
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Neural Attractor-Based Adaptive Key Generator with DNA-Coded Security and Privacy Framework for Multimedia Data in Cloud Environments
Hemalatha Mahalingam, Padmapriya Velupillai Meikandan, K. Thenmozhi, et al.
Mathematics (2023) Vol. 11, Iss. 8, pp. 1769-1769
Open Access | Times Cited: 43
Hemalatha Mahalingam, Padmapriya Velupillai Meikandan, K. Thenmozhi, et al.
Mathematics (2023) Vol. 11, Iss. 8, pp. 1769-1769
Open Access | Times Cited: 43
Showing 1-25 of 43 citing articles:
A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm
Sanjay Kumar, Deepmala Sharma
Artificial Intelligence Review (2024) Vol. 57, Iss. 4
Open Access | Times Cited: 30
Sanjay Kumar, Deepmala Sharma
Artificial Intelligence Review (2024) Vol. 57, Iss. 4
Open Access | Times Cited: 30
Understanding Ransomware Attacks: Trends and Prevention Strategies
FNU Jimmy
Journal of Knowledge Learning and Science Technology ISSN 2959-6386 (online) (2023) Vol. 2, Iss. 1, pp. 180-210
Open Access | Times Cited: 24
FNU Jimmy
Journal of Knowledge Learning and Science Technology ISSN 2959-6386 (online) (2023) Vol. 2, Iss. 1, pp. 180-210
Open Access | Times Cited: 24
DNA-chaos governed cryptosystem for cloud-based medical image repository
Nithya Chidambaram, K. Thenmozhi, Pethuru Raj, et al.
Cluster Computing (2024) Vol. 27, Iss. 4, pp. 4127-4144
Closed Access | Times Cited: 12
Nithya Chidambaram, K. Thenmozhi, Pethuru Raj, et al.
Cluster Computing (2024) Vol. 27, Iss. 4, pp. 4127-4144
Closed Access | Times Cited: 12
Exploring Challenges and Solutions in Cloud Computing: A Review of Data Security and Privacy Concerns
Vinayak Raja
Deleted Journal (2024) Vol. 4, Iss. 1, pp. 121-144
Open Access | Times Cited: 11
Vinayak Raja
Deleted Journal (2024) Vol. 4, Iss. 1, pp. 121-144
Open Access | Times Cited: 11
Exploring Challenges and Solutions in Cloud Computing: A Review of Data Security and Privacy Concerns
Vinayak Raja
Deleted Journal (2024) Vol. 4, Iss. 1, pp. 121-141
Open Access | Times Cited: 8
Vinayak Raja
Deleted Journal (2024) Vol. 4, Iss. 1, pp. 121-141
Open Access | Times Cited: 8
Interdisciplinary Perspectives: Fusing Artificial Intelligence with Environmental Science for Sustainable Solutions
Jeff Shuford
Deleted Journal (2024) Vol. 1, Iss. 1, pp. 106-123
Open Access | Times Cited: 8
Jeff Shuford
Deleted Journal (2024) Vol. 1, Iss. 1, pp. 106-123
Open Access | Times Cited: 8
Image scrambling encryption using chaotic map and genetic algorithm: a hybrid approach for enhanced security
Sanjay Kumar, Deepmala Sharma
Nonlinear Dynamics (2024) Vol. 112, Iss. 14, pp. 12537-12564
Closed Access | Times Cited: 8
Sanjay Kumar, Deepmala Sharma
Nonlinear Dynamics (2024) Vol. 112, Iss. 14, pp. 12537-12564
Closed Access | Times Cited: 8
Revolutionizing Healthcare: The Role of Machine Learning in the Health Sector
Mithun Sarker
Deleted Journal (2024) Vol. 2, Iss. 1, pp. 36-61
Open Access | Times Cited: 7
Mithun Sarker
Deleted Journal (2024) Vol. 2, Iss. 1, pp. 36-61
Open Access | Times Cited: 7
Securing Images Using High Dimensional Chaotic Maps and DNA Encoding Techniques
Mohammed Es-Sabry, Nabil El Akkad, Mostafa Merras, et al.
