
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Hybrid Optimization-Based Medical Data Hiding Scheme for Industrial Internet of Things Security
Ashima Anand, Amit Kumar Singh
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 1, pp. 1051-1058
Closed Access | Times Cited: 25
Ashima Anand, Amit Kumar Singh
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 1, pp. 1051-1058
Closed Access | Times Cited: 25
Showing 25 citing articles:
An improved robust algorithm for optimisation-based colour medical image watermarking
Om Prakash Singh, Kedar Nath Singh, Amit Kumar Singh, et al.
Computers & Electrical Engineering (2024) Vol. 117, pp. 109278-109278
Closed Access | Times Cited: 8
Om Prakash Singh, Kedar Nath Singh, Amit Kumar Singh, et al.
Computers & Electrical Engineering (2024) Vol. 117, pp. 109278-109278
Closed Access | Times Cited: 8
CUSE: Copyright protection of UNESCO heritage images for safe cities environment
Divyanshu Awasthi, Priyank Khare, Vinay Kumar Srivastava
Multimedia Tools and Applications (2025)
Closed Access | Times Cited: 1
Divyanshu Awasthi, Priyank Khare, Vinay Kumar Srivastava
Multimedia Tools and Applications (2025)
Closed Access | Times Cited: 1
ANFISmark: ANFIS-based secure watermarking approach for telemedicine applications
Divyanshu Awasthi, Priyank Khare, Vinay Kumar Srivastava
Neural Computing and Applications (2025)
Closed Access | Times Cited: 1
Divyanshu Awasthi, Priyank Khare, Vinay Kumar Srivastava
Neural Computing and Applications (2025)
Closed Access | Times Cited: 1
A differential approach and deep neural network based data privacy-preserving model in cloud environment
Rishabh Gupta, Ishu Gupta, Deepika Saxena, et al.
Journal of Ambient Intelligence and Humanized Computing (2022) Vol. 14, Iss. 5, pp. 4659-4674
Closed Access | Times Cited: 30
Rishabh Gupta, Ishu Gupta, Deepika Saxena, et al.
Journal of Ambient Intelligence and Humanized Computing (2022) Vol. 14, Iss. 5, pp. 4659-4674
Closed Access | Times Cited: 30
GAN-based watermarking for encrypted images in healthcare scenarios
Himanshu Kumar Singh, Naman Baranwal, Kedar Nath Singh, et al.
Neurocomputing (2023) Vol. 560, pp. 126853-126853
Closed Access | Times Cited: 16
Himanshu Kumar Singh, Naman Baranwal, Kedar Nath Singh, et al.
Neurocomputing (2023) Vol. 560, pp. 126853-126853
Closed Access | Times Cited: 16
A comprehensive review on optimization-based image watermarking techniques for copyright protection
Divyanshu Awasthi, Anurag Tiwari, Priyank Khare, et al.
Expert Systems with Applications (2023) Vol. 242, pp. 122830-122830
Closed Access | Times Cited: 15
Divyanshu Awasthi, Anurag Tiwari, Priyank Khare, et al.
Expert Systems with Applications (2023) Vol. 242, pp. 122830-122830
Closed Access | Times Cited: 15
Efficient Robust Reversible Watermarking Based on ZMs and Integer Wavelet Transform
Guangyong Gao, Min Wang, Bin Wu
IEEE Transactions on Industrial Informatics (2023) Vol. 20, Iss. 3, pp. 4115-4123
Closed Access | Times Cited: 12
Guangyong Gao, Min Wang, Bin Wu
IEEE Transactions on Industrial Informatics (2023) Vol. 20, Iss. 3, pp. 4115-4123
Closed Access | Times Cited: 12
DeepENC: Deep Learning-Based ROI Selection for Encryption of Medical Images Through Key Generation With Multimodal Information Fusion
Kedar Nath Singh, Naman Baranwal, Om Prakash Singh, et al.
IEEE Transactions on Consumer Electronics (2024) Vol. 70, Iss. 3, pp. 6149-6156
Closed Access | Times Cited: 4
Kedar Nath Singh, Naman Baranwal, Om Prakash Singh, et al.
IEEE Transactions on Consumer Electronics (2024) Vol. 70, Iss. 3, pp. 6149-6156
Closed Access | Times Cited: 4
Big Data Analytics and IoT Security Optimization Research
Fei Tan, Hongfei Guo
Lecture notes on data engineering and communications technologies (2025), pp. 107-117
Closed Access
Fei Tan, Hongfei Guo
Lecture notes on data engineering and communications technologies (2025), pp. 107-117
Closed Access
A new fast multiple color image encryption algorithm
Wassim Alexan, Khalid M. Hosny, Mohamed Gabr
Cluster Computing (2025) Vol. 28, Iss. 5
Open Access
Wassim Alexan, Khalid M. Hosny, Mohamed Gabr
Cluster Computing (2025) Vol. 28, Iss. 5
Open Access
HIDEmarks: hiding multiple marks for robust medical data sharing using IWT-LSB
Om Prakash Singh, Kedar Nath Singh, Naman Baranwal, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 8, pp. 24919-24937
Closed Access | Times Cited: 10
Om Prakash Singh, Kedar Nath Singh, Naman Baranwal, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 8, pp. 24919-24937
Closed Access | Times Cited: 10
SACNN‐IDS: A self‐attention convolutional neural network for intrusion detection in industrial internet of things
Mimonah Al Qathrady, Safi Ullah, Mohammed S. Alshehri, et al.
CAAI Transactions on Intelligence Technology (2024)
Open Access | Times Cited: 3
Mimonah Al Qathrady, Safi Ullah, Mohammed S. Alshehri, et al.
