
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Blockchain-Based Secure Localization against Malicious Nodes in IoT-Based Wireless Sensor Networks Using Federated Learning
Gebrekiros Gebreyesus Gebremariam, Jeebananda Panda, S. Indu
Wireless Communications and Mobile Computing (2023) Vol. 2023, pp. 1-27
Open Access | Times Cited: 36
Gebrekiros Gebreyesus Gebremariam, Jeebananda Panda, S. Indu
Wireless Communications and Mobile Computing (2023) Vol. 2023, pp. 1-27
Open Access | Times Cited: 36
Showing 1-25 of 36 citing articles:
Current trends in AI and ML for cybersecurity: A state-of-the-art survey
Nachaat Mohamed
Cogent Engineering (2023) Vol. 10, Iss. 2
Open Access | Times Cited: 48
Nachaat Mohamed
Cogent Engineering (2023) Vol. 10, Iss. 2
Open Access | Times Cited: 48
Detection of Denial-of-Service Attack in Wireless Sensor Networks: A Lightweight Machine Learning Approach
Muawia A. Elsadig
IEEE Access (2023) Vol. 11, pp. 83537-83552
Open Access | Times Cited: 24
Muawia A. Elsadig
IEEE Access (2023) Vol. 11, pp. 83537-83552
Open Access | Times Cited: 24
Unified ensemble federated learning with cloud computing for online anomaly detection in energy-efficient wireless sensor networks
S. Gayathri, D. Surendran
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 8
S. Gayathri, D. Surendran
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 8
Trustworthy Localization in IoT Networks: A Survey of Localization Techniques, Threats, and Mitigation
Giovanni Pettorru, Virginia Pilloni, Marco Martalò
Sensors (2024) Vol. 24, Iss. 7, pp. 2214-2214
Open Access | Times Cited: 7
Giovanni Pettorru, Virginia Pilloni, Marco Martalò
Sensors (2024) Vol. 24, Iss. 7, pp. 2214-2214
Open Access | Times Cited: 7
A fair non-collateral consensus protocol based on Merkle tree for hierarchical IoT blockchain
Seyedeh Somayeh Fateminasab, Davoud Bahrepour, Seyed Reza Kamel Tabbakh
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Seyedeh Somayeh Fateminasab, Davoud Bahrepour, Seyed Reza Kamel Tabbakh
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Unleashing the prospective of blockchain-federated learning fusion for IoT security: A comprehensive review
Mansi Gupta, Mohit Kumar, Renu Dhir
Computer Science Review (2024) Vol. 54, pp. 100685-100685
Closed Access | Times Cited: 4
Mansi Gupta, Mohit Kumar, Renu Dhir
Computer Science Review (2024) Vol. 54, pp. 100685-100685
Closed Access | Times Cited: 4
Optimizing WSN Network Lifetime With Federated Learning–Based Routing
Jim Hawkinson S, Ramesh SM, Sommer Janine A., et al.
International Journal of Communication Systems (2025) Vol. 38, Iss. 4
Closed Access
Jim Hawkinson S, Ramesh SM, Sommer Janine A., et al.
International Journal of Communication Systems (2025) Vol. 38, Iss. 4
Closed Access
DPS-IIoT: Non-interactive zero-knowledge poof-inspired access control towards information-centric Industrial Internet of Things
Dun Li, Noël Crespi, Roberto Minerva, et al.
Computer Communications (2025), pp. 108065-108065
Open Access
Dun Li, Noël Crespi, Roberto Minerva, et al.
Computer Communications (2025), pp. 108065-108065
Open Access
Achieving efficient and accurate privacy-preserving localization for internet of things: A quantization-based approach
Guanghui Wang, Zhang Xue-yuan, Lingfeng Shen, et al.
Future Generation Computer Systems (2025) Vol. 167, pp. 107740-107740
Closed Access
Guanghui Wang, Zhang Xue-yuan, Lingfeng Shen, et al.
Future Generation Computer Systems (2025) Vol. 167, pp. 107740-107740
Closed Access
Towards a lightweight security framework using blockchain and machine learning
Shereen Ismail, Muhammad Nouman, Diana W. Dawoud, et al.
Blockchain Research and Applications (2023) Vol. 5, Iss. 1, pp. 100174-100174
Open Access | Times Cited: 9
Shereen Ismail, Muhammad Nouman, Diana W. Dawoud, et al.
Blockchain Research and Applications (2023) Vol. 5, Iss. 1, pp. 100174-100174
Open Access | Times Cited: 9
Detecting Cyberattacks to Federated Learning on Software-Defined Networks
Himanshi Babbar, Shalli Rani, Aman Singh, et al.
Communications in computer and information science (2024), pp. 120-132
Closed Access | Times Cited: 2
Himanshi Babbar, Shalli Rani, Aman Singh, et al.
Communications in computer and information science (2024), pp. 120-132
Closed Access | Times Cited: 2
Next-Generation Protection: Leveraging Federated Learning and Blockchain for Intrusion Detection in Smart Vehicle Network
Javaid Ahmad Malik
Power System Technology (2024) Vol. 48, Iss. 1, pp. 931-952
Open Access | Times Cited: 2
Javaid Ahmad Malik
Power System Technology (2024) Vol. 48, Iss. 1, pp. 931-952
Open Access | Times Cited: 2
Secure Trust Node Acquisition and Access Control for Privacy-Preserving Expertise Trust in WBAN Networks
Israa Al Barazanchi, Wahidah Hashim, Reema Thabit, et al.
