
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Improved Double Deep Q Network-Based Task Scheduling Algorithm in Edge Computing for Makespan Optimization
Lei Zeng, Qi Liu, Shigen Shen, et al.
Tsinghua Science & Technology (2023) Vol. 29, Iss. 3, pp. 806-817
Open Access | Times Cited: 30
Lei Zeng, Qi Liu, Shigen Shen, et al.
Tsinghua Science & Technology (2023) Vol. 29, Iss. 3, pp. 806-817
Open Access | Times Cited: 30
Showing 1-25 of 30 citing articles:
Combining Lyapunov Optimization With Actor–Critic Networks for Privacy-Aware IIoT Computation Offloading
Guowen Wu, Xihang Chen, Yizhou Shen, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 10, pp. 17437-17452
Closed Access | Times Cited: 23
Guowen Wu, Xihang Chen, Yizhou Shen, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 10, pp. 17437-17452
Closed Access | Times Cited: 23
Accurate and efficient daily carbon emission forecasting based on improved ARIMA
Weiyi Zhong, Dengshuai Zhai, Wenran Xu, et al.
Applied Energy (2024) Vol. 376, pp. 124232-124232
Closed Access | Times Cited: 11
Weiyi Zhong, Dengshuai Zhai, Wenran Xu, et al.
Applied Energy (2024) Vol. 376, pp. 124232-124232
Closed Access | Times Cited: 11
SIHQR model with time delay for worm spread analysis in IIoT-enabled PLC network
Guowen Wu, Yanchun Zhang, Hong Zhang, et al.
Ad Hoc Networks (2024) Vol. 160, pp. 103504-103504
Closed Access | Times Cited: 7
Guowen Wu, Yanchun Zhang, Hong Zhang, et al.
Ad Hoc Networks (2024) Vol. 160, pp. 103504-103504
Closed Access | Times Cited: 7
MFGD3QN: Enhancing Edge Intelligence Defense against DDoS with Mean-Field Games and Dueling Double Deep Q-network
Shigen Shen, Chenpeng Cai, Yizhou Shen, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 13, pp. 23931-23945
Closed Access | Times Cited: 6
Shigen Shen, Chenpeng Cai, Yizhou Shen, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 13, pp. 23931-23945
Closed Access | Times Cited: 6
Ensuring Privacy and Correlation Awareness in Multi-Dimensional Service Quality Prediction and Recommendation for IoT
Weiyi Zhong, Fang Wei, Yifan Zhao, et al.
Information Sciences (2025), pp. 122017-122017
Closed Access
Weiyi Zhong, Fang Wei, Yifan Zhao, et al.
Information Sciences (2025), pp. 122017-122017
Closed Access
Reinforcement learning-based solution for resource management in fog computing: A comprehensive survey
Reyhane Ghafari, N. Mansouri
Expert Systems with Applications (2025), pp. 127214-127214
Closed Access
Reyhane Ghafari, N. Mansouri
Expert Systems with Applications (2025), pp. 127214-127214
Closed Access
GSFL: A Privacy-preserving Grouping-Split Federated Learning Approach in Resource-constrained Edge Computing Scenarios
Qi Liu, Z. Wang, Xiaokang Zhou, et al.
ACM Transactions on Autonomous and Adaptive Systems (2025)
Closed Access
Qi Liu, Z. Wang, Xiaokang Zhou, et al.
ACM Transactions on Autonomous and Adaptive Systems (2025)
Closed Access
Task offloading strategy based on improved double deep Q network in smart cities
Bin Wu, Liwen Ma, J. Cong, et al.
Wireless Networks (2025)
Closed Access
Bin Wu, Liwen Ma, J. Cong, et al.
Wireless Networks (2025)
Closed Access
An Interval-valued Spherical Fuzzy CIMAS-WISP Group Decision-analytic Model for Blockchain Platform Selection in Digital Projects
Karahan Kara, Galip Cihan Yalçın, Vladimir Šimić, et al.
Applied Soft Computing (2024) Vol. 162, pp. 111810-111810
Closed Access | Times Cited: 4
Karahan Kara, Galip Cihan Yalçın, Vladimir Šimić, et al.
Applied Soft Computing (2024) Vol. 162, pp. 111810-111810
Closed Access | Times Cited: 4
An Optimizing Geo-Distributed Edge Layering with Double Deep Q-Networks for Predictive Mobility-Aware Offloading in Mobile Edge Computing
Amir M. Rahmani, Amir Haider, Saqib Ali, et al.
Ad Hoc Networks (2025), pp. 103804-103804
Closed Access
Amir M. Rahmani, Amir Haider, Saqib Ali, et al.
Ad Hoc Networks (2025), pp. 103804-103804
Closed Access
Enhanced DDPG algorithm for latency and energy-efficient task scheduling in MEC systems
Fei Zhou, Lihong Zhao, X. X. Ding, et al.
Discover Internet of Things (2025) Vol. 5, Iss. 1
Open Access
Fei Zhou, Lihong Zhao, X. X. Ding, et al.
