
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Attribute-Based Secure Data Aggregation for Isolated IoT-Enabled Maritime Transportation Systems
Chen Wang, Jian Shen, Pandi Vijayakumar, et al.
IEEE Transactions on Intelligent Transportation Systems (2021), pp. 1-10
Open Access | Times Cited: 31
Chen Wang, Jian Shen, Pandi Vijayakumar, et al.
IEEE Transactions on Intelligent Transportation Systems (2021), pp. 1-10
Open Access | Times Cited: 31
Showing 1-25 of 31 citing articles:
Deep Network-Enabled Haze Visibility Enhancement for Visual IoT-Driven Intelligent Transportation Systems
Ryan Wen Liu, Yu Guo, Yuxu Lu, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 2, pp. 1581-1591
Closed Access | Times Cited: 110
Ryan Wen Liu, Yu Guo, Yuxu Lu, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 2, pp. 1581-1591
Closed Access | Times Cited: 110
A Survey on Cyber Security Threats in IoT-Enabled Maritime Industry
Imran Ashraf, Yongwan Park, Soojung Hur, et al.
IEEE Transactions on Intelligent Transportation Systems (2022), pp. 1-14
Closed Access | Times Cited: 81
Imran Ashraf, Yongwan Park, Soojung Hur, et al.
IEEE Transactions on Intelligent Transportation Systems (2022), pp. 1-14
Closed Access | Times Cited: 81
Adaptive Ontology-Based IoT Resource Provisioning in Computing Systems
Ashish Tiwari, Ritu Garg
International Journal on Semantic Web and Information Systems (2022) Vol. 18, Iss. 1, pp. 1-18
Open Access | Times Cited: 49
Ashish Tiwari, Ritu Garg
International Journal on Semantic Web and Information Systems (2022) Vol. 18, Iss. 1, pp. 1-18
Open Access | Times Cited: 49
Multi-server assisted data sharing supporting secure deduplication for metaverse healthcare systems
Tao Zhang, Jian Shen, Chin‐Feng Lai, et al.
Future Generation Computer Systems (2022) Vol. 140, pp. 299-310
Closed Access | Times Cited: 43
Tao Zhang, Jian Shen, Chin‐Feng Lai, et al.
Future Generation Computer Systems (2022) Vol. 140, pp. 299-310
Closed Access | Times Cited: 43
Using Artificial Neural Networks for Predicting Ship Fuel Consumption
Van Giao Nguyen, R. Sakthivel, Krzysztof Rudzki, et al.
Polish Maritime Research (2023) Vol. 30, Iss. 2, pp. 39-60
Open Access | Times Cited: 27
Van Giao Nguyen, R. Sakthivel, Krzysztof Rudzki, et al.
Polish Maritime Research (2023) Vol. 30, Iss. 2, pp. 39-60
Open Access | Times Cited: 27
A Survey on Video Streaming for Next-Generation Vehicular Networks
Chenn‐Jung Huang, Hao-Wen Cheng, Yi-Hung Lien, et al.
Electronics (2024) Vol. 13, Iss. 3, pp. 649-649
Open Access | Times Cited: 12
Chenn‐Jung Huang, Hao-Wen Cheng, Yi-Hung Lien, et al.
Electronics (2024) Vol. 13, Iss. 3, pp. 649-649
Open Access | Times Cited: 12
Artificial Intelligence and Machine Learning for Green Shipping: Navigating towards Sustainable Maritime Practices
Hoang Phuong Nguyen, Cao Thao Uyen Nguyen, Thi Men Tran, et al.
JOIV International Journal on Informatics Visualization (2024) Vol. 8, Iss. 1, pp. 1-1
Open Access | Times Cited: 8
Hoang Phuong Nguyen, Cao Thao Uyen Nguyen, Thi Men Tran, et al.
JOIV International Journal on Informatics Visualization (2024) Vol. 8, Iss. 1, pp. 1-1
Open Access | Times Cited: 8
Searchable and secure edge pre-cache scheme for intelligent 6G wireless systems
Chen Wang, Tianqi Zhou, Jian Shen, et al.
Future Generation Computer Systems (2022) Vol. 140, pp. 129-137
Closed Access | Times Cited: 29
Chen Wang, Tianqi Zhou, Jian Shen, et al.