Lecture notes in networks and systems (2024), pp. 265-275
Closed Access | Times Cited: 2
Israa Al Barazanchi, Wahidah Hashim, Reema Thabit, et al.
Lecture notes in networks and systems (2024), pp. 265-275
Closed Access | Times Cited: 2
A Hybrid Secure Signcryption Algorithm for data security in an internet of medical things environment
Kanneboina Ashok, S. Gopikrishnan
Journal of Information Security and Applications (2024) Vol. 85, pp. 103836-103836
Closed Access | Times Cited: 2
Kanneboina Ashok, S. Gopikrishnan
Journal of Information Security and Applications (2024) Vol. 85, pp. 103836-103836
Closed Access | Times Cited: 2
Blockchain enabled secured, smart healthcare system for smart cities: a systematic review on architecture, technology, and service management
Bhabani Sankar Samantray, K. Hemant Kumar Reddy
Cluster Computing (2024) Vol. 27, Iss. 10, pp. 14387-14415
Closed Access | Times Cited: 1
Bhabani Sankar Samantray, K. Hemant Kumar Reddy
Cluster Computing (2024) Vol. 27, Iss. 10, pp. 14387-14415
Closed Access | Times Cited: 1
Analysis of Encrypted Network Traffic for Enhancing Cyber-security in Dynamic Environments
Faeiz Alserhani
Applied Artificial Intelligence (2024) Vol. 38, Iss. 1
Open Access | Times Cited: 1
Faeiz Alserhani
Applied Artificial Intelligence (2024) Vol. 38, Iss. 1
Open Access | Times Cited: 1
Wireless sensor localization based on distance optimization and assistance by mobile anchor nodes: a novel algorithm
Hui Yang
PeerJ Computer Science (2024) Vol. 10, pp. e2179-e2179
Open Access | Times Cited: 1
Hui Yang
PeerJ Computer Science (2024) Vol. 10, pp. e2179-e2179
Open Access | Times Cited: 1
An improved federated transfer learning model for intrusion detection in edge computing empowered wireless sensor networks
L. Raja, G. Sakthi, S. Vimalnath, et al.
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 24
Closed Access | Times Cited: 1
L. Raja, G. Sakthi, S. Vimalnath, et al.
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 24
Closed Access | Times Cited: 1
Optimizing Agricultural Risk Management with Hybrid Block-Chain and Fog Computing Architectures for Secure and Efficient Data Handling
Javaid Ahmad Malik, Aamir Hussain, Habib Shah, et al.
Studies in computational intelligence (2024), pp. 309-337
Closed Access | Times Cited: 1
Javaid Ahmad Malik, Aamir Hussain, Habib Shah, et al.
Studies in computational intelligence (2024), pp. 309-337
Closed Access | Times Cited: 1
A secure routing and malicious node detection in mobile Ad hoc network using trust value evaluation with improved XGBoost mechanism
Geetika Dhand, Meena Rao, Parul Chaudhary, et al.
Journal of Network and Computer Applications (2024) Vol. 235, pp. 104093-104093
Closed Access | Times Cited: 1
Geetika Dhand, Meena Rao, Parul Chaudhary, et al.
Journal of Network and Computer Applications (2024) Vol. 235, pp. 104093-104093
Closed Access | Times Cited: 1
Blockchain Based Multi-hop Routing and Cost-Effective Decentralized Storage System for Wireless Sensor Networks
Muhammad Faisal, Ghassan Husnain
Wireless Personal Communications (2023) Vol. 131, Iss. 4, pp. 3009-3025
Closed Access | Times Cited: 2
Muhammad Faisal, Ghassan Husnain
Wireless Personal Communications (2023) Vol. 131, Iss. 4, pp. 3009-3025
Closed Access | Times Cited: 2
Enhancing Privacy-Preserving Localization by Integrating Random Noise With Blockchain in Internet of Things
Guanghui Wang, Yajie Li, Rui Liu, et al.
IEEE Transactions on Network and Service Management (2023) Vol. 21, Iss. 2, pp. 2445-2459
Closed Access | Times Cited: 2
Guanghui Wang, Yajie Li, Rui Liu, et al.
IEEE Transactions on Network and Service Management (2023) Vol. 21, Iss. 2, pp. 2445-2459
Closed Access | Times Cited: 2
Blockchain-Enabled Federated Learning for Secured Edge Data Communication Through a Decentralized Software-Defined Network
S. Selvi, G. Revathy, P. Gokila Brindha
Advances in logistics, operations, and management science book series (2024), pp. 128-141
Closed Access
S. Selvi, G. Revathy, P. Gokila Brindha
Advances in logistics, operations, and management science book series (2024), pp. 128-141
Closed Access
An Improved Blockchain Based Security Framework for IoT Enabled Wireless Network
Kapil Shrivastava, Sandeep Singh, Preeti Chaudhary, et al.
(2024), pp. 913-918
Closed Access
Kapil Shrivastava, Sandeep Singh, Preeti Chaudhary, et al.
(2024), pp. 913-918
Closed Access
Federated Learning and Cloud Integration for Enhanced Anomaly Detection in Wireless Sensor Networks using LSTM Models and Raspberry Pi Node
S. Gayathri, D. Surendran
(2024), pp. 593-600
Closed Access
S. Gayathri, D. Surendran
(2024), pp. 593-600
Closed Access