
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Exsense: Extract sensitive information from unstructured data
Yongyan Guo, Jiayong Liu, Wenwu Tang, et al.
Computers & Security (2020) Vol. 102, pp. 102156-102156
Closed Access | Times Cited: 27
Yongyan Guo, Jiayong Liu, Wenwu Tang, et al.
Computers & Security (2020) Vol. 102, pp. 102156-102156
Closed Access | Times Cited: 27
Showing 1-25 of 27 citing articles:
Artificial intelligence for cybersecurity: Literature review and future research directions
Ramanpreet Kaur, Dušan Gabrijelčič, Tomaž Klobučar
Information Fusion (2023) Vol. 97, pp. 101804-101804
Open Access | Times Cited: 264
Ramanpreet Kaur, Dušan Gabrijelčič, Tomaž Klobučar
Information Fusion (2023) Vol. 97, pp. 101804-101804
Open Access | Times Cited: 264
Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives
Nan Sun, Ming Ding, Jiaojiao Jiang, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 3, pp. 1748-1774
Open Access | Times Cited: 115
Nan Sun, Ming Ding, Jiaojiao Jiang, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 3, pp. 1748-1774
Open Access | Times Cited: 115
Enhancing Security in Cloud Computing Using Artificial Intelligence ( AI )
Dalmo Stutz, Joaquim T. de Assis, Asif Ali Laghari, et al.
(2024), pp. 179-220
Closed Access | Times Cited: 11
Dalmo Stutz, Joaquim T. de Assis, Asif Ali Laghari, et al.
(2024), pp. 179-220
Closed Access | Times Cited: 11
How far are app secrets from being stolen? a case study on android
Lili Wei, Heqing Huang, Shing-Chi Cheung, et al.
Empirical Software Engineering (2025) Vol. 30, Iss. 3
Open Access
Lili Wei, Heqing Huang, Shing-Chi Cheung, et al.
Empirical Software Engineering (2025) Vol. 30, Iss. 3
Open Access
G2MBCF: Enhanced Named Entity Recognition for sensitive entities identification
Tian Wen, Kaiming Gu, Shihui Xiao, et al.
Data & Knowledge Engineering (2025), pp. 102444-102444
Closed Access
Tian Wen, Kaiming Gu, Shihui Xiao, et al.
Data & Knowledge Engineering (2025), pp. 102444-102444
Closed Access
Privacy BERT-LSTM: a novel NLP algorithm for sensitive information detection in textual documents
Janani Muralitharan, Chandrasekar Arumugam
Neural Computing and Applications (2024) Vol. 36, Iss. 25, pp. 15439-15454
Closed Access | Times Cited: 3
Janani Muralitharan, Chandrasekar Arumugam
Neural Computing and Applications (2024) Vol. 36, Iss. 25, pp. 15439-15454
Closed Access | Times Cited: 3
Is Your Model Sensitive? SPEDAC: A New Resource for the Automatic Classification of Sensitive Personal Data
Gaia Gambarelli, Aldo Gangemi, Rocco Tripodi
IEEE Access (2023) Vol. 11, pp. 10864-10880
Open Access | Times Cited: 6
Gaia Gambarelli, Aldo Gangemi, Rocco Tripodi
IEEE Access (2023) Vol. 11, pp. 10864-10880
Open Access | Times Cited: 6
SDOT: Secure Hash, Semantic Keyword Extraction, and Dynamic Operator Pattern-Based Three-Tier Forensic Classification Framework
Paul Joseph, P. Viswanathan
IEEE Access (2023) Vol. 11, pp. 3291-3306
Open Access | Times Cited: 5
Paul Joseph, P. Viswanathan
IEEE Access (2023) Vol. 11, pp. 3291-3306
Open Access | Times Cited: 5
PRIVAFRAME: A Frame-Based Knowledge Graph for Sensitive Personal Data
Gaia Gambarelli, Aldo Gangemi
Big Data and Cognitive Computing (2022) Vol. 6, Iss. 3, pp. 90-90
Open Access | Times Cited: 7
Gaia Gambarelli, Aldo Gangemi
Big Data and Cognitive Computing (2022) Vol. 6, Iss. 3, pp. 90-90
Open Access | Times Cited: 7
A novel framework for Chinese personal sensitive information detection
Chenglong Ren, Xiao Lan, Xingshu Chen, et al.
Connection Science (2024) Vol. 36, Iss. 1
Open Access | Times Cited: 1
Chenglong Ren, Xiao Lan, Xingshu Chen, et al.
Connection Science (2024) Vol. 36, Iss. 1
Open Access | Times Cited: 1
A service-oriented framework for large-scale documents processing and application via 3D models and feature extraction
Qiang Chen, Yinong Chen, Cheng Zhan, et al.
Simulation Modelling Practice and Theory (2024) Vol. 133, pp. 102903-102903
Closed Access | Times Cited: 1
Qiang Chen, Yinong Chen, Cheng Zhan, et al.
