
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Security Protection Mechanism in Cloud Computing Authorization Model Using Machine Learning Techniques
Pradeep Kumar Tiwari, K. Kannan, D. Veeraiah, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-12
Open Access | Times Cited: 11
Pradeep Kumar Tiwari, K. Kannan, D. Veeraiah, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-12
Open Access | Times Cited: 11
Showing 11 citing articles:
Prediction of Cardiovascular Diseases with Retinal Images Using Deep Learning
Tumu Vineetha, Danda Rami Reddy, Kandimalla Mahendra, et al.
2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) (2024), pp. 1-9
Closed Access | Times Cited: 1
Tumu Vineetha, Danda Rami Reddy, Kandimalla Mahendra, et al.
2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) (2024), pp. 1-9
Closed Access | Times Cited: 1
MRI Scans for Deep Learning-Based Chronic Nephropathy Detection: A Comparison of CNN, MobileNet, VGG16, and ResNet-50 Models
Md. Amanatulla, Gundala Swathi, M. Pallavi, et al.
(2024), pp. 1-6
Closed Access | Times Cited: 1
Md. Amanatulla, Gundala Swathi, M. Pallavi, et al.
(2024), pp. 1-6
Closed Access | Times Cited: 1
Securing the Information using Improved Modular Encryption Standard in Cloud Computing Environment
Syed Ismail Abdul Lathif, D. John Pradeep, J. Ashok, et al.
KSII Transactions on Internet and Information Systems (2023) Vol. 17, Iss. 10
Open Access | Times Cited: 4
Syed Ismail Abdul Lathif, D. John Pradeep, J. Ashok, et al.
KSII Transactions on Internet and Information Systems (2023) Vol. 17, Iss. 10
Open Access | Times Cited: 4
Efficient and privacy-preserving image classification using homomorphic encryption and chunk-based convolutional neural network
Huixue Jia, Daomeng Cai, Jie Yang, et al.
Journal of Cloud Computing Advances Systems and Applications (2023) Vol. 12, Iss. 1
Open Access | Times Cited: 2
Huixue Jia, Daomeng Cai, Jie Yang, et al.
Journal of Cloud Computing Advances Systems and Applications (2023) Vol. 12, Iss. 1
Open Access | Times Cited: 2
Enabling DNS Security through Permissioned Blockchain
D. Veeraiah, Shaik Johny Basha, Shaik Beebi Fathima, et al.
2022 International Conference on Inventive Computation Technologies (ICICT) (2024)
Closed Access
D. Veeraiah, Shaik Johny Basha, Shaik Beebi Fathima, et al.
2022 International Conference on Inventive Computation Technologies (ICICT) (2024)
Closed Access
Enhanced Healthcare Security: Integrating Blockchain and IoT for Patient Data Protection and Remote Vital Sign Monitoring
D. Veeraiah, V. Sowjanya, S. Nagababu, et al.
(2024), pp. 1434-1441
Closed Access
D. Veeraiah, V. Sowjanya, S. Nagababu, et al.
(2024), pp. 1434-1441
Closed Access
Enhancing Communication for Deaf and Dumb Individuals through Sign Language Detection: A Comprehensive Dataset and SVM-Based Model Approach
D. Veeraiah, Shaik Johny Basha, Korlimarla Sree Deepthi, et al.
(2024), pp. 947-954
Closed Access
D. Veeraiah, Shaik Johny Basha, Korlimarla Sree Deepthi, et al.
(2024), pp. 947-954
Closed Access
Melodies in the Machine - Gru's Role in Crafting Musical Elegance
N.V. Naik, Kondla Maha Lakshmi, Muddada Yogeesh, et al.
(2024), pp. 1-5
Closed Access
N.V. Naik, Kondla Maha Lakshmi, Muddada Yogeesh, et al.
(2024), pp. 1-5
Closed Access
Deep Learning Driven Food Recognition and Calorie Estimation Using Mobile Net Architecture
N. Srikanth, K. Sagar, Ch. Sravanthi, et al.
(2024), pp. 1-7
Closed Access
N. Srikanth, K. Sagar, Ch. Sravanthi, et al.
(2024), pp. 1-7
Closed Access
An In-Depth Analysis of Contemporary Security Breaches using Time Series Analysis
A. Sree Rama Chandra Murthy, Muthyala Sravani, Gajaganti Ruthmani, et al.
Advances in computer science research (2024), pp. 701-709
Open Access
A. Sree Rama Chandra Murthy, Muthyala Sravani, Gajaganti Ruthmani, et al.
Advances in computer science research (2024), pp. 701-709
Open Access
Efficient and Privacy-Preserving Image Classification Using Homomorphic Encryption and Chunk-based Convolutional Neural Network
Huixue Jia, Daomeng Cai, Jie Yang, et al.
Research Square (Research Square) (2023)
Open Access | Times Cited: 1
Huixue Jia, Daomeng Cai, Jie Yang, et al.
Research Square (Research Square) (2023)
Open Access | Times Cited: 1