
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
PDPChain: A Consortium Blockchain-Based Privacy Protection Scheme for Personal Data
Wei Liang, Yang Yang, Ce Yang, et al.
IEEE Transactions on Reliability (2022) Vol. 72, Iss. 2, pp. 586-598
Closed Access | Times Cited: 135
Wei Liang, Yang Yang, Ce Yang, et al.
IEEE Transactions on Reliability (2022) Vol. 72, Iss. 2, pp. 586-598
Closed Access | Times Cited: 135
Showing 1-25 of 135 citing articles:
LMCA: a lightweight anomaly network traffic detection model integrating adjusted mobilenet and coordinate attention mechanism for IoT
Dezhi Han, Hongxu Zhou, Tien‐Hsiung Weng, et al.
Telecommunication Systems (2023) Vol. 84, Iss. 4, pp. 549-564
Closed Access | Times Cited: 71
Dezhi Han, Hongxu Zhou, Tien‐Hsiung Weng, et al.
Telecommunication Systems (2023) Vol. 84, Iss. 4, pp. 549-564
Closed Access | Times Cited: 71
GTxChain: A Secure IoT Smart Blockchain Architecture Based on Graph Neural Network
Jiahong Cai, Wei Liang, Xiong Li, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 24, pp. 21502-21514
Closed Access | Times Cited: 58
Jiahong Cai, Wei Liang, Xiong Li, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 24, pp. 21502-21514
Closed Access | Times Cited: 58
A Systematic Review of Consensus Mechanisms in Blockchain
Sisi Zhou, Kuan‐Ching Li, Lijun Xiao, et al.
Mathematics (2023) Vol. 11, Iss. 10, pp. 2248-2248
Open Access | Times Cited: 47
Sisi Zhou, Kuan‐Ching Li, Lijun Xiao, et al.
Mathematics (2023) Vol. 11, Iss. 10, pp. 2248-2248
Open Access | Times Cited: 47
Role of Blockchain Technology in Smart Era: A Review on Possible Smart Applications
Amit Kumar Tyagi, Shaveta Malik, Richa Richa, et al.
Journal of Information & Knowledge Management (2024) Vol. 23, Iss. 03
Closed Access | Times Cited: 36
Amit Kumar Tyagi, Shaveta Malik, Richa Richa, et al.
Journal of Information & Knowledge Management (2024) Vol. 23, Iss. 03
Closed Access | Times Cited: 36
A novel system for medical equipment supply chain traceability based on alliance chain and attribute and role access control
Jiatao Li, Dezhi Han, Zhongdai Wu, et al.
Future Generation Computer Systems (2022) Vol. 142, pp. 195-211
Closed Access | Times Cited: 50
Jiatao Li, Dezhi Han, Zhongdai Wu, et al.
Future Generation Computer Systems (2022) Vol. 142, pp. 195-211
Closed Access | Times Cited: 50
Towards Risk-Free Trustworthy Artificial Intelligence: Significance and Requirements
Laith Alzubaidi, Aiman Al-Sabaawi, Jinshuai Bai, et al.
International Journal of Intelligent Systems (2023) Vol. 2023, pp. 1-41
Open Access | Times Cited: 38
Laith Alzubaidi, Aiman Al-Sabaawi, Jinshuai Bai, et al.
International Journal of Intelligent Systems (2023) Vol. 2023, pp. 1-41
Open Access | Times Cited: 38
Byzantine Fault-Tolerant Consensus Algorithms: A Survey
Weiyu Zhong, Ce Yang, Wei Liang, et al.
Electronics (2023) Vol. 12, Iss. 18, pp. 3801-3801
Open Access | Times Cited: 23
Weiyu Zhong, Ce Yang, Wei Liang, et al.
Electronics (2023) Vol. 12, Iss. 18, pp. 3801-3801
Open Access | Times Cited: 23
On Identity, Transaction, and Smart Contract Privacy on Permissioned and Permissionless Blockchain: A Comprehensive Survey
Wei Liang, Yaqin Liu, Ce Yang, et al.
