OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Security and Privacy on 6G Network Edge: A Survey
Bomin Mao, Jiajia Liu, Yingying Wu, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 2, pp. 1095-1127
Closed Access | Times Cited: 96

Showing 1-25 of 96 citing articles:

Unleashing the potential of sixth generation (6G) wireless networks in smart energy grid management: A comprehensive review
Mohammed H. Alsharif, Abu Jahid, Raju Kannadasan, et al.
Energy Reports (2024) Vol. 11, pp. 1376-1398
Open Access | Times Cited: 30

Blockchain-Based Federated Learning With Enhanced Privacy and Security Using Homomorphic Encryption and Reputation
Ruizhe Yang, Tonghui Zhao, F. Richard Yu, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 12, pp. 21674-21688
Closed Access | Times Cited: 18

A comprehensive survey: The role of terahertz communication systems in urban infrastructure development
Ali Akbar Firoozi, Ali Asghar Firoozi
Measurement (2025), pp. 117318-117318
Closed Access | Times Cited: 2

Leveraging Network Data Analytics Function and Machine Learning for Data Collection, Resource Optimization, Security and Privacy in 6G Networks
Panagiotis K. Gkonis, Νικόλαος Νομικός, Panagiotis Trakadas, et al.
IEEE Access (2024) Vol. 12, pp. 21320-21336
Open Access | Times Cited: 15

Normal wiggly hesitant fuzzy modelling approach for 6G frameworks based blockchain technology
Sarah Qahtan, Nahia Mourad, Hassan Abdulsattar Ibrahim, et al.
Expert Systems with Applications (2024) Vol. 259, pp. 125304-125304
Closed Access | Times Cited: 11

LLM-Based Edge Intelligence: A Comprehensive Survey on Architectures, Applications, Security and Trustworthiness
Othmane Friha, Mohamed Amine Ferrag, Burak Kantarcı, et al.
IEEE Open Journal of the Communications Society (2024) Vol. 5, pp. 5799-5856
Open Access | Times Cited: 11

The Journey Toward 6G: A Digital and Societal Revolution in the Making
Lina Mohjazi, Bassant Selim, Mallik Tatipamula, et al.
IEEE Internet of Things Magazine (2024) Vol. 7, Iss. 2, pp. 119-128
Open Access | Times Cited: 10

Adversarial Attacks and Defenses in 6G Network-Assisted IoT Systems
Bui Duc Son, Tiến Hoa Nguyễn, Trinh Van Chien, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 11, pp. 19168-19187
Open Access | Times Cited: 9

A Distributed Trustable Framework for AI-Aided Anomaly Detection
Νικόλαος Νομικός, George Xilouris, Gerasimos Patsourakis, et al.
Electronics (2025) Vol. 14, Iss. 3, pp. 410-410
Open Access | Times Cited: 1

Privacy and security vulnerabilities in edge intelligence: An analysis and countermeasures
Ahmed Shafee, Syed Rafay Hasan, Tasneem A. Awaad
Computers & Electrical Engineering (2025) Vol. 123, pp. 110146-110146
Closed Access | Times Cited: 1

Edge Learning for 6G-Enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses
Mohamed Amine Ferrag, Othmane Friha, Burak Kantarcı, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 4, pp. 2654-2713
Open Access | Times Cited: 23

Security of federated learning in 6G era: A review on conceptual techniques and software platforms used for research and analysis
Syed Hussain Ali Kazmi, Faizan Qamar, Rosilah Hassan, et al.
Computer Networks (2024) Vol. 245, pp. 110358-110358
Closed Access | Times Cited: 8

Advanced Deep Learning Models for 6G: Overview, Opportunities and Challenges
Licheng Jiao, Y Shao, Long Sun, et al.
IEEE Access (2024) Vol. 12, pp. 133245-133314
Open Access | Times Cited: 7

On challenges of sixth-generation (6G) wireless networks: A comprehensive survey of requirements, applications, and security issues
Muhammad Sajjad Akbar, Zawar Hussain, Muhammad Ikram, et al.
Journal of Network and Computer Applications (2024) Vol. 233, pp. 104040-104040
Open Access | Times Cited: 7

Trust Management of Tiny Federated Learning in Internet of Unmanned Aerial Vehicles
Jie Zheng, Jipeng Xu, Hongyang Du, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 12, pp. 21046-21060
Open Access | Times Cited: 6

Physical Layer Covert Communication in B5G Wireless Networks—its Research, Applications, and Challenges
Y. Jiang, Liangmin Wang, Hsiao‐Hwa Chen, et al.
Proceedings of the IEEE (2024) Vol. 112, Iss. 1, pp. 47-82
Closed Access | Times Cited: 6

Secure Video Offloading in Multi-UAV-Enabled MEC Networks: A Deep Reinforcement Learning Approach
Tantan Zhao, Fan Li, Lijun He
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 2, pp. 2950-2963
Closed Access | Times Cited: 12

Towards secure and efficient integration of blockchain and 6G networks
Yang Liu, Song Peng, Miaomiao Zhang, et al.
PLoS ONE (2024) Vol. 19, Iss. 4, pp. e0302052-e0302052
Open Access | Times Cited: 4

A systematic literature review of vehicle-to-everything in communication, computation and service scenarios
Shengnan Lv, Yong Qin, Weidong Gan, et al.
International Journal of General Systems (2024) Vol. 53, Iss. 7-8, pp. 1042-1072
Open Access | Times Cited: 4

An Exhaustive Parametric Analysis for Securing SDN Through Traditional, AI/ML, and Blockchain Approaches: A Systematic Review
Muhammad Shahzad, Syed Safdar Ali Rizvi, Talha Ahmed Khan, et al.
˜The œInternational journal of networked and distributed computing (2025) Vol. 13, Iss. 1
Open Access

Server deployment strategies considering robustness and resource constraints in edge computing
Junjie Cao, Zhiyong Yu, Min Cao, et al.
Journal of Cloud Computing Advances Systems and Applications (2025) Vol. 14, Iss. 1
Open Access

Wireless sensor networks for secure smart cities
Behrang Chaboki, Fakhrosadat Fanian, Marjan Kuchaki Rafsanjani
Elsevier eBooks (2025), pp. 407-423
Closed Access

MFTE: Multifactor and Fuzzy Trust Evaluation for Federated Learning in Mobile Edge Computing
Minglong Cheng, Wei Chen, Weidong Fang, et al.
Computer Networks (2025), pp. 111340-111340
Closed Access

A Network Traffic Characteristics Reconstruction Method for Mitigating the Impact of Packet Loss in Edge Computing Scenarios
Jiawei Ye, Yanting Chen, Aierpanjiang Simayi, et al.
Future Internet (2025) Vol. 17, Iss. 5, pp. 208-208
Open Access

Page 1 - Next Page

Scroll to top