
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Energy-Efficient Hierarchical Resource Allocation in Uplink–Downlink Decoupled NOMA HetNets
Shaofeng Dong, Jinsong Zhan, Wei Hu, et al.
IEEE Transactions on Network and Service Management (2023) Vol. 20, Iss. 3, pp. 3380-3395
Closed Access | Times Cited: 94
Shaofeng Dong, Jinsong Zhan, Wei Hu, et al.
IEEE Transactions on Network and Service Management (2023) Vol. 20, Iss. 3, pp. 3380-3395
Closed Access | Times Cited: 94
Showing 1-25 of 94 citing articles:
A Novel Approach to Reduce Video Traffic Based on Understanding User Demand and D2D Communication in 5G Networks
Guanjun Wang, Jing Wu, Mohammad Trik
IETE Journal of Research (2023) Vol. 70, Iss. 6, pp. 5649-5665
Closed Access | Times Cited: 55
Guanjun Wang, Jing Wu, Mohammad Trik
IETE Journal of Research (2023) Vol. 70, Iss. 6, pp. 5649-5665
Closed Access | Times Cited: 55
Queue stability and dynamic throughput maximization in multi-agent heterogeneous wireless networks
Ting Yang, Jiabao Sun, Amin Mohajer
Wireless Networks (2024) Vol. 30, Iss. 5, pp. 3229-3255
Closed Access | Times Cited: 38
Ting Yang, Jiabao Sun, Amin Mohajer
Wireless Networks (2024) Vol. 30, Iss. 5, pp. 3229-3255
Closed Access | Times Cited: 38
Joint throughput maximization, interference cancellation, and power efficiency for multi-IRS-empowered UAV communications
LiFen Gu, Amin Mohajer
Signal Image and Video Processing (2024) Vol. 18, Iss. 5, pp. 4029-4043
Closed Access | Times Cited: 38
LiFen Gu, Amin Mohajer
Signal Image and Video Processing (2024) Vol. 18, Iss. 5, pp. 4029-4043
Closed Access | Times Cited: 38
Load-aware continuous-time optimization for multi-agent systems: toward dynamic resource allocation and real-time adaptability
Qianxing Wang, Wei Li, Amin Mohajer
Computer Networks (2024) Vol. 250, pp. 110526-110526
Closed Access | Times Cited: 38
Qianxing Wang, Wei Li, Amin Mohajer
Computer Networks (2024) Vol. 250, pp. 110526-110526
Closed Access | Times Cited: 38
Interval-valued intuitionistic fuzzy best-worst method with additive consistency
Jiu-Ying Dong, Shu‐Ping Wan
Expert Systems with Applications (2023) Vol. 236, pp. 121213-121213
Closed Access | Times Cited: 33
Jiu-Ying Dong, Shu‐Ping Wan
Expert Systems with Applications (2023) Vol. 236, pp. 121213-121213
Closed Access | Times Cited: 33
Multi-source weighted source-free domain transfer method for rotating machinery fault diagnosis
Qinhe Gao, Tong Huang, Ke Zhao, et al.
Expert Systems with Applications (2023) Vol. 237, pp. 121585-121585
Closed Access | Times Cited: 32
Qinhe Gao, Tong Huang, Ke Zhao, et al.
Expert Systems with Applications (2023) Vol. 237, pp. 121585-121585
Closed Access | Times Cited: 32
GAP: A novel Generative context-Aware Prompt-tuning method for relation extraction
Zhenbin Chen, Zhixin Li, Yufei Zeng, et al.
Expert Systems with Applications (2024) Vol. 248, pp. 123478-123478
Closed Access | Times Cited: 13
Zhenbin Chen, Zhixin Li, Yufei Zeng, et al.