Future Generation Computer Systems (2022) Vol. 140, pp. 129-137
Closed Access | Times Cited: 29
NVAS: A non-interactive verifiable federated learning aggregation scheme for COVID-19 based on game theory
Haitao Deng, Jing Hu, Rohit Sharma, et al.
Computer Communications (2023) Vol. 206, pp. 1-9
Open Access | Times Cited: 17
Haitao Deng, Jing Hu, Rohit Sharma, et al.
Computer Communications (2023) Vol. 206, pp. 1-9
Open Access | Times Cited: 17
An Efficient Vehicle-Assisted Aggregate Authentication Scheme for Infrastructure-Less Vehicular Networks
Haowen Tan, Wenying Zheng, Pandi Vijayakumar, et al.
IEEE Transactions on Intelligent Transportation Systems (2022) Vol. 24, Iss. 12, pp. 15590-15600
Closed Access | Times Cited: 27
Haowen Tan, Wenying Zheng, Pandi Vijayakumar, et al.
IEEE Transactions on Intelligent Transportation Systems (2022) Vol. 24, Iss. 12, pp. 15590-15600
Closed Access | Times Cited: 27
Neglected infrastructures for 6G—Underwater communications: How mature are they?
Nhu–Ngoc Dao, Ngo Hoang Tu, Tran Thien Thanh, et al.
Journal of Network and Computer Applications (2023) Vol. 213, pp. 103595-103595
Closed Access | Times Cited: 14
Nhu–Ngoc Dao, Ngo Hoang Tu, Tran Thien Thanh, et al.
Journal of Network and Computer Applications (2023) Vol. 213, pp. 103595-103595
Closed Access | Times Cited: 14
VRMDA: Verifiable and Robust Multi-subset Data Aggregation Scheme in IoT
Shengtao Li, Shuo Zhou, Yining Liu
Lecture notes in computer science (2025), pp. 126-138
Closed Access
Shengtao Li, Shuo Zhou, Yining Liu
Lecture notes in computer science (2025), pp. 126-138
Closed Access
A provably lightweight and secure DSSE scheme, with a constant storage cost for a smart device client
Salim Sabah Bulbul, Zaid Ameen Abduljabbar, Rana Jassim Mohammed, et al.
PLoS ONE (2024) Vol. 19, Iss. 4, pp. e0301277-e0301277
Open Access | Times Cited: 3
Salim Sabah Bulbul, Zaid Ameen Abduljabbar, Rana Jassim Mohammed, et al.
PLoS ONE (2024) Vol. 19, Iss. 4, pp. e0301277-e0301277
Open Access | Times Cited: 3
An adaptive access control scheme based on trust degrees for edge computing
Wenying Zheng, Bing Chen, Debiao He
Computer Standards & Interfaces (2022) Vol. 82, pp. 103640-103640
Closed Access | Times Cited: 15
Wenying Zheng, Bing Chen, Debiao He
Computer Standards & Interfaces (2022) Vol. 82, pp. 103640-103640
Closed Access | Times Cited: 15
Secure distributed data integrity auditing with high efficiency in 5G-enabled software-defined edge computing
Dengzhi Liu, Zhimin Li, Dongbao Jia
Cyber Security and Applications (2022) Vol. 1, pp. 100004-100004
Open Access | Times Cited: 14
Dengzhi Liu, Zhimin Li, Dongbao Jia
Cyber Security and Applications (2022) Vol. 1, pp. 100004-100004
Open Access | Times Cited: 14
Aggregation Technique Using Dynamic Cross-Propagation Clustering Algorithm in Wireless Body Sensor Networks
A. Arulprakash, K. M. Baalamurugan, Rajesh Kumar Dhanaraj, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-10
Open Access | Times Cited: 13
A. Arulprakash, K. M. Baalamurugan, Rajesh Kumar Dhanaraj, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-10
Open Access | Times Cited: 13
On the Weighted Cluster S-UAV Scheme Using Latency-Oriented Trust
Grace Khayat, Constandinos X. Mavromoustakis, Andreas Pitsillides, et al.