CAAI Transactions on Intelligence Technology (2024)
Open Access | Times Cited: 3
A Semi-Fragile, Inner-Outer Block-Based Watermarking Method Using Scrambling and Frequency Domain Algorithms
Ahmet ŞENOL, Ersin Elbaşi, Ahmet E. Topcu, et al.
Electronics (2023) Vol. 12, Iss. 4, pp. 1065-1065
Open Access | Times Cited: 7
Ahmet ŞENOL, Ersin Elbaşi, Ahmet E. Topcu, et al.
Electronics (2023) Vol. 12, Iss. 4, pp. 1065-1065
Open Access | Times Cited: 7
Copyright protection of medical images: A view of the state-of-the-art research and current developments
Jullius Kumar, Amit Kumar Singh
Multimedia Tools and Applications (2023) Vol. 82, Iss. 28, pp. 44591-44621
Closed Access | Times Cited: 7
Jullius Kumar, Amit Kumar Singh
Multimedia Tools and Applications (2023) Vol. 82, Iss. 28, pp. 44591-44621
Closed Access | Times Cited: 7
Joint Adaptive Robust Steganography Network
Le Zhang, Yao Lu, T. Li, et al.
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 8, pp. 10156-10166
Closed Access | Times Cited: 2
Le Zhang, Yao Lu, T. Li, et al.
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 8, pp. 10156-10166
Closed Access | Times Cited: 2
A review of big data technology and its application in cancer care
T. D. Xiao, Shanshan Kong, Zichen Zhang, et al.
Computers in Biology and Medicine (2024) Vol. 176, pp. 108577-108577
Closed Access | Times Cited: 2
T. D. Xiao, Shanshan Kong, Zichen Zhang, et al.
Computers in Biology and Medicine (2024) Vol. 176, pp. 108577-108577
Closed Access | Times Cited: 2
FISmark: Heritage Image Copyright Protection with FIS based Optimization
Priyank Khare, Divyanshu Awasthi, Vinay Kumar Srivastava
(2024), pp. 433-438
Closed Access | Times Cited: 1
Priyank Khare, Divyanshu Awasthi, Vinay Kumar Srivastava
(2024), pp. 433-438
Closed Access | Times Cited: 1
Security Performance Prediction Method of Artificial Intelligence of Things Based on Lightweight MS-Net Network
Lingwei Xu, Xinpeng Zhou, Shubo Cao, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 24, pp. 38999-39008
Closed Access | Times Cited: 1
Lingwei Xu, Xinpeng Zhou, Shubo Cao, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 24, pp. 38999-39008
Closed Access | Times Cited: 1
CADW: CGAN-Based Attack on Deep Robust Image Watermarking
Chuan Qin, Shengyan Gao, Xinpeng Zhang, et al.
IEEE Multimedia (2022) Vol. 30, Iss. 1, pp. 28-35
Closed Access | Times Cited: 6
Chuan Qin, Shengyan Gao, Xinpeng Zhang, et al.
IEEE Multimedia (2022) Vol. 30, Iss. 1, pp. 28-35
Closed Access | Times Cited: 6
Hiding Face Into Background: A Proactive Countermeasure Against Malicious Face Swapping
Shen Xiaofeng, Heng Yao, Shunquan Tan, et al.
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 8, pp. 10613-10623
Closed Access
Shen Xiaofeng, Heng Yao, Shunquan Tan, et al.
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 8, pp. 10613-10623
Closed Access
IoT Threat Mitigation: Machine Learning-Assisted Heavy Hitter Detection in P4-Enabled Networks
Mehrdad Hooshangi-Naghani, Negar Rezaei, Mahdi Dolati, et al.
(2024), pp. 1-8
Closed Access
Mehrdad Hooshangi-Naghani, Negar Rezaei, Mahdi Dolati, et al.
(2024), pp. 1-8
Closed Access
Semi‐Blind Watermarking and Blockchain‐Based Approach for Copyright Protection of Medical Images
Gurleen Kaur, Bakul Gupta, Ashima Anand
Security and Privacy (2024)
Open Access
Gurleen Kaur, Bakul Gupta, Ashima Anand
Security and Privacy (2024)
Open Access
High-Capacity Imperceptible Data Hiding Using Permutation-Based Embedding Process for IoT Security
Jui‐Chuan Liu, Ching‐Chun Chang, Chin‐Chen Chang, et al.
Electronics (2023) Vol. 12, Iss. 21, pp. 4488-4488
Open Access | Times Cited: 1
Jui‐Chuan Liu, Ching‐Chun Chang, Chin‐Chen Chang, et al.
Electronics (2023) Vol. 12, Iss. 21, pp. 4488-4488
Open Access | Times Cited: 1
Guest Editorial: Trustworthiness of AI/ML/DL Approaches in Industrial Internet of Things and Applications
Md Zakirul Alam Bhuiyan, Sy‐Yen Kuo, Guojun Wang
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 1, pp. 969-972
Open Access | Times Cited: 2
Md Zakirul Alam Bhuiyan, Sy‐Yen Kuo, Guojun Wang
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 1, pp. 969-972
Open Access | Times Cited: 2
Improved sparse representation fusion rules based infrared and visible image fusion algorithm
Yang Wang, Cao Xiaoqian, Weifeng Liu, et al.
2022 11th International Conference on Control, Automation and Information Sciences (ICCAIS) (2023), pp. 236-241
Closed Access
Yang Wang, Cao Xiaoqian, Weifeng Liu, et al.
2022 11th International Conference on Control, Automation and Information Sciences (ICCAIS) (2023), pp. 236-241
Closed Access