OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Exsense: Extract sensitive information from unstructured data
Yongyan Guo, Jiayong Liu, Wenwu Tang, et al.
Computers & Security (2020) Vol. 102, pp. 102156-102156
Closed Access | Times Cited: 27

Showing 1-25 of 27 citing articles:

Artificial intelligence for cybersecurity: Literature review and future research directions
Ramanpreet Kaur, Dušan Gabrijelčič, Tomaž Klobučar
Information Fusion (2023) Vol. 97, pp. 101804-101804
Open Access | Times Cited: 264

Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives
Nan Sun, Ming Ding, Jiaojiao Jiang, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 3, pp. 1748-1774
Open Access | Times Cited: 115

Enhancing Security in Cloud Computing Using Artificial Intelligence ( AI )
Dalmo Stutz, Joaquim T. de Assis, Asif Ali Laghari, et al.
(2024), pp. 179-220
Closed Access | Times Cited: 11

How far are app secrets from being stolen? a case study on android
Lili Wei, Heqing Huang, Shing-Chi Cheung, et al.
Empirical Software Engineering (2025) Vol. 30, Iss. 3
Open Access

G2MBCF: Enhanced Named Entity Recognition for sensitive entities identification
Tian Wen, Kaiming Gu, Shihui Xiao, et al.
Data & Knowledge Engineering (2025), pp. 102444-102444
Closed Access

Privacy BERT-LSTM: a novel NLP algorithm for sensitive information detection in textual documents
Janani Muralitharan, Chandrasekar Arumugam
Neural Computing and Applications (2024) Vol. 36, Iss. 25, pp. 15439-15454
Closed Access | Times Cited: 3

Is Your Model Sensitive? SPEDAC: A New Resource for the Automatic Classification of Sensitive Personal Data
Gaia Gambarelli, Aldo Gangemi, Rocco Tripodi
IEEE Access (2023) Vol. 11, pp. 10864-10880
Open Access | Times Cited: 6

PRIVAFRAME: A Frame-Based Knowledge Graph for Sensitive Personal Data
Gaia Gambarelli, Aldo Gangemi
Big Data and Cognitive Computing (2022) Vol. 6, Iss. 3, pp. 90-90
Open Access | Times Cited: 7

A novel framework for Chinese personal sensitive information detection
Chenglong Ren, Xiao Lan, Xingshu Chen, et al.
Connection Science (2024) Vol. 36, Iss. 1
Open Access | Times Cited: 1

A service-oriented framework for large-scale documents processing and application via 3D models and feature extraction
Qiang Chen, Yinong Chen, Cheng Zhan, et al.
Simulation Modelling Practice and Theory (2024) Vol. 133, pp. 102903-102903
Closed Access | Times Cited: 1

Research on Intelligent Perception Algorithm for Sensitive Information
Lin Huo, Juncong Jiang
Applied Sciences (2023) Vol. 13, Iss. 6, pp. 3383-3383
Open Access | Times Cited: 3

A sentiment analysis approach for travel-related Chinese online review content
Hanyun Li, Wenzao Li, Jiacheng Zhao, et al.
PeerJ Computer Science (2023) Vol. 9, pp. e1538-e1538
Open Access | Times Cited: 3

Can pre-trained Transformers be used in detecting complex sensitive sentences? - A Monsanto case study
Roelien C. Timmer, David Liebowitz, ‪Surya Nepal‬, et al.
(2021), pp. 90-97
Open Access | Times Cited: 6

Spray: Streaming Log Parser for Real-Time Analysis
Feng Zou, Xingshu Chen, Yonggang Luo, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-11
Open Access | Times Cited: 3

Abstract Algebraic Approach to the Formation of Computational Environments for Solving Problems in Object Formulations
Vladimir V. Suvorov
Lecture notes in networks and systems (2024), pp. 35-42
Closed Access

Classifying the content of online notepad services using active learning
Mhd Wesam Al-Nabki, Eduardo Fidalgo, Enrique Alegre, et al.
Journal of Intelligent Information Systems (2024)
Open Access

Transforming Unstructured Sensitive Information into Structured Knowledge
Braulio C. Blanco Lambruschini, Mats Brorsson
(2024), pp. 831-838
Open Access

Sensitive Information Detection Adopting Named Entity Recognition: A Proposed Methodology
Lelio Campanile, Maria Stella de Biase, S. Marrone, et al.
Lecture notes in computer science (2022), pp. 377-388
Closed Access | Times Cited: 1

Utilizing Lexicon-enhanced Approach to Sensitive Information Identification
Lihua Cai, Yujue Zhou, Yulong Ding, et al.
2022 27th International Conference on Automation and Computing (ICAC) (2022), pp. 1-6
Closed Access | Times Cited: 1

Detecting Sensitive Information from Unstructured Text in a Data-Constrained Environment
Saurabh Anand, Manish Shukla, Sachin Lodha
(2023), pp. 159-164
Closed Access

Mapping Exploit Code on Paste Sites to the MITRE ATT&CK Framework: A Multi-label Transformer Approach
Benjamin Ampel, Tala Vahedi, Sagar Samtani, et al.
(2023), pp. 1-6
Closed Access

Systematizing the State of Knowledge in Detecting Privacy Sensitive Information in Unstructured Texts using Machine Learning
Sascha Löbner, Welderufael B. Tesfay, Vanessa Bracamonte, et al.
(2023), pp. 1-7
Closed Access

An ontology-based method of conceptual modelling for open innovation diffusion
Boris Savelyev, Sergey Pronichkin
AIP conference proceedings (2022) Vol. 2467, pp. 040012-040012
Closed Access

Scoring Scheme to Determine the Sensitive Information Level in Surface Web and Dark Web
Rahul Singh, P. P. Amritha, M. Sethumadhavan
Communications in computer and information science (2022), pp. 157-167
Closed Access

Page 1 - Next Page

Scroll to top