OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Secure data deduplication for Internet-of-things sensor networks based on threshold dynamic adjustment
Yuan Gao, Hequn Xian, Aimin Yu
International Journal of Distributed Sensor Networks (2020) Vol. 16, Iss. 3, pp. 155014772091100-155014772091100
Open Access | Times Cited: 16

Showing 16 citing articles:

Reinforcement Q-Learning-Based Adaptive Encryption Model for Cyberthreat Mitigation in Wireless Sensor Networks
B P Sreeja, S. Gopikrishnan, Marco Rivera, et al.
Sensors (2025) Vol. 25, Iss. 7, pp. 2056-2056
Open Access

Privacy-Preserving and Distributed Algorithms for Modular Exponentiation in IoT With Edge Computing Assistance
Hongjun Li, Jia Yu, Hanlin Zhang, et al.
IEEE Internet of Things Journal (2020) Vol. 7, Iss. 9, pp. 8769-8779
Closed Access | Times Cited: 36

GLEAN: Generalized-Deduplication-Enabled Approximate Edge Analytics
Aaron Hurst, Daniel E. Lucani, Ira Assent, et al.
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 5, pp. 4006-4020
Closed Access | Times Cited: 13

A secure and efficient data deduplication framework for the internet of things via edge computing and blockchain
Zeng Wu, Hui Huang, Yuping Zhou, et al.
Connection Science (2022) Vol. 34, Iss. 1, pp. 1999-2025
Open Access | Times Cited: 12

An improved secure file deduplication avoidance using CKHO based deep learning model in a cloud environment
N. Mageshkumar, L. Lakshmanan
The Journal of Supercomputing (2022) Vol. 78, Iss. 13, pp. 14892-14918
Closed Access | Times Cited: 7

Secure Deduplication with Dynamic Key Management in Fog Enabled Internet of Things
Jay Dave, Nikumani Choudhury, Utkarsh Tiwari, et al.
2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) (2023), pp. 1237-1242
Closed Access | Times Cited: 3

‏An Enhanced Approach to Improve the Security and Performance for Deduplication
Nourah Almrezeq Et al.
Türk bilgisayar ve matematik eğitimi dergisi (2021) Vol. 12, Iss. 6, pp. 2866-2882
Open Access | Times Cited: 8

CTS-IIoT: Computation of Time Series Data During Index Based De-duplication of Industrial IoT (IIoT) Data in Cloud Environment
S.U. Muthunagai, R. Anitha
Wireless Personal Communications (2022) Vol. 129, Iss. 1, pp. 433-453
Closed Access | Times Cited: 4

Resumption of virtual machines after adaptive deduplication of virtual machine images in live migration
Naga Malleswari T. Y. J., T. Senthil Kumar, C. Jothikumar
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2020) Vol. 11, Iss. 1, pp. 654-654
Open Access | Times Cited: 4

A Blockchain Based Forensic System for IoT Sensors using MQTT Protocol
Wan Chen, Amjad Mehmood, Carsten Maple, et al.
(2022), pp. 1-8
Closed Access | Times Cited: 3

Hermes
Christian Göttel, Lars B. Nielsen, Niloofar Yazdani, et al.
(2020), pp. 133-136
Open Access | Times Cited: 2

TDOPS: Time series based deduplication and optimal data placement strategy for IIoT in cloud environment
S.U. Muthunagai, R. Anitha
Journal of Intelligent & Fuzzy Systems (2022) Vol. 43, Iss. 1, pp. 1583-1597
Closed Access | Times Cited: 1

Hash Table Assisted Efficient File Level De-Duplication Scheme in SD-IoV Assisted Sensing Devices
Ghawar Said, Ata Ullah, Anwar Ghani, et al.
Intelligent Automation & Soft Computing (2023) Vol. 38, Iss. 1, pp. 83-99
Open Access

Blockchain-Based Secure and Verifiable Deduplication Scheme for Cloud-Assisted Internet of Things
Guipeng Zhang, Pinghua Chen, Yongwei Liao
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 8, pp. 13995-14006
Closed Access

Data Security Transmission Algorithm of Remote Demonstration System Based on Internet of Things
Yong-sheng Zong, Guo-yan Huang
Springer eBooks (2022), pp. 239-253
Closed Access

Page 1

Scroll to top