Expert Systems with Applications (2024) Vol. 248, pp. 123478-123478
Closed Access | Times Cited: 13
Next-power: Next-generation framework for secure and sustainable energy trading in the metaverse
Zakaria Abou El Houda, Bouziane Brik
Ad Hoc Networks (2023) Vol. 149, pp. 103243-103243
Open Access | Times Cited: 18
Zakaria Abou El Houda, Bouziane Brik
Ad Hoc Networks (2023) Vol. 149, pp. 103243-103243
Open Access | Times Cited: 18
Content caching in mobile edge computing: a survey
Yasar Khan, Saad Mustafa, Raja Wasim Ahmad, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 8817-8864
Closed Access | Times Cited: 7
Yasar Khan, Saad Mustafa, Raja Wasim Ahmad, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 8817-8864
Closed Access | Times Cited: 7
On Joint Impact of HPA Non-Linearity and Imperfect SIC in NOMA Enabled HCN Using Stochastic Geometry
Amit Baghel, Abhinav Singh Parihar, Vimal Bhatia, et al.
IEEE Transactions on Vehicular Technology (2024) Vol. 73, Iss. 6, pp. 8055-8068
Closed Access | Times Cited: 6
Amit Baghel, Abhinav Singh Parihar, Vimal Bhatia, et al.
IEEE Transactions on Vehicular Technology (2024) Vol. 73, Iss. 6, pp. 8055-8068
Closed Access | Times Cited: 6
A machine vision approach with temporal fusion strategy for concrete vibration quality monitoring
Tan Li, Hong Wang, Dongxu Pan, et al.
Applied Soft Computing (2024) Vol. 160, pp. 111684-111684
Closed Access | Times Cited: 6
Tan Li, Hong Wang, Dongxu Pan, et al.
Applied Soft Computing (2024) Vol. 160, pp. 111684-111684
Closed Access | Times Cited: 6
Multi-strategy enhanced grey wolf algorithm for obstacle-aware WSNs coverage optimization
Zhendong Wang, Lili Huang, Shuxin Yang, et al.
Ad Hoc Networks (2023) Vol. 152, pp. 103308-103308
Closed Access | Times Cited: 16
Zhendong Wang, Lili Huang, Shuxin Yang, et al.
Ad Hoc Networks (2023) Vol. 152, pp. 103308-103308
Closed Access | Times Cited: 16
SEACDSC: secure and energy-aware clustering based on discrete sand cat swarm optimization for IoT-enabled WSN applications
Walid Osamy, Ahmed M. Khedr, Ahmed El-Sawy, et al.
Wireless Networks (2024) Vol. 30, Iss. 4, pp. 2781-2800
Closed Access | Times Cited: 5
Walid Osamy, Ahmed M. Khedr, Ahmed El-Sawy, et al.
Wireless Networks (2024) Vol. 30, Iss. 4, pp. 2781-2800
Closed Access | Times Cited: 5
Constellation design for PD-NOMA-based mmWave inter-satellite communication
Saurabh Srivastava, Prajna Parimita Dash, Deepak Kumar Rout, et al.
Computers & Electrical Engineering (2024) Vol. 116, pp. 109187-109187
Closed Access | Times Cited: 5
Saurabh Srivastava, Prajna Parimita Dash, Deepak Kumar Rout, et al.
Computers & Electrical Engineering (2024) Vol. 116, pp. 109187-109187
Closed Access | Times Cited: 5
DIWGAN Optimized with Namib Beetle Optimization Algorithm for Intrusion Detection in Mobile Ad Hoc Networks
Bala Krishnasamy, Latha Muthaiah, Johny Elma Kamali Pushparaj, et al.
IETE Journal of Research (2023) Vol. 70, Iss. 5, pp. 4422-4441
Closed Access | Times Cited: 11
Bala Krishnasamy, Latha Muthaiah, Johny Elma Kamali Pushparaj, et al.
IETE Journal of Research (2023) Vol. 70, Iss. 5, pp. 4422-4441
Closed Access | Times Cited: 11
Full duplex reconfigurable intelligent surfaces system relying on NOMA and wireless power transfer
Minh‐Sang Van Nguyen, Dinh‐Thuan Do, Phu Tran Tin, et al.