Simulation Modelling Practice and Theory (2024) Vol. 133, pp. 102903-102903
Closed Access | Times Cited: 1
Research on Intelligent Perception Algorithm for Sensitive Information
Lin Huo, Juncong Jiang
Applied Sciences (2023) Vol. 13, Iss. 6, pp. 3383-3383
Open Access | Times Cited: 3
Lin Huo, Juncong Jiang
Applied Sciences (2023) Vol. 13, Iss. 6, pp. 3383-3383
Open Access | Times Cited: 3
A sentiment analysis approach for travel-related Chinese online review content
Hanyun Li, Wenzao Li, Jiacheng Zhao, et al.
PeerJ Computer Science (2023) Vol. 9, pp. e1538-e1538
Open Access | Times Cited: 3
Hanyun Li, Wenzao Li, Jiacheng Zhao, et al.
PeerJ Computer Science (2023) Vol. 9, pp. e1538-e1538
Open Access | Times Cited: 3
Can pre-trained Transformers be used in detecting complex sensitive sentences? - A Monsanto case study
Roelien C. Timmer, David Liebowitz, Surya Nepal, et al.
(2021), pp. 90-97
Open Access | Times Cited: 6
Roelien C. Timmer, David Liebowitz, Surya Nepal, et al.
(2021), pp. 90-97
Open Access | Times Cited: 6
Spray: Streaming Log Parser for Real-Time Analysis
Feng Zou, Xingshu Chen, Yonggang Luo, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-11
Open Access | Times Cited: 3
Feng Zou, Xingshu Chen, Yonggang Luo, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-11
Open Access | Times Cited: 3
Abstract Algebraic Approach to the Formation of Computational Environments for Solving Problems in Object Formulations
Vladimir V. Suvorov
Lecture notes in networks and systems (2024), pp. 35-42
Closed Access
Vladimir V. Suvorov
Lecture notes in networks and systems (2024), pp. 35-42
Closed Access
Classifying the content of online notepad services using active learning
Mhd Wesam Al-Nabki, Eduardo Fidalgo, Enrique Alegre, et al.
Journal of Intelligent Information Systems (2024)
Open Access
Mhd Wesam Al-Nabki, Eduardo Fidalgo, Enrique Alegre, et al.
Journal of Intelligent Information Systems (2024)
Open Access
Transforming Unstructured Sensitive Information into Structured Knowledge
Braulio C. Blanco Lambruschini, Mats Brorsson
(2024), pp. 831-838
Open Access
Braulio C. Blanco Lambruschini, Mats Brorsson
(2024), pp. 831-838
Open Access
Sensitive Information Detection Adopting Named Entity Recognition: A Proposed Methodology
Lelio Campanile, Maria Stella de Biase, S. Marrone, et al.
Lecture notes in computer science (2022), pp. 377-388
Closed Access | Times Cited: 1
Lelio Campanile, Maria Stella de Biase, S. Marrone, et al.
Lecture notes in computer science (2022), pp. 377-388
Closed Access | Times Cited: 1
Utilizing Lexicon-enhanced Approach to Sensitive Information Identification
Lihua Cai, Yujue Zhou, Yulong Ding, et al.
2022 27th International Conference on Automation and Computing (ICAC) (2022), pp. 1-6
Closed Access | Times Cited: 1
Lihua Cai, Yujue Zhou, Yulong Ding, et al.
2022 27th International Conference on Automation and Computing (ICAC) (2022), pp. 1-6
Closed Access | Times Cited: 1
Detecting Sensitive Information from Unstructured Text in a Data-Constrained Environment
Saurabh Anand, Manish Shukla, Sachin Lodha
(2023), pp. 159-164
Closed Access
Saurabh Anand, Manish Shukla, Sachin Lodha
(2023), pp. 159-164
Closed Access
Mapping Exploit Code on Paste Sites to the MITRE ATT&CK Framework: A Multi-label Transformer Approach
Benjamin Ampel, Tala Vahedi, Sagar Samtani, et al.
(2023), pp. 1-6
Closed Access
Benjamin Ampel, Tala Vahedi, Sagar Samtani, et al.
(2023), pp. 1-6
Closed Access
Systematizing the State of Knowledge in Detecting Privacy Sensitive Information in Unstructured Texts using Machine Learning
Sascha Löbner, Welderufael B. Tesfay, Vanessa Bracamonte, et al.
(2023), pp. 1-7
Closed Access
Sascha Löbner, Welderufael B. Tesfay, Vanessa Bracamonte, et al.
(2023), pp. 1-7
Closed Access
An ontology-based method of conceptual modelling for open innovation diffusion
Boris Savelyev, Sergey Pronichkin
AIP conference proceedings (2022) Vol. 2467, pp. 040012-040012
Closed Access
Boris Savelyev, Sergey Pronichkin
AIP conference proceedings (2022) Vol. 2467, pp. 040012-040012
Closed Access
Scoring Scheme to Determine the Sensitive Information Level in Surface Web and Dark Web
Rahul Singh, P. P. Amritha, M. Sethumadhavan
Communications in computer and information science (2022), pp. 157-167
Closed Access
Rahul Singh, P. P. Amritha, M. Sethumadhavan
Communications in computer and information science (2022), pp. 157-167
Closed Access