
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Advancing Federated Learning through Verifiable Computations and Homomorphic Encryption
Bingxue Zhang, Guangguang Lu, Pengpeng Qiu, et al.
Entropy (2023) Vol. 25, Iss. 11, pp. 1550-1550
Open Access | Times Cited: 6
Bingxue Zhang, Guangguang Lu, Pengpeng Qiu, et al.
Entropy (2023) Vol. 25, Iss. 11, pp. 1550-1550
Open Access | Times Cited: 6
Showing 6 citing articles:
QP-ChainSZKP: A Quantum-Proof Blockchain Framework for Scalable and Secure Cloud Applications
V. Ananthakrishna, Chandra Shekhar Yadav
International Journal of Computational and Experimental Science and Engineering (2025) Vol. 11, Iss. 1
Open Access | Times Cited: 3
V. Ananthakrishna, Chandra Shekhar Yadav
International Journal of Computational and Experimental Science and Engineering (2025) Vol. 11, Iss. 1
Open Access | Times Cited: 3
An Efficient Attribute-Based Participant Selecting Scheme with Blockchain for Federated Learning in Smart Cities
Xiaojun Yin, Haochen Qiu, Xijun Wu, et al.
Computers (2024) Vol. 13, Iss. 5, pp. 118-118
Open Access | Times Cited: 1
Xiaojun Yin, Haochen Qiu, Xijun Wu, et al.
Computers (2024) Vol. 13, Iss. 5, pp. 118-118
Open Access | Times Cited: 1
High Performance Privacy Preserving AI
Jayavanth Shenoy, Patrick Grinaway, Shriphani Palakodety
(2024)
Open Access
Jayavanth Shenoy, Patrick Grinaway, Shriphani Palakodety
(2024)
Open Access
FedHE-Graph: Federated Learning with Hybrid Encryption on Graph Neural Networks for Advanced Persistent Threat Detection
Atmane Ayoub Mansour Bahar, Kamel Soaïd Ferrahi, Mohamed‐Lamine Messai, et al.
Proceedings of the 17th International Conference on Availability, Reliability and Security (2024), pp. 1-10
Closed Access
Atmane Ayoub Mansour Bahar, Kamel Soaïd Ferrahi, Mohamed‐Lamine Messai, et al.
Proceedings of the 17th International Conference on Availability, Reliability and Security (2024), pp. 1-10
Closed Access
Verification of Deep Neural Networks with KGZ-Based zkSNARK
Subhasis Thakur, John G. Breslin
Lecture notes in networks and systems (2024), pp. 79-95
Closed Access
Subhasis Thakur, John G. Breslin
Lecture notes in networks and systems (2024), pp. 79-95
Closed Access
Efficient Deep Neural Network Verification with QAP-Based ZkSNARK
Subhasis Thakur, John G. Breslin
Communications in computer and information science (2024), pp. 178-191
Closed Access
Subhasis Thakur, John G. Breslin
Communications in computer and information science (2024), pp. 178-191
Closed Access