OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Hierarchical Bidirectional RNN for Safety-Enhanced B5G Heterogeneous Networks
Yang Xu, Xiaodan Yan, Yulei Wu, et al.
IEEE Transactions on Network Science and Engineering (2021) Vol. 8, Iss. 4, pp. 2946-2957
Closed Access | Times Cited: 48

Showing 1-25 of 48 citing articles:

A survey on deep learning for cybersecurity: Progress, challenges, and opportunities
Mayra Macas, Chunming Wu, Walter Fuertes
Computer Networks (2022) Vol. 212, pp. 109032-109032
Closed Access | Times Cited: 91

A Privacy-Preserving Medical Data Sharing Scheme Based on Blockchain
Guangquan Xu, Qi Chen, Wenyu Dong, et al.
IEEE Journal of Biomedical and Health Informatics (2022) Vol. 27, Iss. 2, pp. 698-709
Closed Access | Times Cited: 42

BVFLEMR: an integrated federated learning and blockchain technology for cloud-based medical records recommendation system
Tao Hai, Jincheng Zhou, S. Srividhya, et al.
Journal of Cloud Computing Advances Systems and Applications (2022) Vol. 11, Iss. 1
Open Access | Times Cited: 28

Smali code-based deep learning model for Android malware detection
Abhishek Anand, Jyoti Prakash Singh, Amit Kumar Singh
The Journal of Supercomputing (2025) Vol. 81, Iss. 4
Closed Access

The State of the Art of Deep Learning-Based Wi-Fi Indoor Positioning: A Review
Yiruo Lin, Kegen Yu, Feiyang Zhu, et al.
IEEE Sensors Journal (2024) Vol. 24, Iss. 17, pp. 27076-27098
Closed Access | Times Cited: 4

Addressing Overfitting Problem in Deep Learning‐Based Solutions for Next Generation Data‐Driven Networks
Mansheng Xiao, Yuezhong Wu, Guocai Zuo, et al.
Wireless Communications and Mobile Computing (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 28

Design and Analysis of a Hybrid GNN-ZNN Model With a Fuzzy Adaptive Factor for Matrix Inversion
Jianhua Dai, Yuanmeng Chen, Lin Xiao, et al.
IEEE Transactions on Industrial Informatics (2021) Vol. 18, Iss. 4, pp. 2434-2442
Closed Access | Times Cited: 25

An improved federated learning approach enhanced internet of health things framework for private decentralized distributed data
Chenxi Huang, Gengchen Xu, Sirui Chen, et al.
Information Sciences (2022) Vol. 614, pp. 138-152
Closed Access | Times Cited: 18

CIA Security for Internet of Vehicles and Blockchain-AI Integration
Tao Hai, Muammer Aksoy, Celestine Iwendi, et al.
Journal of Grid Computing (2024) Vol. 22, Iss. 2
Closed Access | Times Cited: 3

An efficient transmission algorithm for power grid data suitable for autonomous multi-robot systems
Xiaohong Chen, Wei Liang, Xinlian Zhou, et al.
Information Sciences (2021) Vol. 572, pp. 543-557
Closed Access | Times Cited: 21

Cloud-based deep learning-assisted system for diagnosis of sports injuries
Xiaoe Wu, Jincheng Zhou, Maoxing Zheng, et al.
Journal of Cloud Computing Advances Systems and Applications (2022) Vol. 11, Iss. 1
Open Access | Times Cited: 15

Cloud-based bug tracking software defects analysis using deep learning
Tao Hai, Jincheng Zhou, Ning Li, et al.
Journal of Cloud Computing Advances Systems and Applications (2022) Vol. 11, Iss. 1
Open Access | Times Cited: 11

An Automated Framework for Histopathological Nucleus Segmentation with Deep Attention Integrated Networks
Muyi Sun, Wenxuan Zou, Zhaoyang Wang, et al.
IEEE/ACM Transactions on Computational Biology and Bioinformatics (2023) Vol. 21, Iss. 4, pp. 995-1006
Closed Access | Times Cited: 6

A novel blockchain-based and proxy-oriented public audit scheme for low performance terminal devices
Mande Xie, Qiting Zhao, Haibo Hong, et al.
Journal of Parallel and Distributed Computing (2022) Vol. 169, pp. 58-71
Closed Access | Times Cited: 9

Voice spoofing countermeasure for voice replay attacks using deep learning
Jincheng Zhou, Tao Hai, Dayang N. A. Jawawi, et al.
Journal of Cloud Computing Advances Systems and Applications (2022) Vol. 11, Iss. 1
Open Access | Times Cited: 9

Defect knowledge graph construction and application in multi-cloud IoT
Wenqing Yang, Xiaochao Li, Peng Wang, et al.
Journal of Cloud Computing Advances Systems and Applications (2022) Vol. 11, Iss. 1
Closed Access | Times Cited: 9

Prediction-Based Resource Deployment and Task Scheduling in Edge-Cloud Collaborative Computing
Mingfeng Su, Guojun Wang, Kim‐Kwang Raymond Choo
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-17
Open Access | Times Cited: 8

N-Trans: Parallel Detection Algorithm for DGA Domain Names
Cheng Yang, Tianliang Lu, Shangyi Yan, et al.
Future Internet (2022) Vol. 14, Iss. 7, pp. 209-209
Open Access | Times Cited: 8

BFR‐SE: A Blockchain‐Based Fair and Reliable Searchable Encryption Scheme for IoT with Fine‐Grained Access Control in Cloud Environment
Hongmin Gao, Shoushan Luo, Zhaofeng Ma, et al.
Wireless Communications and Mobile Computing (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 11

Network Threat Detection Based on Group CNN for Privacy Protection
Yanping Xu, Xia Zhang, Chengdan Lu, et al.
Wireless Communications and Mobile Computing (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 9

Efficient task offloading with swarm intelligence evolution for edge‐cloud collaboration in vehicular edge computing
Mingfeng Su, Guojun Wang, Jianer Chen
Software Practice and Experience (2022) Vol. 54, Iss. 10, pp. 1888-1915
Closed Access | Times Cited: 6

A Domain Embedding Model for Botnet Detection Based on Smart Blockchain
Xiaodan Yan, Yang Xu, Shuang Yao, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 5, pp. 8005-8018
Closed Access | Times Cited: 3

A Personalized Search Query Generating Method for Safety-Enhanced Vehicle-to-People Networks
Xiaodan Yan, Jiwei Zhang, Haroon Elahi, et al.
IEEE Transactions on Vehicular Technology (2021) Vol. 70, Iss. 6, pp. 5296-5307
Closed Access | Times Cited: 7

Trusted Player Transfer Evaluation for Sport Markets Based on Blockchain and Locality-Sensitive Hashing
Chao Liu, Zeng-Xi Li, Shunshun Liu, et al.
IEEE Access (2021) Vol. 9, pp. 87332-87339
Closed Access | Times Cited: 7

Dual‐Level Attention Based on a Heterogeneous Graph Convolution Network for Aspect‐Based Sentiment Classification
Peng Yuan, Lei Jiang, Jianxun Liu, et al.
Wireless Communications and Mobile Computing (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 5

Page 1 - Next Page

Scroll to top