ACM Computing Surveys (2024) Vol. 56, Iss. 12, pp. 1-35
Closed Access | Times Cited: 14
Wei Liang, Yaqin Liu, Ce Yang, et al.
ACM Computing Surveys (2024) Vol. 56, Iss. 12, pp. 1-35
Closed Access | Times Cited: 14
A secure data storage and sharing scheme for port supply chain based on blockchain and dynamic searchable encryption
Jiatao Li, Dezhi Han, Tien‐Hsiung Weng, et al.
Computer Standards & Interfaces (2024) Vol. 91, pp. 103887-103887
Closed Access | Times Cited: 14
Jiatao Li, Dezhi Han, Tien‐Hsiung Weng, et al.
Computer Standards & Interfaces (2024) Vol. 91, pp. 103887-103887
Closed Access | Times Cited: 14
TrustBCFL: Mitigating Data Bias in IoT Through Blockchain-Enabled Federated Learning
Sisi Zhou, Kuanching Li, Yuxiang Chen, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 15, pp. 25648-25662
Closed Access | Times Cited: 13
Sisi Zhou, Kuanching Li, Yuxiang Chen, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 15, pp. 25648-25662
Closed Access | Times Cited: 13
MC-DSC: A Dynamic Secure Resource Configuration Scheme Based on Medical Consortium Blockchain
Wei Liang, Siqi Xie, Kuan‐Ching Li, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 3525-3538
Closed Access | Times Cited: 10
Wei Liang, Siqi Xie, Kuan‐Ching Li, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 3525-3538
Closed Access | Times Cited: 10
Modeling and analysis of port supply chain system based on Fabric blockchain
Na Gao, Dezhi Han, Tien‐Hsiung Weng, et al.
Computers & Industrial Engineering (2022) Vol. 172, pp. 108527-108527
Closed Access | Times Cited: 35
Na Gao, Dezhi Han, Tien‐Hsiung Weng, et al.
Computers & Industrial Engineering (2022) Vol. 172, pp. 108527-108527
Closed Access | Times Cited: 35
Blockchains for Artificial Intelligence of Things: A Comprehensive Survey
Meng Shen, Aijing Gu, Jiawen Kang, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 16, pp. 14483-14506
Closed Access | Times Cited: 21
Meng Shen, Aijing Gu, Jiawen Kang, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 16, pp. 14483-14506
Closed Access | Times Cited: 21
Provably Secure Conditional-Privacy Access Control Protocol for Intelligent Customers-Centric Communication in VANET
Muhammad Asad Saleem, Xiong Li, Khalid Mahmood, et al.
IEEE Transactions on Consumer Electronics (2023) Vol. 70, Iss. 1, pp. 1747-1756
Closed Access | Times Cited: 21
Muhammad Asad Saleem, Xiong Li, Khalid Mahmood, et al.
IEEE Transactions on Consumer Electronics (2023) Vol. 70, Iss. 1, pp. 1747-1756
Closed Access | Times Cited: 21
BFG: privacy protection framework for internet of medical things based on blockchain and federated learning
Wenkang Liu, Yuxuan He, Xiaoliang Wang, et al.
Connection Science (2023) Vol. 35, Iss. 1
Open Access | Times Cited: 19
Wenkang Liu, Yuxuan He, Xiaoliang Wang, et al.
Connection Science (2023) Vol. 35, Iss. 1
Open Access | Times Cited: 19
A traceable and revocable decentralized multi-authority privacy protection scheme for social metaverse
Shaobo Zhang, Yuechao Wang, Entao Luo, et al.
Journal of Systems Architecture (2023) Vol. 140, pp. 102899-102899
Closed Access | Times Cited: 18
Shaobo Zhang, Yuechao Wang, Entao Luo, et al.
