
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Physical Layer Security for MISO NOMA VLC System Under Eavesdropper Collusion
Peng Hao, Zixiong Wang, Shiying Han, et al.
IEEE Transactions on Vehicular Technology (2021) Vol. 70, Iss. 6, pp. 6249-6254
Closed Access | Times Cited: 23
Peng Hao, Zixiong Wang, Shiying Han, et al.
IEEE Transactions on Vehicular Technology (2021) Vol. 70, Iss. 6, pp. 6249-6254
Closed Access | Times Cited: 23
Showing 23 citing articles:
Security Requirements and Challenges of 6G Technologies and Applications
Shimaa A. Abdel Hakeem, Hanan Hussein, HyungWon Kim
Sensors (2022) Vol. 22, Iss. 5, pp. 1969-1969
Open Access | Times Cited: 128
Shimaa A. Abdel Hakeem, Hanan Hussein, HyungWon Kim
Sensors (2022) Vol. 22, Iss. 5, pp. 1969-1969
Open Access | Times Cited: 128
RIS-Assisted Visible Light Communication Systems: A Tutorial
Sylvester Aboagye, Alain R. Ndjiongue, Telex M. N. Ngatched, et al.
IEEE Communications Surveys & Tutorials (2022) Vol. 25, Iss. 1, pp. 251-288
Open Access | Times Cited: 100
Sylvester Aboagye, Alain R. Ndjiongue, Telex M. N. Ngatched, et al.
IEEE Communications Surveys & Tutorials (2022) Vol. 25, Iss. 1, pp. 251-288
Open Access | Times Cited: 100
Covert Communications: A Comprehensive Survey
Xinying Chen, Jianping An, Zehui Xiong, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 2, pp. 1173-1198
Closed Access | Times Cited: 84
Xinying Chen, Jianping An, Zehui Xiong, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 2, pp. 1173-1198
Closed Access | Times Cited: 84
Anomaly Detection in 6G Networks Using Machine Learning Methods
Mamoon M. Saeed, Rashid A. Saeed, Maha Abdelhaq, et al.
Electronics (2023) Vol. 12, Iss. 15, pp. 3300-3300
Open Access | Times Cited: 35
Mamoon M. Saeed, Rashid A. Saeed, Maha Abdelhaq, et al.
Electronics (2023) Vol. 12, Iss. 15, pp. 3300-3300
Open Access | Times Cited: 35
Multi-Objective Optimization Approaches for Physical Layer Secure Communications Based on Collaborative Beamforming in UAV Networks
Jiahui Li, Geng Sun, Hui Kang, et al.
IEEE/ACM Transactions on Networking (2023) Vol. 31, Iss. 4, pp. 1902-1917
Closed Access | Times Cited: 22
Jiahui Li, Geng Sun, Hui Kang, et al.
IEEE/ACM Transactions on Networking (2023) Vol. 31, Iss. 4, pp. 1902-1917
Closed Access | Times Cited: 22
A comprehensive survey on 6G-security: physical connection and service layers
Mamoon M. Saeed, Rashid A. Saeed, Mohammad Kamrul Hasan, et al.
Discover Internet of Things (2025) Vol. 5, Iss. 1
Open Access
Mamoon M. Saeed, Rashid A. Saeed, Mohammad Kamrul Hasan, et al.
Discover Internet of Things (2025) Vol. 5, Iss. 1
Open Access
Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges
Van-Linh Nguyen, Po‐Ching Lin, Bo‐Chao Cheng, et al.
IEEE Communications Surveys & Tutorials (2021) Vol. 23, Iss. 4, pp. 2384-2428
Open Access | Times Cited: 30
Van-Linh Nguyen, Po‐Ching Lin, Bo‐Chao Cheng, et al.
IEEE Communications Surveys & Tutorials (2021) Vol. 23, Iss. 4, pp. 2384-2428
Open Access | Times Cited: 30
Secure Uplink Transmission Against Multi-Intelligent Eavesdroppers With Time-Domain Artificial Noise in MIMO IoT Systems
Yingzhen Wu, Yan Huo, Qinghe Gao, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 19, pp. 31662-31674
Closed Access | Times Cited: 4
Yingzhen Wu, Yan Huo, Qinghe Gao, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 19, pp. 31662-31674
Closed Access | Times Cited: 4
On the Physical Layer Security of Underwater Optical Wireless Communication Networks
Elmehdi Illi, Marwa Qaraqe
IEEE Journal of Oceanic Engineering (2024) Vol. 49, Iss. 2, pp. 583-591
Closed Access | Times Cited: 3
Elmehdi Illi, Marwa Qaraqe
IEEE Journal of Oceanic Engineering (2024) Vol. 49, Iss. 2, pp. 583-591
Closed Access | Times Cited: 3
FPGA-Based Visible Light Communications Instrument for Implementation and Testing of Ultralow Latency Applications
Stefano Ricci, Stefano Caputo, Lorenzo Mucchi
IEEE Transactions on Instrumentation and Measurement (2023) Vol. 72, pp. 1-11
Open Access | Times Cited: 8
Stefano Ricci, Stefano Caputo, Lorenzo Mucchi
IEEE Transactions on Instrumentation and Measurement (2023) Vol. 72, pp. 1-11
Open Access | Times Cited: 8
SLIPT-Enabled Multi-LED MU-MISO VLC Networks: Joint Beamforming and DC Bias Optimization
Yangbo Guo, Ke Xiong, Yang Lu, et al.
