OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Pigeon Inspired Optimization with Encryption Based Secure Medical Image Management System
B. T. Geetha, M. Prakash, A. V. R. Mayuri, et al.
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-13
Open Access | Times Cited: 54

Showing 1-25 of 54 citing articles:

Handcrafted Deep-Feature-Based Brain Tumor Detection and Classification Using MRI Images
M. Prakash, V E Sathishkumar, S. Neelakandan, et al.
Electronics (2022) Vol. 11, Iss. 24, pp. 4178-4178
Open Access | Times Cited: 47

Oppositional Cat Swarm Optimization‐Based Feature Selection Approach for Credit Card Fraud Detection
N. Prabhakaran, R. Nedunchelian
Computational Intelligence and Neuroscience (2023) Vol. 2023, Iss. 1
Open Access | Times Cited: 19

Eagle Strategy Arithmetic Optimisation Algorithm with Optimal Deep Convolutional Forest Based FinTech Application for Hyper-automation
M. Prakash, S. Neelakandan, Abbas Mardani, et al.
Enterprise Information Systems (2023) Vol. 17, Iss. 10
Closed Access | Times Cited: 17

Effective Identification and Authentication of Healthcare IoT Using Fog Computing with Hybrid Cryptographic Algorithm
P. Britto Corthis, G. P. Ramesh, Miguel García-Torres, et al.
Symmetry (2024) Vol. 16, Iss. 6, pp. 726-726
Open Access | Times Cited: 6

Bridging the Gap in the Adoption of Trustworthy AI in Indian Healthcare: Challenges and Opportunities
Sarat Kumar Chettri, Rup Kumar Deka, Manob Jyoti Saikia
AI (2025) Vol. 6, Iss. 1, pp. 10-10
Open Access

Robust Facial Expression Recognition Using an Evolutionary Algorithm with a Deep Learning Model
A. V. R. Mayuri, Ranjith Kumar Manoharan, S. Neelakandan, et al.
Applied Sciences (2022) Vol. 13, Iss. 1, pp. 468-468
Open Access | Times Cited: 24

Comparison of Linear Regression and Logistic Regression Algorithms for Ground Water Level Detection with Improved Accuracy
C. Gnaneswar Raju, V. Amudha, G. Sajiv
(2023), pp. 1-6
Closed Access | Times Cited: 7

Evolutionary Algorithm Based Feature Subset Selection for Students Academic Performance Analysis
I. Adumbabu, R. MathuSoothana, Sowmya Ramesh Kumar
Intelligent Automation & Soft Computing (2023) Vol. 36, Iss. 3, pp. 3621-3636
Open Access | Times Cited: 6

An explainable deep learning model for prediction of early‐stage chronic kidney disease
A. Vinothini, Baghavathi Priya Sankaralingam, Uma Maheswari Jayachandran, et al.
Computational Intelligence (2023) Vol. 39, Iss. 6, pp. 1022-1038
Closed Access | Times Cited: 5

A critical review of the state of computer security in the health sector
Raúl Jáuregui-Velarde, Domingo Hernández Celis, Cesar Yactayo-Arias, et al.
Bulletin of Electrical Engineering and Informatics (2023) Vol. 12, Iss. 6, pp. 3805-3816
Open Access | Times Cited: 5

Faster Region‐based Convolutional Neural Networks with You Only Look Once multi‐stage caries lesion from oral panoramic X‐ray images
Jayaraj Velusamy, T. Rajajegan, Sini Anna Alex, et al.
Expert Systems (2023) Vol. 41, Iss. 6
Closed Access | Times Cited: 2

Enhanced Galactic Swarm Algorithm with Encryption Technique for Medical Image Security in Internet of Things environment
Velmurugan Subbiah Parvathy, A. M. Gurusigaamani, P. Vigneshwaran, et al.
Elsevier eBooks (2024), pp. 103-122
Closed Access

Enhancing Security of Medical Image Transmission: An Innovative Fuzzy-AHP Approach
Satish Kumar, Sunil K. Singh, Pawan Kumar Chaurasia
Lecture notes in networks and systems (2024), pp. 471-483
Closed Access

Comparative Evaluation of Wavelet Transform Methods for Surface Roughness in Turning of Monel 400 Superalloy: A Precision Analysis
R. M. Bommi, G. Uganya, A. Mary Joy Kinol, et al.
Lecture notes in networks and systems (2024), pp. 161-181
Closed Access

Marine predators optimization with deep learning model for video‐based facial expression recognition
Mal Hari Prasad, P. Swarnalatha
Expert Systems (2024) Vol. 41, Iss. 10
Closed Access

Secure SSI framework using the optimized Orkey identity schema
KOSTIN P.N., Anil Kumar
International Journal of Information Technology (2024) Vol. 16, Iss. 6, pp. 4007-4014
Closed Access

Integration of simulated annealing into pigeon inspired optimizer algorithm for feature selection in network intrusion detection systems
Wanwei Huang, Tian Hao-bin, Sun’an Wang, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e2176-e2176
Open Access

Secure Data Aggregation and Transmission System for Wireless Body Area Networks Using Twofish Symmetric Key Generation
Insozhan Nagasundharamoorthi, Prabhu Venkatesan, V. Parthasarathy
Pertanika journal of science & technology (2024) Vol. 32, Iss. 6, pp. 2903-2929
Closed Access

A big data analysis algorithm for massive sensor medical images
Sarah A. Alzakari, Nuha Alruwais, Shaymaa E. Sorour, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e2464-e2464
Open Access

Page 1 - Next Page

Scroll to top