OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Showing 1-25 of 40 citing articles:

Restaurant Recommender System Using User-Based Collaborative Filtering Approach: A Case Study at Bandung Raya Region
Alif Azhar Fakhri, Z. K. A. Baizal, Erwin Budi Setiawan
Journal of Physics Conference Series (2019) Vol. 1192, pp. 012023-012023
Open Access | Times Cited: 39

Multi-objective optimization of industrial membrane SMR to produce syngas for Fischer-Tropsch production using NSGA-II and decision makings
Hamid Reza Shahhosseini, M. Farsi, Saeed Eini
Journal of Natural Gas Science and Engineering (2016) Vol. 32, pp. 222-238
Closed Access | Times Cited: 36

A linear convolution-based cancelable fingerprint biometric authentication system
Wencheng Yang, Song Wang, James Jin Kang, et al.
Computers & Security (2021) Vol. 114, pp. 102583-102583
Closed Access | Times Cited: 24

Robust and Real-Time Traffic Lights Recognition in Complex Urban Environments
Chunxiang Wang, Tao Jin, Ming Yang, et al.
International Journal of Computational Intelligence Systems (2011) Vol. 4, Iss. 6, pp. 1383-1390
Open Access | Times Cited: 39

Smart Village: Solar Based Smart Agriculture with IoT Enabled for Climatic Change and Fertilization of Soil
Uma Maheswari Rajagopalan, H. Azath, P. Sharmila, et al.
(2019), pp. 102-105
Closed Access | Times Cited: 25

A Novel Fast and Secure Approach for Voice Encryption Based on DNA Computing
Hamidreza Kakaei Kate, Jafar Razmara, Ayaz Isazadeh
3D Research (2018) Vol. 9, Iss. 2
Closed Access | Times Cited: 22

Optimal load sharing strategy for a wind/diesel/battery hybrid power system based on imperialist competitive neural network algorithm
Masoud Safari, Mohammad Sarvi
IET Renewable Power Generation (2014) Vol. 8, Iss. 8, pp. 937-946
Open Access | Times Cited: 21

Review of Wireless Personal Communications Radio Propagation Models in High Altitude Mountainous Areas at 2.6 GHz
Huafu Li, Xianguo He, Wenxue He
Wireless Personal Communications (2018) Vol. 101, Iss. 2, pp. 735-753
Closed Access | Times Cited: 18

Semantic aware attack scenarios reconstruction
Sherif Saad, Issa Traoré
Journal of Information Security and Applications (2013) Vol. 18, Iss. 1, pp. 53-67
Closed Access | Times Cited: 15

The Reverse Logistics Maturity Model: How to determine reverse logistics maturity profile? - method proposal
Monika Kosacka - Olejnik, Karolina Werner-Lewandowska
Procedia Manufacturing (2018) Vol. 17, pp. 1112-1119
Open Access | Times Cited: 15

Phased Scheduling for Resource-Constrained Mobile Devices in Mobile Cloud Computing
Chunlin Li, Li Layuan
Wireless Personal Communications (2014) Vol. 77, Iss. 4, pp. 2817-2837
Closed Access | Times Cited: 14

Multi-objective evolutionary design of selective triple modular redundancy systems against SEUs
Rui Yao, Qinqin Chen, LI Zeng-wu, et al.
Chinese Journal of Aeronautics (2015) Vol. 28, Iss. 3, pp. 804-813
Open Access | Times Cited: 13

A Constraint Programming model for food processing industry: a case for an ice cream processing facility
Ezra Wari, Weihang Zhu
International Journal of Production Research (2019) Vol. 57, Iss. 21, pp. 6648-6664
Closed Access | Times Cited: 12

An Energy-Efficient Balancing Scheme in Wireless Sensor Networks
Hye-Young Kim, Jinsul Kim
Wireless Personal Communications (2015) Vol. 94, Iss. 1, pp. 17-29
Closed Access | Times Cited: 11

A Tutorial and Performance Analysis on ENVI Tools for SAR Image Despeckling
Mohammad R. Khosravi, Babak Bahri-Aliabadi, Seyed Reza Salari, et al.
Current Signal Transduction Therapy (2018) Vol. 15, Iss. 2, pp. 215-222
Closed Access | Times Cited: 11

A Comprehensive Attack Flow Model and Security Analysis for Wi-Fi and WPA3
Christopher P. Kohlios, Thaier Hayajneh
(2018)
Open Access | Times Cited: 11

A Software Trustworthiness Measure Based on the Decompositions of Trustworthy Attributes and Its Validation
Hongwei Tao, Yixiang Chen, Jianmin Pang
Lecture notes in electrical engineering (2015), pp. 981-990
Closed Access | Times Cited: 9

How Coaching is used and Understood by Project Managers in Organizations
Shirley Thompson, Elaine Cox
Project Management Journal (2017) Vol. 48, Iss. 5, pp. 64-77
Open Access | Times Cited: 8

Improvement of Detection for Warning Students in E-learning Using Web Cameras
Keníchi Takahashi, Masahiro Ueno
Procedia Computer Science (2014) Vol. 35, pp. 747-756
Open Access | Times Cited: 7

A Comparative Analysis of Green ICT Maturity Models
David Lautenschutz, Sergio España, Albert Hankel, et al.
EPiC series in computing (2018) Vol. 52, pp. 153-137
Open Access | Times Cited: 7

Chaotic trigonometric Haar wavelet with focus on image encryption
Sodeif Ahadpour, Yaser Sadra
Journal of Discrete Mathematical Sciences and Cryptography (2017) Vol. 20, Iss. 5, pp. 1217-1239
Open Access | Times Cited: 7

Packet Routing Based on Integral Normalized Criterion
Michal Greguš, Oleh Liskevych, Kvitoslava Obelovska, et al.
(2019), pp. 393-396
Closed Access | Times Cited: 4

Test Case Design using Black Box Testing Techniques for Data Mart
Payal Pahwa, Renu Miglani
International Journal of Computer Applications (2015) Vol. 109, Iss. 3, pp. 18-22
Open Access | Times Cited: 3

Fake News Detection: Traditional vs. Contemporary Machine Learning Approaches
Aditya Binay, Anisha Binay, Jordan Register
Journal of Information & Knowledge Management (2024) Vol. 23, Iss. 05
Closed Access

Exploring Social Engineering Attacks Using Spear Phishing in a Universtiy
Trust Tshepo Mapoka, Keneilwe Zuva, Gaedupe KUKUMARA, et al.
The Eurasia Proceedings of Science Technology Engineering and Mathematics (2023) Vol. 24, pp. 21-28
Open Access | Times Cited: 1

Page 1 - Next Page

Scroll to top