OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A reversible and secure patient information hiding system for IoT driven e-health
Javaid A. Kaw, Nazir A. Loan, Shabir A. Parah, et al.
International Journal of Information Management (2018) Vol. 45, pp. 262-275
Closed Access | Times Cited: 87

Showing 1-25 of 87 citing articles:

A systematic review of IoT in healthcare: Applications, techniques, and trends
Mostafa Haghi Kashani, Mona Madanipour, Mohammad Nikravan, et al.
Journal of Network and Computer Applications (2021) Vol. 192, pp. 103164-103164
Closed Access | Times Cited: 354

Dual watermarking framework for privacy protection and content authentication of multimedia
Nasir N. Hurrah, Shabir A. Parah, Nazir A. Loan, et al.
Future Generation Computer Systems (2018) Vol. 94, pp. 654-673
Closed Access | Times Cited: 166

Smart Society and Artificial Intelligence: Big Data Scheduling and the Global Standard Method Applied to Smart Maintenance
Ruben Foresti, Stefano Rossi, Matteo Magnani, et al.
Engineering (2020) Vol. 6, Iss. 7, pp. 835-846
Open Access | Times Cited: 142

Software-defined wireless sensor networks in smart grids: An overview
Mohammad Abujubbeh, Fadi Al‐Turjman, Murat Fahrioğlu
Sustainable Cities and Society (2019) Vol. 51, pp. 101754-101754
Closed Access | Times Cited: 88

A Survey and Classification of Security and Privacy Research in Smart Healthcare Systems
Abdullah Algarni
IEEE Access (2019) Vol. 7, pp. 101879-101894
Open Access | Times Cited: 87

Digital image steganography and steganalysis: A journey of the past three decades
Aditya Kumar Sahu, Monalisa Sahu
Open Computer Science (2020) Vol. 10, Iss. 1, pp. 296-342
Open Access | Times Cited: 70

An efficient image encryption scheme for healthcare applications
Parsa Sarosh, Shabir A. Parah, G. Mohiuddin Bhat
Multimedia Tools and Applications (2022) Vol. 81, Iss. 5, pp. 7253-7270
Open Access | Times Cited: 51

Advances in medical image watermarking: a state of the art review
Solihah Gull, Shabir A. Parah
Multimedia Tools and Applications (2023) Vol. 83, Iss. 1, pp. 1407-1447
Open Access | Times Cited: 30

Bring Your Own Device (BYOD) as reversed IT adoption: Insights into managers’ coping strategies
Yves Barlette, Annabelle Jaouen, Paméla Baillette
International Journal of Information Management (2020) Vol. 56, pp. 102212-102212
Open Access | Times Cited: 56

Novel embedding secrecy within images utilizing an improved interpolation-based reversible data hiding scheme
Fatuma Saeid Hassan, Adnan Gutub
Journal of King Saud University - Computer and Information Sciences (2020) Vol. 34, Iss. 5, pp. 2017-2030
Open Access | Times Cited: 55

Reversible data hiding exploiting Huffman encoding with dual images for IoMT based healthcare
Solihah Gull, Shabir A. Parah, Khan Muhammad
Computer Communications (2020) Vol. 163, pp. 134-149
Closed Access | Times Cited: 52

Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview
Raniyah Wazirali, Rami Ahmad, Ahmed Al-Amayreh, et al.
Electronics (2021) Vol. 10, Iss. 14, pp. 1744-1744
Open Access | Times Cited: 50

Secret Sharing-based Personal Health Records Management for the Internet of Health Things
Parsa Sarosh, Shabir A. Parah, G. Mohiuddin Bhat, et al.
Sustainable Cities and Society (2021) Vol. 74, pp. 103129-103129
Closed Access | Times Cited: 43

Detecting Version Number Attacks in Low Power and Lossy Networks for Internet of Things Routing: Review and Taxonomy
Nadia A. Alfriehat, Mohammed Anbar, Shankar Karuppayah, et al.
IEEE Access (2024) Vol. 12, pp. 31136-31158
Open Access | Times Cited: 8

Security and Privacy for mHealth and uHealth Systems: A Systematic Mapping Study
Leonardo Horn Iwaya, Aakash Ahmad, Muhammad Ali Babar
IEEE Access (2020) Vol. 8, pp. 150081-150112
Open Access | Times Cited: 48

Use of Blockchain and Internet of Things for Securing Data in Healthcare Systems
Atul Banotra, Jyoti Sharma, Swastik Gupta, et al.
Algorithms for intelligent systems (2021), pp. 255-267
Closed Access | Times Cited: 34

How Do You Sleep? The Impact of Sleep Apps on Generation Z's Well-Being
Élodie Attié, Lars Meyer‐Waarden
Journal of Interactive Marketing (2023) Vol. 58, Iss. 2-3, pp. 222-247
Closed Access | Times Cited: 15

Efficient Security and Privacy of Lossless Secure Communication for Sensor-Based Urban Cities
Rashid Abbasi, Ali Kashif Bashir, Abdul Mateen, et al.
IEEE Sensors Journal (2023) Vol. 24, Iss. 5, pp. 5549-5560
Closed Access | Times Cited: 15

“Context” in healthcare information technology resistance: A systematic review of extant literature and agenda for future research
Mayank Kumar, Jang Bahadur Singh, Rajesh Chandwani, et al.
International Journal of Information Management (2019) Vol. 51, pp. 102044-102044
Closed Access | Times Cited: 40

A Dynamic Three-Bit Image Steganography Algorithm for Medical and e-Healthcare Systems
Ghazanfar Farooq Siddiqui, Muhammad Iqbal, Khalid Saleem, et al.
IEEE Access (2020) Vol. 8, pp. 181893-181903
Open Access | Times Cited: 36

Reversible Data Hiding for Electronic Patient Information Security for Telemedicine Applications
Romany F. Mansour, Shabir A. Parah
Arabian Journal for Science and Engineering (2021) Vol. 46, Iss. 9, pp. 9129-9144
Closed Access | Times Cited: 30

Healthcare analytics: A techno-functional perspective
Sumanta Singha, Himanshu Arha, Arpan Kumar Kar
Technological Forecasting and Social Change (2023) Vol. 197, pp. 122908-122908
Closed Access | Times Cited: 12

A Novel Deep Learning Based Dual Watermarking System for Securing Healthcare Data
Kumari Suniti Singh, Harsh Vikram Singh
Computational Intelligence (2025) Vol. 41, Iss. 1
Closed Access

Bring Your Own Device
Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah, et al.
(2025), pp. 23-76
Closed Access

A novel blind medical image watermarking scheme based on Schur triangulation and chaotic sequence
Abdallah Soualmi, Adel Alti, Lamri Laouamer
Concurrency and Computation Practice and Experience (2021) Vol. 34, Iss. 1
Closed Access | Times Cited: 24

Page 1 - Next Page

Scroll to top