OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

User-centric privacy preserving models for a new era of the Internet of Things
Jorge Eduardo Rivadeneira, Jorge Sá Silva, Ricardo Colomo‐Palacios, et al.
Journal of Network and Computer Applications (2023) Vol. 217, pp. 103695-103695
Open Access | Times Cited: 24

Showing 24 citing articles:

Scrutinizing Security in Industrial Control Systems: An Architectural Vulnerabilities and Communication Network Perspective
Muhammad Muzamil Aslam, Ali Tufail, Rosyzie Anna Awg Haji Mohd Apong, et al.
IEEE Access (2024) Vol. 12, pp. 67537-67573
Open Access | Times Cited: 4

Blockchain-Enabled Federated Reinforcement Learning (B-FRL) Model for Privacy Preservation Service in IoT Systems
Tanweer Alam, Ruchi Gupta, Arif Ullah, et al.
Wireless Personal Communications (2024) Vol. 136, Iss. 4, pp. 2545-2571
Closed Access | Times Cited: 4

Blockchain-based smart parking for digital-twin empowered vehicular sensing networks with privacy protection
Anand Kumar Mishra, Amit Kumar Tyagi, Shrikant Tiwari
Elsevier eBooks (2025), pp. 329-364
Closed Access

Privacy-enhanced federated learning based on IPFS and role-based nodes environment
Hyowon Kim, Gabin Heo, Inshil Doh
Computer Networks (2025), pp. 111200-111200
Closed Access

A Secure Multi‐Model Biometrics Using Deep Learning Model Based‐Optimal Hybrid Pattern by the Heuristic Approach
J Samatha, Madhavi Gudavalli
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 4
Closed Access

Exploring security and privacy enhancement technologies in the Internet of Things: A comprehensive review
Md. Ataullah, Naveen Chauhan
Security and Privacy (2024) Vol. 7, Iss. 6
Closed Access | Times Cited: 3

Distributed privacy preservation for online social network using flexible clustering and whale optimization algorithm
Nilesh Uke, Sharayu Lokhande, Preeti Kale, et al.
Cluster Computing (2024) Vol. 27, Iss. 5, pp. 5995-6012
Closed Access | Times Cited: 2

A unified privacy preserving model with AI at the edge for Human-in-the-Loop Cyber-Physical Systems
Jorge Eduardo Rivadeneira, Guilherme A. Borges, André Rodrigues, et al.
Internet of Things (2023) Vol. 25, pp. 101034-101034
Open Access | Times Cited: 4

Enhancing cloud data security: User-centric approaches and advanced mechanisms
Junaid Aslam, K. M. Kumar
THE SCIENTIFIC TEMPER (2024) Vol. 15, Iss. 01, pp. 1784-1789
Open Access | Times Cited: 1

SafeCoder: A machine-learning-based encoding system to embed safety identification information into QR codes
Hao Su, Jianwei Niu, Xuefeng Liu, et al.
Journal of Network and Computer Applications (2024) Vol. 227, pp. 103874-103874
Closed Access | Times Cited: 1

Securing Networks in the Digital Age: A Review of Intrusion Detection and Prevention Strategies
P.Hari Kishore, Sk.Muzubar Rahiman, P. Mahidhar, et al.
International Journal of Innovative Science and Research Technology (IJISRT) (2024), pp. 2523-2530
Open Access | Times Cited: 1

FHG-PR: a hybridized fuzzy-AHP and game theory model for assessing privacy risk on social media platforms
Olorunjube James Falana, Trust Ojeaga, Hamad Naeem, et al.
Frontiers in Computer Science (2024) Vol. 6
Open Access | Times Cited: 1

Tackling security and privacy challenges in the realm of big data analytics
Janet Ngesa
World Journal of Advanced Research and Reviews (2023) Vol. 21, Iss. 2, pp. 552-576
Open Access | Times Cited: 2

Review of Phishing Attacks’ Effects on AI-Powered IoT Systems
S. D. Mohana, D. Rafiya Nusrath, S. P. Shiva Prakash, et al.
Lecture notes in electrical engineering (2024), pp. 321-332
Closed Access

Comprehensive Swotting on Librem 5
M V Kumudavalli, S Gunav, Vidhya Shankar, et al.
Deleted Journal (2024) Vol. 2, Iss. 04, pp. 571-574
Open Access

Nostalgia Hub Using MERN Stack: User-Centric Design and Privacy Preservation
Anmol Kansal, Neetu Mittal
2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO) (2024), pp. 1-5
Closed Access

Blockchain in the Portuguese Public Electronic Service
José Avelino Victor, Teresa Guarda, Ana Dopico Parada
Lecture notes in networks and systems (2024), pp. 26-44
Closed Access

An Evaluation of Unobtrusive Sensing in a Healthcare Case Study
Jorge Eduardo Rivadeneira, José Marcelo Fernandes, André Rodrigues, et al.
IEEE Access (2024) Vol. 12, pp. 89405-89417
Open Access

Conceptual Framework for Designing Hippocratic APIs
Sarmad Rezayat, Gerrit Burmester, Hui Ma, et al.
Lecture notes in computer science (2024), pp. 355-376
Closed Access

CONFLUENCE: An Integration Model for Human-in-the-Loop IoT Privacy-Preserving Solutions Toward Sustainability in a Smart City
Jorge Eduardo Rivadeneira, Oscar Torres Sánchez, Moisés Dias, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 5, pp. 8690-8714
Closed Access

Enhancing User Privacy in Natural Language Processing (NLP) Systems
Chandan Kumar Behera, D. Lakshmi, Isha Kondurkar
Advances in computational intelligence and robotics book series (2023), pp. 159-185
Closed Access

Page 1

Scroll to top