IEEE Transactions on Green Communications and Networking (2022) Vol. 7, Iss. 3, pp. 1104-1120
Closed Access | Times Cited: 13
Yangbo Guo, Ke Xiong, Yang Lu, et al.
IEEE Transactions on Green Communications and Networking (2022) Vol. 7, Iss. 3, pp. 1104-1120
Closed Access | Times Cited: 13
Cooperative Beamforming With Artificial Noise Injection for Physical-Layer Security
Geunyeong Jang, Donghyeon Kim, In-Ho Lee, et al.
IEEE Access (2023) Vol. 11, pp. 22553-22573
Open Access | Times Cited: 7
Geunyeong Jang, Donghyeon Kim, In-Ho Lee, et al.
IEEE Access (2023) Vol. 11, pp. 22553-22573
Open Access | Times Cited: 7
Secure Beamforming for MISO Visible Light Communications With ISI and NLoS Components
Jin‐Yuan Wang, Yin-Chang Yu, Ding-Shan Lu, et al.
IEEE Wireless Communications Letters (2024) Vol. 13, Iss. 3, pp. 908-912
Closed Access | Times Cited: 2
Jin‐Yuan Wang, Yin-Chang Yu, Ding-Shan Lu, et al.
IEEE Wireless Communications Letters (2024) Vol. 13, Iss. 3, pp. 908-912
Closed Access | Times Cited: 2
Secrecy Sum-Rate Enhancement for NOMA-VLC System With Pseudo User
Ganggang Li, Ping Wang, Ting Yang, et al.
IEEE Communications Letters (2022) Vol. 27, Iss. 1, pp. 243-247
Closed Access | Times Cited: 9
Ganggang Li, Ping Wang, Ting Yang, et al.
IEEE Communications Letters (2022) Vol. 27, Iss. 1, pp. 243-247
Closed Access | Times Cited: 9
QoS-aware secure transmission design for VLC with semi-grant-free NOMA scheme
Ganggang Li, Ping Wang, binna Zhou, et al.
Optics Express (2023) Vol. 31, Iss. 7, pp. 11923-11923
Open Access | Times Cited: 5
Ganggang Li, Ping Wang, binna Zhou, et al.
Optics Express (2023) Vol. 31, Iss. 7, pp. 11923-11923
Open Access | Times Cited: 5
Spatial Modulation Aided Physical Layer Security for NOMA-VLC Systems
Erdal Panayırcı, Mutlu Koca, Harald Haas, et al.
IEEE Transactions on Vehicular Technology (2023) Vol. 72, Iss. 8, pp. 10286-10301
Closed Access | Times Cited: 4
Erdal Panayırcı, Mutlu Koca, Harald Haas, et al.
IEEE Transactions on Vehicular Technology (2023) Vol. 72, Iss. 8, pp. 10286-10301
Closed Access | Times Cited: 4
Power Allocation for NOMA-Based Visible Light Communication Systems with DQN
Jiawei Deng, Xuan Tang, Xian Wei, et al.
2022 13th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP) (2024), pp. 512-517
Closed Access
Jiawei Deng, Xuan Tang, Xian Wei, et al.
2022 13th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP) (2024), pp. 512-517
Closed Access
Improved physical layer secrecy fairness in a realistic indoor NOMA VLC network under users’ mobility
Fatemeh Bahadori, Seyed Mohammad Sajad Sadough
Optik (2023) Vol. 291, pp. 171357-171357
Closed Access | Times Cited: 1
Fatemeh Bahadori, Seyed Mohammad Sajad Sadough
Optik (2023) Vol. 291, pp. 171357-171357
Closed Access | Times Cited: 1
Enhancing Security in NOMA-Based Networks: An Effective Deceptive Approach to Thwart Multiple Eavesdroppers
Neji Mensi, Danda B. Rawat
(2023), pp. 1-9
Closed Access | Times Cited: 1
Neji Mensi, Danda B. Rawat
(2023), pp. 1-9
Closed Access | Times Cited: 1
Transmit Precoding for Physical Layer Security of MIMO-NOMA-Based Visible Light Communications
Nugman Su, Erdal Panayırcı, Mutlu Koca, et al.
(2021)
Closed Access | Times Cited: 3
Nugman Su, Erdal Panayırcı, Mutlu Koca, et al.
(2021)
Closed Access | Times Cited: 3
Minimum secrecy rate maximization for multiple peer-to-peer communications in two-way relaying networks
Mehdi Cheraghi, Yousef Darmani
AEU - International Journal of Electronics and Communications (2023) Vol. 168, pp. 154670-154670
Closed Access
Mehdi Cheraghi, Yousef Darmani
AEU - International Journal of Electronics and Communications (2023) Vol. 168, pp. 154670-154670
Closed Access
Methods of Identifying and Reducing Covert Channel Attacks: An Analysis
Kurmi Sandeep Kumar S, Manisha J. Nene
(2023), pp. 1-7
Closed Access
Kurmi Sandeep Kumar S, Manisha J. Nene
(2023), pp. 1-7
Closed Access
Detection and Mitigation Mechanisms for Covert Channel Attack
Kurmi Sandeep Kumar S, Manisha J. Nene
(2023)
Closed Access
Kurmi Sandeep Kumar S, Manisha J. Nene
(2023)
Closed Access