OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A decentralised approach to privacy preserving trajectory mining
Romana Talat, Mohammad S. Obaidat, Muhammad Muzammal, et al.
Future Generation Computer Systems (2019) Vol. 102, pp. 382-392
Closed Access | Times Cited: 57

Showing 1-25 of 57 citing articles:

Trustworthiness in Industrial IoT Systems Based on Artificial Intelligence
Zhihan Lv, Yang Han, Amit Kumar Singh, et al.
IEEE Transactions on Industrial Informatics (2020) Vol. 17, Iss. 2, pp. 1496-1504
Closed Access | Times Cited: 276

Anonymization Techniques for Privacy Preserving Data Publishing: A Comprehensive Survey
Abdul Majeed, Sungchang Lee
IEEE Access (2020) Vol. 9, pp. 8512-8545
Open Access | Times Cited: 178

Geographical POI recommendation for Internet of Things: A federated learning approach using matrix factorization
Jiwei Huang, Ze‐Yu Tong, Zihan Feng
International Journal of Communication Systems (2022)
Closed Access | Times Cited: 75

Artificial Intelligence of Things-assisted two-stream neural network for anomaly detection in surveillance Big Video Data
Waseem Ullah, Amin Ullah, Tanveer Hussain, et al.
Future Generation Computer Systems (2021) Vol. 129, pp. 286-297
Closed Access | Times Cited: 102

Towards Blockchain-Enabled Security Technique for Industrial Internet of Things Based Decentralized Applications
Ali Hassan Sodhro, Sandeep Pirbhulal, Muhammad Muzammal, et al.
Journal of Grid Computing (2020) Vol. 18, Iss. 4, pp. 615-628
Closed Access | Times Cited: 81

Unsupervised hierarchical methodology of maritime traffic pattern extraction for knowledge discovery
Huanhuan Li, Jasmine Siu Lee Lam, Zaili Yang, et al.
Transportation Research Part C Emerging Technologies (2022) Vol. 143, pp. 103856-103856
Open Access | Times Cited: 60

AI-Enabled Framework for Fog Computing Driven E-Healthcare Applications
Ali Hassan Sodhro, Noman Zahid
Sensors (2021) Vol. 21, Iss. 23, pp. 8039-8039
Open Access | Times Cited: 41

Towards Cognitive Authentication for Smart Healthcare Applications
Ali Hassan Sodhro, Charlotte Sennersten, Awais Ahmad
Sensors (2022) Vol. 22, Iss. 6, pp. 2101-2101
Open Access | Times Cited: 30

Efficient Anonymous Batch Authentication Scheme With Conditional Privacy in the Internet of Vehicles (IoV) Applications
Chanchal Maurya, Vijay Kumar Chaurasiya
IEEE Transactions on Intelligent Transportation Systems (2023) Vol. 24, Iss. 9, pp. 9670-9683
Closed Access | Times Cited: 20

Toward ML-Based Energy-Efficient Mechanism for 6G Enabled Industrial Network in Box Systems
Ali Hassan Sodhro, Noman Zahid, Lei Wang, et al.
IEEE Transactions on Industrial Informatics (2020) Vol. 17, Iss. 10, pp. 7185-7192
Closed Access | Times Cited: 42

An Intelligent Privacy Preservation Scheme for EV Charging Infrastructure
Shafkat Islam, Shahriar Badsha, Shamik Sengupta, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 2, pp. 1238-1247
Closed Access | Times Cited: 27

AI-driven adaptive reliable and sustainable approach for internet of things enabled healthcare system
Noman Zahid, Ali Hassan Sodhro, Usman Rauf Kamboh, et al.
Mathematical Biosciences & Engineering (2022) Vol. 19, Iss. 4, pp. 3953-3971
Open Access | Times Cited: 25

Deep learning-based privacy-preserving framework for synthetic trajectory generation
Jong Wook Kim, Beakcheol Jang
Journal of Network and Computer Applications (2022) Vol. 206, pp. 103459-103459
Closed Access | Times Cited: 25

Smart home anomaly-based IDS: Architecture proposal and case study
Agustín Lara, Vicente Mayor, Rafael Estepa, et al.
Internet of Things (2023) Vol. 22, pp. 100773-100773
Open Access | Times Cited: 15

Privacy preserving rare itemset mining
Yijie Gui, Wensheng Gan, Yongdong Wu, et al.
Information Sciences (2024) Vol. 662, pp. 120262-120262
Closed Access | Times Cited: 4

Decentralized Energy Efficient Model for Data Transmission in IoT-based Healthcare System
Ali Hassan Sodhro, Mabrook Al‐Rakhami, Lei Wang, et al.
(2021), pp. 1-5
Closed Access | Times Cited: 26

ATPS: An AI Based Trust-Aware and Privacy-Preserving System for Vehicle Managements in Sustainable VANETs
Ting Li, Shangsheng Xie, Zhiwen Zeng, et al.
IEEE Transactions on Intelligent Transportation Systems (2022) Vol. 23, Iss. 10, pp. 19837-19851
Closed Access | Times Cited: 18

IoT based intelligence for proactive waste management in Quick Service Restaurants
Kerem Aytaç, Ömer Korçak
Journal of Cleaner Production (2020) Vol. 284, pp. 125401-125401
Closed Access | Times Cited: 25

Biserial Miyaguchi–Preneel Blockchain-Based Ruzicka-Indexed Deep Perceptive Learning for Malware Detection in IoMT
Abdullah Shawan Alotaibi
Sensors (2021) Vol. 21, Iss. 21, pp. 7119-7119
Open Access | Times Cited: 20

Artificial neural network and symmetric key cryptography based verification protocol for 5G enabled Internet of Things
Vincent Omollo Nyangaresi, Musheer Ahmad, Ahmed Alkhayyat, et al.
Expert Systems (2022) Vol. 39, Iss. 10
Closed Access | Times Cited: 13

Blockchain-Based Route Selection With Allocation of Radio and Computing Resources for Connected Autonomous Vehicles
Marcel Vološin, Eugen Šlapak, Zdeněk Bečvář, et al.
IEEE Transactions on Intelligent Transportation Systems (2023) Vol. 24, Iss. 7, pp. 7230-7243
Closed Access | Times Cited: 7

A user collaboration privacy protection scheme with threshold scheme and smart contract
Lei Zhang, Desheng Liu, Meina Chen, et al.
Information Sciences (2021) Vol. 560, pp. 183-201
Closed Access | Times Cited: 17

Spatial Data Quality in the Internet of Things: Management, Exploitation, and Prospects
Huan Li, Hua Lu, Christian S. Jensen, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 3, pp. 1-41
Closed Access | Times Cited: 12

Multilevel Fine Fingerprint Authentication Method for Key Operating Equipment Identification in Cyber-Physical Systems
Yang Li, Chenglin Wen, Tao Wen
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 2, pp. 1217-1226
Closed Access | Times Cited: 11

Anonymized noise addition in subspaces for privacy preserved data mining in high dimensional continuous data
Shashidhar Virupaksha, Venkatesulu Dondeti
Peer-to-Peer Networking and Applications (2021) Vol. 14, Iss. 3, pp. 1608-1628
Closed Access | Times Cited: 12

Page 1 - Next Page

Scroll to top