Journal of Systems Architecture (2023) Vol. 140, pp. 102899-102899
Closed Access | Times Cited: 18
LightNestle: Quick and Accurate Neural Sequential Tensor Completion via Meta Learning
Yuhui Li, Wei Liang, Kun Xie, et al.
IEEE INFOCOM 2022 - IEEE Conference on Computer Communications (2023)
Closed Access | Times Cited: 14
Yuhui Li, Wei Liang, Kun Xie, et al.
IEEE INFOCOM 2022 - IEEE Conference on Computer Communications (2023)
Closed Access | Times Cited: 14
LightPay: A Lightweight and Secure Off-Chain Multi-Path Payment Scheme Based on Adapter Signatures
Yaqin Liu, Wei Liang, Kun Xie, et al.
IEEE Transactions on Services Computing (2023) Vol. 17, Iss. 4, pp. 1622-1635
Closed Access | Times Cited: 13
Yaqin Liu, Wei Liang, Kun Xie, et al.
IEEE Transactions on Services Computing (2023) Vol. 17, Iss. 4, pp. 1622-1635
Closed Access | Times Cited: 13
Research on Privacy Protection in Federated Learning Combining Distillation Defense and Blockchain
Changxu Wan, Ying Wang, Jianbo Xu, et al.
Electronics (2024) Vol. 13, Iss. 4, pp. 679-679
Open Access | Times Cited: 5
Changxu Wan, Ying Wang, Jianbo Xu, et al.
Electronics (2024) Vol. 13, Iss. 4, pp. 679-679
Open Access | Times Cited: 5
Design and analysis of quantum machine learning: a survey
Linshu Chen, Tao Li, Yuxiang Chen, et al.
Connection Science (2024) Vol. 36, Iss. 1
Open Access | Times Cited: 5
Linshu Chen, Tao Li, Yuxiang Chen, et al.
Connection Science (2024) Vol. 36, Iss. 1
Open Access | Times Cited: 5
DPS-IIoT: Non-interactive zero-knowledge poof-inspired access control towards information-centric Industrial Internet of Things
Dun Li, Noël Crespi, Roberto Minerva, et al.
Computer Communications (2025), pp. 108065-108065
Open Access
Dun Li, Noël Crespi, Roberto Minerva, et al.
Computer Communications (2025), pp. 108065-108065
Open Access
ASAM: Asynchronous self-attention model for visual question answering
Han Liu, Dezhi Han, Shukai Zhang, et al.
Computer Science and Information Systems (2025) Vol. 22, Iss. 1, pp. 199-217
Open Access
Han Liu, Dezhi Han, Shukai Zhang, et al.
Computer Science and Information Systems (2025) Vol. 22, Iss. 1, pp. 199-217
Open Access
Efficient and secure cross-domain data sharing scheme with traceability for Industrial Internet
Wei Luo, Ziyi Lv, Chengzhe Lai, et al.
Computer Networks (2025), pp. 111117-111117
Closed Access
Wei Luo, Ziyi Lv, Chengzhe Lai, et al.
Computer Networks (2025), pp. 111117-111117
Closed Access
Data Owner Rights Protection and Digital Identity Management Enabled by Blockchain
Liang Dong, Jun Wang, Zhixin Wang, et al.
Applied Mathematics and Nonlinear Sciences (2025) Vol. 10, Iss. 1
Open Access
Liang Dong, Jun Wang, Zhixin Wang, et al.
Applied Mathematics and Nonlinear Sciences (2025) Vol. 10, Iss. 1
Open Access
A privacy-preserving certificate-less aggregate signature scheme with detectable invalid signatures for VANETs
Xiaoliang Wang, Peng Zeng, G. Liu, et al.
Journal of Information Security and Applications (2025) Vol. 89, pp. 104001-104001
Closed Access
Xiaoliang Wang, Peng Zeng, G. Liu, et al.
Journal of Information Security and Applications (2025) Vol. 89, pp. 104001-104001
Closed Access