OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Novel Dominant Color Subband Image Encryption in Visual Sensor Network for Smart Military Surveillance System
R. Nithya, D. Dhanasekaran
Traitement du signal (2022) Vol. 39, Iss. 3, pp. 951-960
Open Access | Times Cited: 9

Showing 9 citing articles:

AntEater: When Arnold’s Cat Meets Langton’s Ant to Encrypt Images
Wassim Alexan, Yousef Korayem, Mohamed Gabr, et al.
IEEE Access (2023) Vol. 11, pp. 106249-106276
Open Access | Times Cited: 32

Enhancing IoT security: A comprehensive exploration of privacy, security measures, and advanced routing solutions
Azmera Chandu Naik, Lalit Kumar Awasthi, Priyanka Rathee, et al.
Computer Networks (2025), pp. 111045-111045
Closed Access | Times Cited: 1

Hybrid Chaotic Zebra Optimization Algorithm and Long Short-Term Memory for Cyber Threats Detection
Reham Amin, Ghada Eltaweel, Ahmed F. Ali, et al.
IEEE Access (2024) Vol. 12, pp. 93235-93260
Open Access | Times Cited: 5

Holographic encryption algorithm based on DNA coding and bit-plane decomposition
Zheng Liang, Li Chen, Kai Chen, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 2

RAINBOW: Resilient Asymmetric Imaging Non-linear Bit-level Ordering with Hyperchaotic Operation for Color image Encryption
Wenhui Zhang
Transactions on Computer Science and Intelligent Systems Research (2024) Vol. 4, pp. 136-148
Open Access

Baker’s Map Based Chaotic Image Encryption in Military Surveillance Systems
Nithya Paranthaman Rajendiran
Lecture notes in networks and systems (2024), pp. 107-115
Closed Access

Localization Scheme Using Single Anchor Node for Mobile Wireless Sensor Nodes in WSNs
Sanjeev Kumar, Manjeet Singh
Arabian Journal for Science and Engineering (2024)
Closed Access

A new image encryption method using Bezier curve
Sujit Kumar Das, Bibhas Chandra Dhara
Multimedia Tools and Applications (2023) Vol. 82, Iss. 30, pp. 46961-47002
Closed Access

Sensible Image Encryption for Military Applications Based on Advanced Encryption Standard Algorithm (AES)
B. Bazeer Ahamed, Murugan Krishnamoorthy
Research Square (Research Square) (2023)
Open Access

Page 1

Scroll to top