OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Novel Machine Learning Technique for Selecting Suitable Image Encryption Algorithms for IoT Applications
Arslan Shafique, Abid Mehmood, Moatsum Alawida, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-21
Open Access | Times Cited: 9

Showing 9 citing articles:

Chaos and Cellular Automata-Based Substitution Box and Its Application in Cryptography
Arslan Shafique, Kashif Hesham Khan, Mohammad Mazyad Hazzazi, et al.
Mathematics (2023) Vol. 11, Iss. 10, pp. 2322-2322
Open Access | Times Cited: 16

Performance optimization of hydroelectric power-plants using computational intelligence techniques
Ashish Kumar, Vijay Singh Maan, Monika Saini
International Journal of Information Technology (2024) Vol. 16, Iss. 4, pp. 2215-2227
Closed Access | Times Cited: 4

Hybrid image encryption algorithm based on compressive sensing, gray wolf optimization, and chaos
Ali Akram Abdul-Kareem, Waleed A. Mahmoud Al‐Jawher
Journal of Electronic Imaging (2023) Vol. 32, Iss. 04
Closed Access | Times Cited: 10

Integration of lightweight cryptography and watermarking with compression for high speed and reliable communication of digital images in IoT
Hadi Nazari, Mahmoud Mahlouji Bidgoli, H. Ghasvari
IET Image Processing (2023) Vol. 17, Iss. 10, pp. 2984-3001
Open Access | Times Cited: 6

A time-efficient and noise-resistant cryptosystem based on discrete wavelet transform and chaos theory: An application in image encryption
Abid Mehmood, Arslan Shafique, Shehzad Ashraf Chaudhry, et al.
Journal of Information Security and Applications (2023) Vol. 78, pp. 103590-103590
Closed Access | Times Cited: 6

Blockchain-Based Autonomous Authentication and Integrity for Internet of Battlefield Things in C3I System
Aqsa Rashid, Atta ur Rehman Khan
IEEE Access (2022) Vol. 10, pp. 91572-91587
Open Access | Times Cited: 10

Memory Visualization-Based Malware Detection Technique
Syed Shakir Hameed Shah, Norziana Jamil, Atta ur Rehman Khan
Sensors (2022) Vol. 22, Iss. 19, pp. 7611-7611
Open Access | Times Cited: 6

Page 1

Scroll to top