IEEE Access (2023) Vol. 11, pp. 56310-56323
Open Access | Times Cited: 7
Grace Khayat, Constandinos X. Mavromoustakis, Andreas Pitsillides, et al.
IEEE Access (2023) Vol. 11, pp. 56310-56323
Open Access | Times Cited: 7
Efficient Opportunities and Boundaries towards Internet of Things (IoT) Cost Adaptive Model
Ajay Chouhan, Ashish Tiwari, Chander Diwaker, et al.
2022 IEEE Delhi Section Conference (DELCON) (2022), pp. 1-5
Closed Access | Times Cited: 12
Ajay Chouhan, Ashish Tiwari, Chander Diwaker, et al.
2022 IEEE Delhi Section Conference (DELCON) (2022), pp. 1-5
Closed Access | Times Cited: 12
Secure session key pairing and a lightweight key authentication scheme for liable drone services
S. C. Rajkumar, Jegatha Deborah .L, Vishnu Gowda H P, et al.
Cyber Security and Applications (2022) Vol. 1, pp. 100012-100012
Open Access | Times Cited: 11
S. C. Rajkumar, Jegatha Deborah .L, Vishnu Gowda H P, et al.
Cyber Security and Applications (2022) Vol. 1, pp. 100012-100012
Open Access | Times Cited: 11
Detection of recurring vulnerabilities in computing services
Sarvesh Kumar, Kamlesh Kumar Dubey, Arun Kumar Gautam, et al.
Journal of Discrete Mathematical Sciences and Cryptography (2022) Vol. 25, Iss. 4, pp. 1063-1071
Closed Access | Times Cited: 10
Sarvesh Kumar, Kamlesh Kumar Dubey, Arun Kumar Gautam, et al.
Journal of Discrete Mathematical Sciences and Cryptography (2022) Vol. 25, Iss. 4, pp. 1063-1071
Closed Access | Times Cited: 10
Guest Editorial Security, Reliability, and Safety in IoT-Enabled Maritime Transportation Systems
Ali Kashif Bashir, Danda B. Rawat, Jun Wu, et al.
IEEE Transactions on Intelligent Transportation Systems (2023) Vol. 24, Iss. 2, pp. 2275-2281
Open Access | Times Cited: 4
Ali Kashif Bashir, Danda B. Rawat, Jun Wu, et al.
IEEE Transactions on Intelligent Transportation Systems (2023) Vol. 24, Iss. 2, pp. 2275-2281
Open Access | Times Cited: 4
A privacy-preserving data aggregation system based on blockchain in VANET
Ruicheng Yang, Guofang Dong, Zhengnan Xu, et al.
Blockchain Research and Applications (2024) Vol. 5, Iss. 3, pp. 100210-100210
Open Access | Times Cited: 1
Ruicheng Yang, Guofang Dong, Zhengnan Xu, et al.
Blockchain Research and Applications (2024) Vol. 5, Iss. 3, pp. 100210-100210
Open Access | Times Cited: 1
Generative AI for Customized Public Policy in Maritime Transport
Rupesh Kumar, Chhote Lal Yadav
Advances in logistics, operations, and management science book series (2024), pp. 241-270
Closed Access | Times Cited: 1
Rupesh Kumar, Chhote Lal Yadav
Advances in logistics, operations, and management science book series (2024), pp. 241-270
Closed Access | Times Cited: 1
Secure and efficient authenticated group key agreement protocol for AI-based automation systems
Tianqi Zhou, Chen Wang, Wenying Zheng, et al.
ISA Transactions (2023) Vol. 141, pp. 1-9
Closed Access | Times Cited: 3
Tianqi Zhou, Chen Wang, Wenying Zheng, et al.
ISA Transactions (2023) Vol. 141, pp. 1-9
Closed Access | Times Cited: 3
A Novel Key Agreement Protocol Applying Latin Square for Cloud Data Sharing
Jian Shen, Tao Zhang, Yi Jiang, et al.
IEEE Transactions on Sustainable Computing (2022) Vol. 8, Iss. 4, pp. 639-651
Closed Access | Times Cited: 3
Jian Shen, Tao Zhang, Yi Jiang, et al.
IEEE Transactions on Sustainable Computing (2022) Vol. 8, Iss. 4, pp. 639-651
Closed Access | Times Cited: 3