OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Mitigating Jamming Attack in 5G Heterogeneous Networks: A Federated Deep Reinforcement Learning Approach
Himanshu Sharma, Neeraj Kumar, Rajkumar Tekchandani
IEEE Transactions on Vehicular Technology (2022) Vol. 72, Iss. 2, pp. 2439-2452
Closed Access | Times Cited: 32

Showing 1-25 of 32 citing articles:

A Comprehensive Survey: Evaluating the Efficiency of Artificial Intelligence and Machine Learning Techniques on Cyber Security Solutions
Merve Ozkan-Okay, Erdal Akin, Ömer Aslan, et al.
IEEE Access (2024) Vol. 12, pp. 12229-12256
Open Access | Times Cited: 57

Physical Layer Security for Authentication, Confidentiality, and Malicious Node Detection: A Paradigm Shift in Securing IoT Networks
Elmehdi Illi, Marwa Qaraqe, Saud Althunibat, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 26, Iss. 1, pp. 347-388
Open Access | Times Cited: 29

Deep learning based physical layer security for terrestrial communications in 5G and beyond networks: A survey
Himanshu Sharma, Neeraj Kumar
Physical Communication (2023) Vol. 57, pp. 102002-102002
Closed Access | Times Cited: 26

Network Selection over 5G-Advanced Heterogeneous Networks Based on Federated Learning and Cooperative Game Theory
Claudia Carballo González, Ernesto Fontes Pupo, Eneko Iradier, et al.
IEEE Transactions on Vehicular Technology (2024) Vol. 73, Iss. 8, pp. 11862-11877
Closed Access | Times Cited: 9

Computation Rate Maximization for SCMA-Aided Edge Computing in IoT Networks: A Multi-Agent Reinforcement Learning Approach
Pengtao Liu, Kang An, Jing Lei, et al.
IEEE Transactions on Wireless Communications (2024) Vol. 23, Iss. 8, pp. 10414-10429
Closed Access | Times Cited: 9

Network Security Management in Heterogeneous Networks
Tao Zhang, Xiangyun Tang, Jiacheng Wang, et al.
Electronics (2025) Vol. 14, Iss. 3, pp. 568-568
Open Access | Times Cited: 1

From Adaptive Communication Anti‐Jamming to Intelligent Communication Anti‐Jamming: 50 Years of Evolution
Quan Zhou, Yingtao Niu
Advanced Intelligent Systems (2024) Vol. 6, Iss. 8
Closed Access | Times Cited: 5

Machine learning-based spectrum occupancy prediction: a comprehensive survey
Mehmet Ali Aygül, Hakan Ali Çırpan, Hüseyin Arslan
Frontiers in Communications and Networks (2025) Vol. 6
Open Access

Deep Fusion Intelligence: Enhancing 5G Security Against Over-the-Air Attacks
Mohammad Reza Amini, Ghazal Asemian, Burak Kantarcı, et al.
IEEE Transactions on Machine Learning in Communications and Networking (2025) Vol. 3, pp. 263-279
Open Access

From 5G to 6G Networks, a Survey on AI-Based Jamming and Interference Detection and Mitigation
Poonam Lohan, Burak Kantarcı, Mohamed Amine Ferrag, et al.
IEEE Open Journal of the Communications Society (2024) Vol. 5, pp. 3920-3974
Open Access | Times Cited: 3

Radar Anti-Jamming Decision-Making Method Based on DDPG-MADDPG Algorithm
Jingjing Wei, Yinsheng Wei, Lei Yu, et al.
Remote Sensing (2023) Vol. 15, Iss. 16, pp. 4046-4046
Open Access | Times Cited: 8

Fault Diagnosis in the Network Function Virtualization: A Survey, Taxonomy, and Future Directions
Jiahui Li, Xiaogang Qi, Jiliang Li, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 11, pp. 19121-19142
Closed Access | Times Cited: 2

Practical Trial for Low-Energy Effective Jamming on Private Networks With 5G-NR and NB-IoT Radio Interfaces
Paweł Skokowski, Krzysztof Malon, Michał Kryk, et al.
IEEE Access (2024) Vol. 12, pp. 51523-51535
Open Access | Times Cited: 2

Secrecy Rate Maximization in THz-Aided Heterogeneous Networks: A Deep Reinforcement Learning Approach
Himanshu Sharma, Neeraj Kumar, Ishan Budhiraja, et al.
IEEE Transactions on Vehicular Technology (2023) Vol. 72, Iss. 10, pp. 13490-13505
Closed Access | Times Cited: 6

A Privacy-Preserving Collaborative Jamming Attacks Detection Framework Using Federated Learning
Zakaria Abou El Houda, Diala Naboulsi, Georges Kaddoum
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 7, pp. 12153-12164
Closed Access | Times Cited: 6

Opportunistic Wiretapping/Jamming: A New Attack Model in Millimeter-Wave Wireless Networks
Yuanyu Zhang, Zhumeng Zheng, Ji He, et al.
IEEE Transactions on Wireless Communications (2023) Vol. 22, Iss. 12, pp. 9907-9922
Open Access | Times Cited: 5

Against Jamming Attack in Wireless Communication Networks: A Reinforcement Learning Approach
Ma Ding, Yang Wang, Sai Wu
Electronics (2024) Vol. 13, Iss. 7, pp. 1209-1209
Open Access | Times Cited: 1

Cross-domain resources optimization for hybrid edge computing networks: federated DRL approach
Xiaoqin Song, Quan Chen, Shumo Wang, et al.
Digital Communications and Networks (2024)
Open Access | Times Cited: 1

AI-assisted secure data transmission techniques for next-generation HetNets: A review
Himanshu Sharma, Gitika Sharma, Neeraj Kumar
Computer Communications (2023) Vol. 215, pp. 74-90
Closed Access | Times Cited: 2

Clustered jamming in U-V2X communications with 3D antenna beam-width fluctuations
Mohammad Arif, Wooseong Kim
Computer Communications (2024) Vol. 216, pp. 209-228
Closed Access

Spectrum and Power Efficient Anti-Jamming Approach for Cognitive Radio Networks Based on Reinforcement Learning
Hussein Jdeed, Wissam Altabban, Samer Jamal
International Journal of Sensors Wireless Communications and Control (2024) Vol. 14, Iss. 4, pp. 279-328
Closed Access

How does Federated Learning Impact Decision-Making in Firms: A Systematic Literature Review
Shweta Kumari Choudhary, Arpan Kumar Kar, Yogesh K. Dwivedi
Communications of the Association for Information Systems (2024) Vol. 54, Iss. 1, pp. 519-546
Closed Access

Slice admission control in 5G cloud radio access network using deep reinforcement learning: A survey
Mohsen Khani, Shahram Jamali, Mohammad Karim Sohrabi, et al.
International Journal of Communication Systems (2024) Vol. 37, Iss. 13
Closed Access

Risk-Aware Federated Reinforcement Learning-Based Secure IoV Communications
Xiaozhen Lu, Liang Xiao, Yilin Xiao, et al.
IEEE Transactions on Mobile Computing (2024) Vol. 23, Iss. 12, pp. 14656-14671
Closed Access

Page 1 - Next Page

Scroll to top