Discover Internet of Things (2025) Vol. 5, Iss. 1
Open Access
The mapping trick: leveraging RoboSoccer obstacle avoidance and navigation for advanced task scheduling solutions in foggy IoE ecosystems
Seyed Omid Azarkasb, Seyed Hossein Khasteh
The Journal of Supercomputing (2025) Vol. 81, Iss. 5
Closed Access
Seyed Omid Azarkasb, Seyed Hossein Khasteh
The Journal of Supercomputing (2025) Vol. 81, Iss. 5
Closed Access
Comparative DQN-Improved Algorithms for Stochastic Games-Based Automated Edge Intelligence-Enabled IoT Malware Spread-Suppression Strategies
Yizhou Shen, Carlton Shepherd, Chuadhry Mujeeb Ahmed, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 12, pp. 22550-22561
Open Access | Times Cited: 3
Yizhou Shen, Carlton Shepherd, Chuadhry Mujeeb Ahmed, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 12, pp. 22550-22561
Open Access | Times Cited: 3
Game-theoretic analytics for privacy preservation in Internet of Things networks: A survey
Yizhou Shen, Carlton Shepherd, Chuadhry Mujeeb Ahmed, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 133, pp. 108449-108449
Closed Access | Times Cited: 3
Yizhou Shen, Carlton Shepherd, Chuadhry Mujeeb Ahmed, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 133, pp. 108449-108449
Closed Access | Times Cited: 3
Novel Intrusion Detection Strategies With Optimal Hyper Parameters for Industrial Internet of Things Based On Stochastic Games and Double Deep Q-Networks
Shoujian Yu, X. H. Wang, Yizhou Shen, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 17, pp. 29132-29145
Closed Access | Times Cited: 3
Shoujian Yu, X. H. Wang, Yizhou Shen, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 17, pp. 29132-29145
Closed Access | Times Cited: 3
Current Status and Challenges and Future Trends of Deep Learning-Based Intrusion Detection Models
Yuqiang Wu, Bailin Zou, Yifei Cao
Journal of Imaging (2024) Vol. 10, Iss. 10, pp. 254-254
Open Access | Times Cited: 3
Yuqiang Wu, Bailin Zou, Yifei Cao
Journal of Imaging (2024) Vol. 10, Iss. 10, pp. 254-254
Open Access | Times Cited: 3
UAV-assisted dependency-aware computation offloading in device–edge–cloud collaborative computing based on improved actor–critic DRL
Longxin Zhang, Runti Tan, Yanfen Zhang, et al.
Journal of Systems Architecture (2024) Vol. 154, pp. 103215-103215
Closed Access | Times Cited: 2
Longxin Zhang, Runti Tan, Yanfen Zhang, et al.
Journal of Systems Architecture (2024) Vol. 154, pp. 103215-103215
Closed Access | Times Cited: 2
Robust Object Detection Using Fire Hawks Optimizer with Deep Learning Model for Video Surveillance
S. Prabu, J. M. Gnanasekar
Journal of Circuits Systems and Computers (2024) Vol. 33, Iss. 13
Closed Access | Times Cited: 1
S. Prabu, J. M. Gnanasekar
Journal of Circuits Systems and Computers (2024) Vol. 33, Iss. 13
Closed Access | Times Cited: 1
An online energy-saving offloading algorithm in mobile edge computing with Lyapunov optimization
Xiaoyan Zhao, Ming Li, Peiyan Yuan
Ad Hoc Networks (2024) Vol. 163, pp. 103580-103580
Closed Access | Times Cited: 1
Xiaoyan Zhao, Ming Li, Peiyan Yuan
Ad Hoc Networks (2024) Vol. 163, pp. 103580-103580
Closed Access | Times Cited: 1
Energy saving computation offloading for dynamic CR-MEC systems with NOMA via decomposition based soft actor–critic
Baoshan Lu, Junli Fang, Xuemin Hong, et al.
Expert Systems with Applications (2024) Vol. 255, pp. 124455-124455
Closed Access | Times Cited: 1
Baoshan Lu, Junli Fang, Xuemin Hong, et al.
Expert Systems with Applications (2024) Vol. 255, pp. 124455-124455
Closed Access | Times Cited: 1
EETS: An energy-efficient task scheduler in cloud computing based on improved DQN algorithm
Huanhuan Hou, Azlan Ismail
Journal of King Saud University - Computer and Information Sciences (2024) Vol. 36, Iss. 8, pp. 102177-102177
Open Access | Times Cited: 1
Huanhuan Hou, Azlan Ismail
Journal of King Saud University - Computer and Information Sciences (2024) Vol. 36, Iss. 8, pp. 102177-102177
Open Access | Times Cited: 1
Deep Reinforcement Learning for Dependent Task Offloading in Multi-Access Edge Computing
Hengzhou Ye, Jiaming Li, Qiu Lu
IEEE Access (2024) Vol. 12, pp. 166281-166297
Open Access | Times Cited: 1
Hengzhou Ye, Jiaming Li, Qiu Lu
IEEE Access (2024) Vol. 12, pp. 166281-166297
Open Access | Times Cited: 1
Double RISs assisted task offloading for NOMA-MEC with action-constrained deep reinforcement learning
Junli Fang, Baoshan Lu, Xuemin Hong, et al.
Knowledge-Based Systems (2023) Vol. 284, pp. 111307-111307
Closed Access | Times Cited: 3
Junli Fang, Baoshan Lu, Xuemin Hong, et al.
Knowledge-Based Systems (2023) Vol. 284, pp. 111307-111307
Closed Access | Times Cited: 3
Periodic Prediction Based Integrated Solutions for Wireless Communication and Edge Computing in Smart Railway Systems
Chao Ren, Jiayin Song, Yin Long, et al.
Research Square (Research Square) (2024)
Open Access
Chao Ren, Jiayin Song, Yin Long, et al.
Research Square (Research Square) (2024)
Open Access
Service-oriented data consistency research for in-vehicle Ethernet
Bingkui Li, Lei Zhuang, Guoqing Wang, et al.
Vehicular Communications (2024) Vol. 47, pp. 100776-100776
Closed Access
Bingkui Li, Lei Zhuang, Guoqing Wang, et al.
Vehicular Communications (2024) Vol. 47, pp. 100776-100776
Closed Access