IEEE Access (2023) Vol. 11, pp. 100856-100878
Open Access | Times Cited: 19
Mohammed Es-Sabry, Nabil El Akkad, Mostafa Merras, et al.
IEEE Access (2023) Vol. 11, pp. 100856-100878
Open Access | Times Cited: 19
Healthcare with datacare—a triangular DNA security
S. Aashiq Banu, Adel Ismail Al‐Alawi, M. Padmaa, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 7, pp. 21153-21170
Closed Access | Times Cited: 15
S. Aashiq Banu, Adel Ismail Al‐Alawi, M. Padmaa, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 7, pp. 21153-21170
Closed Access | Times Cited: 15
Efficient and secure chaotic PRNG for color image encryption
Mohammed M. Al-Mhadawi, Ekhlas Abbas Albahrani, Sadeq H. Lafta
Microprocessors and Microsystems (2023) Vol. 101, pp. 104911-104911
Closed Access | Times Cited: 14
Mohammed M. Al-Mhadawi, Ekhlas Abbas Albahrani, Sadeq H. Lafta
Microprocessors and Microsystems (2023) Vol. 101, pp. 104911-104911
Closed Access | Times Cited: 14
An efficient image encryption algorithm using a discrete memory-based logistic map with deep neural network
B. Sakthi Kumar, R. Revathi
Journal of Engineering and Applied Science (2024) Vol. 71, Iss. 1
Open Access | Times Cited: 4
B. Sakthi Kumar, R. Revathi
Journal of Engineering and Applied Science (2024) Vol. 71, Iss. 1
Open Access | Times Cited: 4
Image pixels swapping encryption based on the TetraVex game and a publicly hash-sharing algorithm
Muhammad Hussain, Nadeem Iqbal, Zia Bashir
Cluster Computing (2024) Vol. 27, Iss. 4, pp. 5355-5376
Closed Access | Times Cited: 3
Muhammad Hussain, Nadeem Iqbal, Zia Bashir
Cluster Computing (2024) Vol. 27, Iss. 4, pp. 5355-5376
Closed Access | Times Cited: 3
A novel image encryption scheme based on ccnn
Xiangzi Zhang, Lina Sun, Xicong Geng, et al.
Physica Scripta (2024) Vol. 99, Iss. 2, pp. 025253-025253
Open Access | Times Cited: 2
Xiangzi Zhang, Lina Sun, Xicong Geng, et al.
Physica Scripta (2024) Vol. 99, Iss. 2, pp. 025253-025253
Open Access | Times Cited: 2
Optimized quantum computing technique to encrypt medical images
Monireh Houshmand, Mahsa Khorrampanah, Ali Hamid Muosa Alkhudhari
Optical and Quantum Electronics (2024) Vol. 56, Iss. 3
Closed Access | Times Cited: 2
Monireh Houshmand, Mahsa Khorrampanah, Ali Hamid Muosa Alkhudhari
Optical and Quantum Electronics (2024) Vol. 56, Iss. 3
Closed Access | Times Cited: 2
A Review of Genome to Chaos: Exploring DNA Dynamics in Security
S. Aashiq Banu, L. Koteswara Rao, P. Shanmuga Priya, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 2
S. Aashiq Banu, L. Koteswara Rao, P. Shanmuga Priya, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 2
Efficient Resource Utilization in IoT and Cloud Computing
Vivek Kumar Prasad, Debabrata Dansana, Madhuri Bhavsar, et al.
Information (2023) Vol. 14, Iss. 11, pp. 619-619
Open Access | Times Cited: 7
Vivek Kumar Prasad, Debabrata Dansana, Madhuri Bhavsar, et al.
