OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Generative Steganography Based on Long Readable Text Generation
Yi Cao, Zhili Zhou, Chinmay Chakraborty, et al.
IEEE Transactions on Computational Social Systems (2022) Vol. 11, Iss. 4, pp. 4584-4594
Closed Access | Times Cited: 23

Showing 23 citing articles:

Deep learning for steganalysis of diverse data types: A review of methods, taxonomy, challenges and future directions
Hamza Kheddar, Mustapha Hemis, Yassine Himeur, et al.
Neurocomputing (2024) Vol. 581, pp. 127528-127528
Open Access | Times Cited: 20

Prediction of viscosity of blast furnace slag based on NRBO-DNN model
Zhe Li, Meng Wang, Rui Xu, et al.
Alexandria Engineering Journal (2025) Vol. 119, pp. 124-137
Closed Access | Times Cited: 1

Generative Steganography Based on the Construction of Chinese Chess Record
Yi Cao, Youwei Du, Wentao Ge, et al.
Electronics (2025) Vol. 14, Iss. 3, pp. 451-451
Open Access

Artificial intelligence and its application in clinical microbiology
Assia Mairi, Lamia Hamza, Abdelaziz Touati
Expert Review of Anti-infective Therapy (2025)
Closed Access

KeyEE: Enhancing Low-Resource Generative Event Extraction with Auxiliary Keyword Sub-Prompt
Junwen Duan, Xincheng Liao, Ying An, et al.
Big Data Mining and Analytics (2024) Vol. 7, Iss. 2, pp. 547-560
Open Access | Times Cited: 2

Multi-Agent Deep Learning for the Detection of Multiple Speech Steganography Methods
Congcong Sun, Hui Tian, Peng Tian, et al.
IEEE/ACM Transactions on Audio Speech and Language Processing (2024) Vol. 32, pp. 2957-2972
Closed Access | Times Cited: 2

LKAW: A Robust Watermarking Method Based on Large Kernel Convolution and Adaptive Weight Assignment
Xiaorui Zhang, Rui Jiang, Wei Sun, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 75, Iss. 1, pp. 1-17
Open Access | Times Cited: 6

A novel method for linguistic steganography by English translation using attention mechanism and probability distribution theory
YiQing Lin, Zhonghua Wang
PLoS ONE (2024) Vol. 19, Iss. 1, pp. e0295207-e0295207
Open Access | Times Cited: 2

DNA Steganography: Embedding the Secret Messages Using Glass Stack Method and Detecting Errors Made by Different Attacks
Mahbubun Nahar, A. H. M. Kamal
International Journal of Computers and Applications (2024) Vol. 46, Iss. 7, pp. 508-525
Closed Access | Times Cited: 2

A novel non-equilibrium hyperchaotic system and application on color image steganography with FPGA implementation
Jingyu Sun, Hong Cai, Zi-bo Gao, et al.
Nonlinear Dynamics (2022) Vol. 111, Iss. 4, pp. 3851-3868
Closed Access | Times Cited: 9

Deep Learning for Diverse Data Types Steganalysis: A Review
Hamza Kheddar, Mustapha Hemis, Yassine Himeur, et al.
arXiv (Cornell University) (2023)
Open Access | Times Cited: 4

Application of Machine Learning Algorithm in Predicting Axillary Lymph Node Metastasis from Breast Cancer on Preoperative Chest CT
Soyoung Park, Jong Hee Kim, Yoon Ki, et al.
Diagnostics (2023) Vol. 13, Iss. 18, pp. 2953-2953
Open Access | Times Cited: 2

Defense against adversarial attacks via textual embeddings based on semantic associative field
Jiacheng Huang, Long Chen
Neural Computing and Applications (2023) Vol. 36, Iss. 1, pp. 289-301
Open Access | Times Cited: 2

Neural Linguistic Steganography with Controllable Security
Tianhe Lu, Gongshen Liu, Ru Zhang, et al.
2022 International Joint Conference on Neural Networks (IJCNN) (2023), pp. 1-8
Closed Access | Times Cited: 1

Exploring Frame Difference to Enhance Robustness for Video Steganography on Social Networks
Pingan Fan, Hong Zhang, Xianfeng Zhao
Security and Communication Networks (2023) Vol. 2023, pp. 1-11
Open Access | Times Cited: 1

A Review on Blockchain Based Security in Education
P. Sheela Rani, C Kaveri, M Nivedha, et al.
(2023), pp. 1122-1127
Closed Access | Times Cited: 1

Reversible Image Steganography to Achieve Effective PSNR
Mohammad Gauhar Nayab, Aditya Pratap Singh, Ritik Sharma, et al.
Lecture notes in electrical engineering (2023), pp. 145-156
Closed Access | Times Cited: 1

Generative Steganography via Live Comments on Streaming Video Frames
Yuling Liu, Cuilin Wang, Jie Wang, et al.
IEEE Transactions on Computational Social Systems (2024) Vol. 11, Iss. 3, pp. 4412-4425
Closed Access

Text steganography: enhanced character-level embedding algorithm using font attribute with increased resilience to statistical attacks
Shreya Narasimhan KL, R. Balakrishnan
Multimedia Tools and Applications (2024)
Closed Access

Leveraging Generative Models for Covert Messaging: Challenges and Tradeoffs for "Dead-Drop" Deployments
Luke A. Bauer, James K. Howes, Sam A. Markelon, et al.
(2024)
Closed Access

A Hybrid Cryptography Method using Extended Letters in Arabic and Persian Language
Eric Ke Wang
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 7
Open Access

Preemptive Image Protection against Steganography
Yusheng Guo, Nan Zhong, Zhenxing Qian, et al.
2022 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC) (2023), pp. 1923-1930
Closed Access

Extensible Steganalysis via Continual Learning
Zhili Zhou, Zihao Yin, Ruohan Meng, et al.
Fractal and Fractional (2022) Vol. 6, Iss. 12, pp. 708-708
Open Access

Page 1

Scroll to top