions on Intelligent Transportation Systems (2022) Vol. 23, Iss. 12, pp. 23254-23267
Closed Access | Times Cited: 17
Towards Attack-Resistant Service Function Chain Migration: A Model-Based Adaptive Proximal Policy Optimization Approach
Tao Zhang, Changqiao Xu, Bingchi Zhang, et al.
IEEE Transactions on Dependable and Secure Computing (2023) Vol. 20, Iss. 6, pp. 4913-4927
Closed Access | Times Cited: 10
Tao Zhang, Changqiao Xu, Bingchi Zhang, et al.
IEEE Transactions on Dependable and Secure Computing (2023) Vol. 20, Iss. 6, pp. 4913-4927
Closed Access | Times Cited: 10
MTDCAP: Moving Target Defense-Based CAN Authentication Protocol
Heng Sun, Huibiao Su, Jian Weng, et al.
IEEE Transactions on Intelligent Transportation Systems (2024) Vol. 25, Iss. 9, pp. 12800-12817
Closed Access | Times Cited: 3
Heng Sun, Huibiao Su, Jian Weng, et al.
IEEE Transactions on Intelligent Transportation Systems (2024) Vol. 25, Iss. 9, pp. 12800-12817
Closed Access | Times Cited: 3
Edge Computing-Enabled Secure Forecasting Nationwide Industry PM2.5 with LLM in the Heterogeneous Network
Changkui Yin, Yingchi Mao, Zhenyuan He, et al.
Electronics (2024) Vol. 13, Iss. 13, pp. 2581-2581
Open Access | Times Cited: 3
Changkui Yin, Yingchi Mao, Zhenyuan He, et al.
Electronics (2024) Vol. 13, Iss. 13, pp. 2581-2581
Open Access | Times Cited: 3
A Persistent Route Diversification Mechanism for Defending against Stealthy Crossfire Attack
Boyang Zhou, Chunming Wu, Qiang Yang, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-20
Open Access | Times Cited: 10
Boyang Zhou, Chunming Wu, Qiang Yang, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-20
Open Access | Times Cited: 10
DDoS Attacks Detection in IoV using ML-based Models with an Enhanced Feature Selection Technique
Ohoud Ali Albishi, Monir Abdullah
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 2
Open Access | Times Cited: 1
Ohoud Ali Albishi, Monir Abdullah
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 2
Open Access | Times Cited: 1
Efficient Inference Offloading for Mixture-of-Experts Large Language Models in Internet of Medical Things
Xiaoming Yuan, Weixuan Kong, Zhenyu Luo, et al.
Electronics (2024) Vol. 13, Iss. 11, pp. 2077-2077
Open Access | Times Cited: 1
Xiaoming Yuan, Weixuan Kong, Zhenyu Luo, et al.
Electronics (2024) Vol. 13, Iss. 11, pp. 2077-2077
Open Access | Times Cited: 1
MOMTA-HN: A Secure and Reliable Multi-Objective Optimized Multipath Transmission Algorithm for Heterogeneous Networks
Shengyuan Qi, Lin Yang, Linru Ma, et al.
Electronics (2024) Vol. 13, Iss. 14, pp. 2697-2697
Open Access | Times Cited: 1
Shengyuan Qi, Lin Yang, Linru Ma, et al.
Electronics (2024) Vol. 13, Iss. 14, pp. 2697-2697
Open Access | Times Cited: 1
EPDB: An Efficient and Privacy-Preserving Electric Charging Scheme in the Internet of Robotic Things
Di Zhai, Jiqiang Liu, Tao Zhang, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 20, pp. 32464-32477
Closed Access | Times Cited: 1
Di Zhai, Jiqiang Liu, Tao Zhang, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 20, pp. 32464-32477
Closed Access | Times Cited: 1
Advancing Security for 6G Smart Networks and Services
Madhusanka Liyanage, Pawani Porambage, Engin Zeydan, et al.
(2024), pp. 1169-1174
Closed Access | Times Cited: 1
Madhusanka Liyanage, Pawani Porambage, Engin Zeydan, et al.
(2024), pp. 1169-1174
Closed Access | Times Cited: 1
Security-Aware Task Offloading Using Deep Reinforcement Learning in Mobile Edge Computing Systems
Haodong Lu, Xiaoming He, Dengyin Zhang
Electronics (2024) Vol. 13, Iss. 15, pp. 2933-2933
Open Access | Times Cited: 1
Haodong Lu, Xiaoming He, Dengyin Zhang
Electronics (2024) Vol. 13, Iss. 15, pp. 2933-2933
Open Access | Times Cited: 1
Blockchain and Trusted Hardware-Enabled Data Scheduling for Edge Learning in Wireless IIoT
Tianhao Liu, Jiqiang Liu, Tao Zhang, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 21, pp. 34229-34242
Closed Access | Times Cited: 1
Tianhao Liu, Jiqiang Liu, Tao Zhang, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 21, pp. 34229-34242
Closed Access | Times Cited: 1
FedASA: A Personalized Federated Learning with Adaptive Model Aggregation for Heterogeneous Mobile Edge Computing
Dongshang Deng, Xuangou Wu, Tao Zhang, et al.
IEEE Transactions on Mobile Computing (2024) Vol. 23, Iss. 12, pp. 14787-14802
Closed Access | Times Cited: 1
Dongshang Deng, Xuangou Wu, Tao Zhang, et al.
IEEE Transactions on Mobile Computing (2024) Vol. 23, Iss. 12, pp. 14787-14802
Closed Access | Times Cited: 1
Blockchain‐enhanced trust management for mobile edge computing‐enabled intelligent vehicular collaboration in the 6G era
Xifeng Wang, Hongsong Zhu, Han Xiao, et al.
Transactions on Emerging Telecommunications Technologies (2023) Vol. 34, Iss. 7
Closed Access | Times Cited: 3
Xifeng Wang, Hongsong Zhu, Han Xiao, et al.
Transactions on Emerging Telecommunications Technologies (2023) Vol. 34, Iss. 7
Closed Access | Times Cited: 3
SD6LoWPAN Security: Issues, Solutions, Research Challenges, and Trends
Christian Miranda Moreira, Georges Kaddoum
IEEE Internet of Things Magazine (2023) Vol. 6, Iss. 3, pp. 132-137
Closed Access | Times Cited: 3
Christian Miranda Moreira, Georges Kaddoum
IEEE Internet of Things Magazine (2023) Vol. 6, Iss. 3, pp. 132-137
Closed Access | Times Cited: 3
Moving Target Defense Approach for Secure Relay Selection in Vehicular Networks
Esraa M. Ghourab, Shimaa Naser, Sami Muhaidat, et al.
(2023)
Open Access | Times Cited: 2
Esraa M. Ghourab, Shimaa Naser, Sami Muhaidat, et al.
(2023)
Open Access | Times Cited: 2
Personalized Federated Learning Based on Bidirectional Knowledge Distillation for WiFi Gesture Recognition
Huan Geng, Dongshang Deng, Weidong Zhang, et al.
Electronics (2023) Vol. 12, Iss. 24, pp. 5016-5016
Open Access | Times Cited: 2
Huan Geng, Dongshang Deng, Weidong Zhang, et al.
Electronics (2023) Vol. 12, Iss. 24, pp. 5016-5016
Open Access | Times Cited: 2
Secure and Scalable Blockchain for IIoT with Dual Compression Scheme
Tianxi Wang, Jiqiang Liu, Tianhao Liu, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 2
Tianxi Wang, Jiqiang Liu, Tianhao Liu, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 2