OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A privacy-protected intelligent crowdsourcing application of IoT based on the reinforcement learning
Yingying Ren, Wei Liu, Anfeng Liu, et al.
Future Generation Computer Systems (2021) Vol. 127, pp. 56-69
Closed Access | Times Cited: 58

Showing 26-50 of 58 citing articles:

Geometric Reinforcement Learning for Robotic Manipulation
Naseem Alhousani, Matteo Saveriano, Ibrahim Sevinc, et al.
IEEE Access (2023) Vol. 11, pp. 111492-111505
Open Access | Times Cited: 6

Autonomous Intersection Management: Optimal Trajectories and Efficient Scheduling
Abdeljalil Abbas‐Turki, Yazan Mualla, Nicolas Gaud, et al.
Sensors (2023) Vol. 23, Iss. 3, pp. 1509-1509
Open Access | Times Cited: 5

Employing Social Participants for Timely Data Collection Using Pub/sub Solutions in Dynamic IoT Systems
Jiayi Yu, Anfeng Liu, Naixue Xiong, et al.
Computer Networks (2022) Vol. 220, pp. 109501-109501
Closed Access | Times Cited: 8

RLTD: A Reinforcement Learning-based Truth Data Discovery scheme for decision support systems under sustainable environments
Tingxuan Liang, Lingyi Chen, Ming‐Feng Huang, et al.
Applied Soft Computing (2023) Vol. 143, pp. 110369-110369
Closed Access | Times Cited: 4

Bilateral Privacy Protection Scheme Based on Adaptive Location Generalization and Grouping Aggregation in Mobile Crowdsourcing
Xuelei Sun, Yingjie Wang, Peiyong Duan, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 10, pp. 17740-17756
Closed Access | Times Cited: 1

Mobile Crowdsourcing Based on 5g and 6g: A Survey
Yingjie Wang, Yingxin Li, Wang Weilong, et al.
(2024)
Closed Access | Times Cited: 1

Blockchain-Based Crowdsourced Deep Reinforcement Learning as a Service
Ahmed Alagha, Hadi Otrok, Shakti Singh, et al.
(2024)
Closed Access | Times Cited: 1

Preface of special issue on Artificial Intelligence: The security & privacy opportunities and challenges for emerging applications
Qin Liu, Guojun Wang, Jiankun Hu, et al.
Future Generation Computer Systems (2022) Vol. 133, pp. 169-170
Closed Access | Times Cited: 7

UWPEE: Using UAV and wavelet packet energy entropy to predict traffic-based attacks under limited communication, computing and caching for 6G wireless systems
Zichao Xie, Zeyuan Li, Jinsong Gui, et al.
Future Generation Computer Systems (2022) Vol. 140, pp. 238-252
Closed Access | Times Cited: 7

Theoretical design of decentralized auction framework under mobile crowdsourcing environment
Jianxiong Guo, Xingjian Ding, Tian Wang, et al.
Theoretical Computer Science (2022) Vol. 939, pp. 250-260
Open Access | Times Cited: 6

High-Speed Path Probing Method for Large-Scale Network
Zhihao Luo, Jingju Liu, Guozheng Yang, et al.
Sensors (2022) Vol. 22, Iss. 15, pp. 5650-5650
Open Access | Times Cited: 3

Dimension-aware under spatiotemporal constraints: an efficient privacy-preserving framework with peak density clustering
Jing Zhang, Qihan Huang, Jian-Yu Hu, et al.
The Journal of Supercomputing (2022) Vol. 79, Iss. 4, pp. 4164-4191
Closed Access | Times Cited: 3

IoT-based trusted wireless communication framework by machine learning approach
S. Chakaravarthi, S. Saravanan, M. Jagadeesh, et al.
Measurement Sensors (2024) Vol. 34, pp. 101271-101271
Open Access

Analyzing anonymous activities using Interrupt-aware Anonymous User-System Detection Method (IAU-S-DM) in IoT
Hani Alshahrani, Mohd Anjum, Sana Shahab, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access

Revolutionizing Autonomous Vehicle Intelligence with Cutting-Edge Spatial Crowdsourcing Framework
Ayushi Jain, Vaibhav Saini, Ayush Dodia, et al.
(2024), pp. 120-133
Closed Access

Mobile crowdsourcing based on 5G and 6G: A survey
Yingjie Wang, Yingxin Li, Weilong Wang, et al.
Neurocomputing (2024), pp. 128993-128993
Closed Access

HVVU: A Hash Value Verification joint UAVs scheme for trust data collection in smart cities
Guangrong Yang, An He, Guangwei Wu, et al.
Computer Networks (2024), pp. 111005-111005
Closed Access

Cooperative Localization Techniques for RFID
Yongtao Ma, Chenglong Tian
(2024), pp. 1-33
Closed Access

On Absoluteness and Stationary Condition of WMDS for Range-Based Localization
Chenglong Tian, Yongtao Ma, Xiuyan Liang, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 11, pp. 10066-10079
Closed Access | Times Cited: 1

Status-aware and energy-efficient data aggregation for inter-tidal monitoring systems
Xinyan Zhou, Di He, Yongjie Li, et al.
Ad Hoc Networks (2023) Vol. 146, pp. 103181-103181
Closed Access | Times Cited: 1

Regional coverage balance and efficient worker recruitment for self-organized mobile crowdsourcing
Ruiqing Liu, Yonghong Wang, Xiaofeng Wang
Engineering Applications of Artificial Intelligence (2024) Vol. 142, pp. 109943-109943
Closed Access

Adaptive Task Scheduling Procedure By Using Improvised Q-Learning Technique In Internet Of Things
K Manjunath, K Suresh
2022 International Conference on Computing, Communication, Security and Intelligent Systems (IC3SIS) (2022), pp. 1-6
Closed Access | Times Cited: 2

Integrity Verification of Distributed Nodes in Critical Infrastructures
Silvia Sisinni, Davide Margaria, Ignazio Pedone, et al.
Sensors (2022) Vol. 22, Iss. 18, pp. 6950-6950
Open Access | Times Cited: 2

Scroll to top