Information (2023) Vol. 14, Iss. 11, pp. 619-619
Open Access | Times Cited: 7
A multiple-image encryption algorithm based on orthogonal arrays with strength 3
Ming Xu
Optics & Laser Technology (2023) Vol. 167, pp. 109746-109746
Closed Access | Times Cited: 4
Ming Xu
Optics & Laser Technology (2023) Vol. 167, pp. 109746-109746
Closed Access | Times Cited: 4
Cross-Domain Applications of MLOps: From Healthcare to Finance
Prachi Tembhekar, Jesu Narkarunai Arasu Malaiyappan, Lavanya Shanmugam
Journal of Knowledge Learning and Science Technology ISSN 2959-6386 (online) (2023) Vol. 2, Iss. 3, pp. 581-598
Open Access | Times Cited: 4
Prachi Tembhekar, Jesu Narkarunai Arasu Malaiyappan, Lavanya Shanmugam
Journal of Knowledge Learning and Science Technology ISSN 2959-6386 (online) (2023) Vol. 2, Iss. 3, pp. 581-598
Open Access | Times Cited: 4
Graph Crypto-Stego System for Securing Graph Data Using Association Schemes
Anuradha Sabharwal, Pooja Yadav, Kamal Kumar
Journal of Applied Mathematics (2024) Vol. 2024, Iss. 1
Open Access | Times Cited: 1
Anuradha Sabharwal, Pooja Yadav, Kamal Kumar
Journal of Applied Mathematics (2024) Vol. 2024, Iss. 1
Open Access | Times Cited: 1
Development of scalable coding of encrypted images using Modified Absolute Moment Block Truncation Code
Jeya Bright Pankiraj, Vishnuvarthanan Govindaraj, Yudong Zhang, et al.
Signal Image and Video Processing (2024) Vol. 18, Iss. 5, pp. 3973-3981
Closed Access | Times Cited: 1
Jeya Bright Pankiraj, Vishnuvarthanan Govindaraj, Yudong Zhang, et al.
Signal Image and Video Processing (2024) Vol. 18, Iss. 5, pp. 3973-3981
Closed Access | Times Cited: 1
Security Challenges of Vehicular Cloud Computing
Jaydeep Thakker
Deleted Journal (2024) Vol. 2, Iss. 1, pp. 197-206
Open Access | Times Cited: 1
Jaydeep Thakker
Deleted Journal (2024) Vol. 2, Iss. 1, pp. 197-206
Open Access | Times Cited: 1
Sparse Compression-Based Image Encryption using Data Encryption Standards RC5
Arghya Pathak, Hrishikesh Mondal, Jayashree Karmakar, et al.
IETE Technical Review (2023) Vol. 41, Iss. 3, pp. 353-365
Closed Access | Times Cited: 3
Arghya Pathak, Hrishikesh Mondal, Jayashree Karmakar, et al.
IETE Technical Review (2023) Vol. 41, Iss. 3, pp. 353-365
Closed Access | Times Cited: 3
Role of GenAI in Automated Code Generation within DevOps Practices: Explore how Generative AI
Prachi Tembhekar, Munivel Devan, Jawaharbabu Jeyaraman
Journal of Knowledge Learning and Science Technology ISSN 2959-6386 (online) (2023) Vol. 2, Iss. 2, pp. 500-512
Open Access | Times Cited: 3
Prachi Tembhekar, Munivel Devan, Jawaharbabu Jeyaraman
Journal of Knowledge Learning and Science Technology ISSN 2959-6386 (online) (2023) Vol. 2, Iss. 2, pp. 500-512
Open Access | Times Cited: 3
Implementation of Chaos-Based Image Encryption on FPGA
C. Lakshmi, Yasvanthira D Sri, R. Subashini, et al.
(2023), pp. 1-4
Closed Access | Times Cited: 2
C. Lakshmi, Yasvanthira D Sri, R. Subashini, et al.
(2023), pp. 1-4
Closed Access | Times Cited: 2