Wireless Networks (2024) Vol. 30, Iss. 4, pp. 2127-2142
Closed Access | Times Cited: 4
Minh‐Sang Van Nguyen, Dinh‐Thuan Do, Phu Tran Tin, et al.
Wireless Networks (2024) Vol. 30, Iss. 4, pp. 2127-2142
Closed Access | Times Cited: 4
Optimized Duplicate Address Detection for the Prevention of Denial-of-Service Attacks in IPv6 Network
Pragya, Bijendra Kumar, Gyanendra Kumar
IETE Journal of Research (2024) Vol. 70, Iss. 9, pp. 7231-7256
Closed Access | Times Cited: 4
Pragya, Bijendra Kumar, Gyanendra Kumar
IETE Journal of Research (2024) Vol. 70, Iss. 9, pp. 7231-7256
Closed Access | Times Cited: 4
Multi-rate multicasting aided NOMA for addressing the multiuser diversity in beyond 5G
Ernesto Fontes Pupo, Claudia Carballo González, Eneko Iradier, et al.
Computer Networks (2025), pp. 111041-111041
Closed Access
Ernesto Fontes Pupo, Claudia Carballo González, Eneko Iradier, et al.
Computer Networks (2025), pp. 111041-111041
Closed Access
Deep Learning in Industrial Machinery: A Critical Review of Bearing Fault Classification Methods
Attiq Ur Rehman, Weidong Jiao, Yonghua Jiang, et al.
Applied Soft Computing (2025), pp. 112785-112785
Closed Access
Attiq Ur Rehman, Weidong Jiao, Yonghua Jiang, et al.
Applied Soft Computing (2025), pp. 112785-112785
Closed Access
Multicast Scaling in Heterogeneous Wireless Sensor Networks for Security and Time Efficiency
Ramdas Vankdothu, Mohd Abdul Hameed, Husnah Fatima, et al.
Wireless Personal Communications (2025)
Open Access
Ramdas Vankdothu, Mohd Abdul Hameed, Husnah Fatima, et al.
Wireless Personal Communications (2025)
Open Access
A routing algorithm for wireless mesh network based on information entropy theory
Dana Turlykozhayeva, Sayat Akhtanov, Z. Zh. Zhanabaev, et al.
IET Communications (2025) Vol. 19, Iss. 1
Open Access
Dana Turlykozhayeva, Sayat Akhtanov, Z. Zh. Zhanabaev, et al.
IET Communications (2025) Vol. 19, Iss. 1
Open Access
Reinforcement learning based routing in delay tolerant networks
Parisa Rezaei, Nahideh Derakhshanfard
Wireless Networks (2025)
Closed Access
Parisa Rezaei, Nahideh Derakhshanfard
Wireless Networks (2025)
Closed Access
Link adaptation and multi-objective resource optimization in intelligent wireless networks using power-domain non-orthogonal multiple access
Qitao Tang, Maryam Bavaghar
Ain Shams Engineering Journal (2025) Vol. 16, Iss. 4, pp. 103331-103331
Open Access
Qitao Tang, Maryam Bavaghar
Ain Shams Engineering Journal (2025) Vol. 16, Iss. 4, pp. 103331-103331
Open Access
FFBP Neural Network Optimized with Woodpecker Mating Algorithm for Dynamic Cluster-based Secure Routing in WSN
A. Saravanaselvan, P. Balasubramanian
IETE Journal of Research (2024) Vol. 70, Iss. 7, pp. 6515-6524
Closed Access | Times Cited: 3
A. Saravanaselvan, P. Balasubramanian
IETE Journal of Research (2024) Vol. 70, Iss. 7, pp. 6515-6524
Closed Access | Times Cited: 3
Enhancing trustworthiness among iot network nodes with ensemble deep learning-based cyber attack detection
D. Malathi, S. Razool Begum
Expert Systems with Applications (2024) Vol. 255, pp. 124528-124528
Closed Access | Times Cited: 3
D. Malathi, S. Razool Begum
Expert Systems with Applications (2024) Vol. 255, pp. 124528-124528
Closed Access | Times Cited: 3