OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Image encryption algorithm based on DNA encoding and CNN
Kamlesh Kumar Raghuvanshi, Subodh Kumar, Sushil Kumar, et al.
Expert Systems with Applications (2024) Vol. 252, pp. 124287-124287
Closed Access | Times Cited: 11

Showing 11 citing articles:

Image privacy protection scheme based on high-quality reconstruction DCT compression and nonlinear dynamics
Yiting Lin, Zhiyu Xie, Tingting Chen, et al.
Expert Systems with Applications (2024) Vol. 257, pp. 124891-124891
Closed Access | Times Cited: 27

A multi-image encryption scheme based on block compressive sensing and nonlinear bifurcation diffusion
Long-Long Hu, Mingxuan Chen, Meng-Meng Wang, et al.
Chaos Solitons & Fractals (2024) Vol. 188, pp. 115521-115521
Closed Access | Times Cited: 20

A hidden multiwing memristive neural network and its application in remote sensing data security
Sirui Ding, Hairong Lin, Xiaoheng Deng, et al.
Expert Systems with Applications (2025), pp. 127168-127168
Closed Access

Chaotic encryption algorithm for satellite images based on novel RNA coding
Chaofeng Zhao, X. Q. He, Yanfei Li, et al.
Advances in Space Research (2025)
Closed Access

Lower-Complexity Multi-Layered Security Partitioning Algorithm Based on Chaos Mapping-DWT Transform for WA/SNs
Tarek Srour, Mohsen A. M. El‐Bendary, Mostafa A. R. Eltokhy, et al.
Journal of Sensor and Actuator Networks (2025) Vol. 14, Iss. 2, pp. 36-36
Open Access

Visual image hiding algorithm based on restricted Boltzmann machine and compressed sensing
Guodong Ye, Linhao Qiao, Ming Dai, et al.
Nonlinear Dynamics (2025)
Closed Access

A GA-GAN approach for next-generation cryptographic security with a focus on quantum-resistant cryptography
Purushottam Singh, Prashant Pranav, Sandip Dutta
Deleted Journal (2025) Vol. 28, Iss. 1
Open Access

Deep learning-based image encryption techniques: Fundamentals, current trends, challenges and future directions
Om Prakash Singh, Kedar Nath Singh, Amit Kumar Singh, et al.
Neurocomputing (2024) Vol. 612, pp. 128714-128714
Closed Access | Times Cited: 2

A privacy-preserving license plate encryption scheme based on an improved YOLOv8 image recognition algorithm
Chengye Zou, Yunong Liu, Yongwei Yang, et al.
Signal Processing (2024), pp. 109811-109811
Closed Access | Times Cited: 1

Utilizing the nth root of numbers for novel random data calculus and its applications in network security and image encryption
Nadeem Iqbal, Abdulbasid S. Banga, Nisreen Innab, et al.
Expert Systems with Applications (2024) Vol. 265, pp. 125992-125992
Closed Access | Times Cited: 1

A novel object localization encryption algorithm for wind turbine
Chengye Zou, Yunong Liu, Yongwei Yang, et al.
Nonlinear Dynamics (2024)
Closed Access

Page 1

Scroll to top