
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Securing IoT With Deep Federated Learning: A Trust-Based Malicious Node Identification Approach
Kamran Ahmad Awan, Ikram Ud Din, Mahdi Zareei, et al.
IEEE Access (2023) Vol. 11, pp. 58901-58914
Open Access | Times Cited: 9
Kamran Ahmad Awan, Ikram Ud Din, Mahdi Zareei, et al.
IEEE Access (2023) Vol. 11, pp. 58901-58914
Open Access | Times Cited: 9
Showing 9 citing articles:
Performance Evaluation of Predicting IoT Malicious Nodes Using Machine Learning Classification Algorithms
Poorana Senthikumar S, Wilfred Blessing N. R., Rajesh Kanna Rajendran, et al.
International Journal of Computational and Experimental Science and Engineering (2024) Vol. 10, Iss. 3
Open Access | Times Cited: 18
Poorana Senthikumar S, Wilfred Blessing N. R., Rajesh Kanna Rajendran, et al.
International Journal of Computational and Experimental Science and Engineering (2024) Vol. 10, Iss. 3
Open Access | Times Cited: 18
Advancements in securing federated learning with IDS: a comprehensive review of neural networks and feature engineering techniques for malicious client detection
Naila Latif, Wenping Ma, Hafiz Bilal Ahmad
Artificial Intelligence Review (2025) Vol. 58, Iss. 3
Open Access | Times Cited: 1
Naila Latif, Wenping Ma, Hafiz Bilal Ahmad
Artificial Intelligence Review (2025) Vol. 58, Iss. 3
Open Access | Times Cited: 1
Enhancing IoT Security Through Hierarchical Message-Passing Graph Neural Networks: A Trust-Driven Strategy for Identifying Malicious Nodes
C. Senthil Kumar, R. Vijay Anand
Communications in computer and information science (2025), pp. 273-285
Closed Access
C. Senthil Kumar, R. Vijay Anand
Communications in computer and information science (2025), pp. 273-285
Closed Access
A new approach on self-adaptive trust management for social Internet of Things
Elham Moeinaddini, Eslam Nazemi, Amin Shahraki
Computer Networks (2025), pp. 111187-111187
Closed Access
Elham Moeinaddini, Eslam Nazemi, Amin Shahraki
Computer Networks (2025), pp. 111187-111187
Closed Access
Evaluation and Classification of Kidney Stone Detection Using Deep Learning Techniques
Muhammad Nadeem, Guozhen Tan, Muhammad Altaf, et al.
(2023), pp. 01-06
Closed Access | Times Cited: 2
Muhammad Nadeem, Guozhen Tan, Muhammad Altaf, et al.
(2023), pp. 01-06
Closed Access | Times Cited: 2
Lightweight Cryptography Based Secured Data Transmission Model for Quality of Service in Internet of Things-A Comparative Analysis
Srilakshmi Puli, N. Srinivasu
International Journal of Safety and Security Engineering (2024) Vol. 14, Iss. 4, pp. 1279-1291
Open Access
Srilakshmi Puli, N. Srinivasu
International Journal of Safety and Security Engineering (2024) Vol. 14, Iss. 4, pp. 1279-1291
Open Access
PETIT: PUF-enabled trust evaluation framework for IoT networks
Suhee Sanjana Mehjabin, Mohamed Younis, Ali Tekeoglu, et al.
Computer Networks (2024) Vol. 254, pp. 110772-110772
Closed Access
Suhee Sanjana Mehjabin, Mohamed Younis, Ali Tekeoglu, et al.
Computer Networks (2024) Vol. 254, pp. 110772-110772
Closed Access
Defenses Against Artificial Intelligence Attacks
Michail Tsikerdekis, Sherali Zeadally, Iyad Katib
Computer (2024) Vol. 57, Iss. 11, pp. 49-59
Closed Access
Michail Tsikerdekis, Sherali Zeadally, Iyad Katib
Computer (2024) Vol. 57, Iss. 11, pp. 49-59
Closed Access
A Study on Malicious Node Detection in Different Application Domains
B. Jayaram, T. Sethukarasi, C. Jayakumar
(2023), pp. 1-6
Closed Access
B. Jayaram, T. Sethukarasi, C. Jayakumar
(2023), pp. 1-6
Closed Access