
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Survey on Privacy Properties for Data Publishing of Relational Data
Athanasios Zigomitros, Fran Casino, Agustí Solanas, et al.
IEEE Access (2020) Vol. 8, pp. 51071-51099
Open Access | Times Cited: 53
Athanasios Zigomitros, Fran Casino, Agustí Solanas, et al.
IEEE Access (2020) Vol. 8, pp. 51071-51099
Open Access | Times Cited: 53
Showing 1-25 of 53 citing articles:
Anonymization Techniques for Privacy Preserving Data Publishing: A Comprehensive Survey
Abdul Majeed, Sungchang Lee
IEEE Access (2020) Vol. 9, pp. 8512-8545
Open Access | Times Cited: 181
Abdul Majeed, Sungchang Lee
IEEE Access (2020) Vol. 9, pp. 8512-8545
Open Access | Times Cited: 181
Research Trends, Challenges, and Emerging Topics in Digital Forensics: A Review of Reviews
Fran Casino, Thomas K. Dasaklis, Γεώργιος Σπαθούλας, et al.
IEEE Access (2022) Vol. 10, pp. 25464-25493
Open Access | Times Cited: 89
Fran Casino, Thomas K. Dasaklis, Γεώργιος Σπαθούλας, et al.
IEEE Access (2022) Vol. 10, pp. 25464-25493
Open Access | Times Cited: 89
Heap Bucketization Anonymity—An Efficient Privacy-Preserving Data Publishing Model for Multiple Sensitive Attributes
J. Jayapradha, M. Prakash, Youseef Alotaibi, et al.
IEEE Access (2022) Vol. 10, pp. 28773-28791
Open Access | Times Cited: 48
J. Jayapradha, M. Prakash, Youseef Alotaibi, et al.
IEEE Access (2022) Vol. 10, pp. 28773-28791
Open Access | Times Cited: 48
Anonymization: The imperfect science of using data while preserving privacy
Andrea Gadotti, Luc Rocher, Florimond Houssiau, et al.
Science Advances (2024) Vol. 10, Iss. 29
Open Access | Times Cited: 11
Andrea Gadotti, Luc Rocher, Florimond Houssiau, et al.
Science Advances (2024) Vol. 10, Iss. 29
Open Access | Times Cited: 11
A decision-support framework for data anonymization with application to machine learning processes
Loredana Caruccio, Domenico Desiato, Giuseppe Polese, et al.
Information Sciences (2022) Vol. 613, pp. 1-32
Open Access | Times Cited: 30
Loredana Caruccio, Domenico Desiato, Giuseppe Polese, et al.
Information Sciences (2022) Vol. 613, pp. 1-32
Open Access | Times Cited: 30
Data Anonymization for Pervasive Health Care: Systematic Literature Mapping Study
Zheming Zuo, Matthew Watson, David Budgen, et al.
JMIR Medical Informatics (2021) Vol. 9, Iss. 10, pp. e29871-e29871
Open Access | Times Cited: 37
Zheming Zuo, Matthew Watson, David Budgen, et al.
JMIR Medical Informatics (2021) Vol. 9, Iss. 10, pp. e29871-e29871
Open Access | Times Cited: 37
Privacy Preserving Data Mining Framework for Negative Association Rules: An Application to Healthcare Informatics
Saad M. Darwish, Reham M. Essa, Mohamed A. Osman, et al.
IEEE Access (2022) Vol. 10, pp. 76268-76280
Open Access | Times Cited: 28
Saad M. Darwish, Reham M. Essa, Mohamed A. Osman, et al.
IEEE Access (2022) Vol. 10, pp. 76268-76280
Open Access | Times Cited: 28
Privacy Preserving Attribute-Focused Anonymization Scheme for Healthcare Data Publishing
J. Andrew, J. Karthikeyan, Jennifer Eunice, et al.
IEEE Access (2022) Vol. 10, pp. 86979-86997
Open Access | Times Cited: 24
J. Andrew, J. Karthikeyan, Jennifer Eunice, et al.
IEEE Access (2022) Vol. 10, pp. 86979-86997
Open Access | Times Cited: 24
Man vs the machine in the struggle for effective text anonymisation in the age of large language models
Constantinos Patsakis, Nikolaos Lykousas
Scientific Reports (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 16
Constantinos Patsakis, Nikolaos Lykousas
Scientific Reports (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 16
Survey on Privacy-Preserving Techniques for Microdata Publication
Tânia Carvalho, Nuno Moniz, Pedro Faria, et al.
ACM Computing Surveys (2023) Vol. 55, Iss. 14s, pp. 1-42
Open Access | Times Cited: 14
Tânia Carvalho, Nuno Moniz, Pedro Faria, et al.
ACM Computing Surveys (2023) Vol. 55, Iss. 14s, pp. 1-42
Open Access | Times Cited: 14
Mastering data privacy: leveraging K-anonymity for robust health data sharing
Stylianos Karagiannis, Christoforos Ntantogian, Emmanouil Magkos, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 2189-2201
Open Access | Times Cited: 5
Stylianos Karagiannis, Christoforos Ntantogian, Emmanouil Magkos, et al.
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 2189-2201
Open Access | Times Cited: 5
A Comprehensive Analysis of Privacy Protection Techniques Developed for COVID-19 Pandemic
Abdul Majeed, Seong Oun Hwang
IEEE Access (2021) Vol. 9, pp. 164159-164187
Open Access | Times Cited: 26
Abdul Majeed, Seong Oun Hwang
IEEE Access (2021) Vol. 9, pp. 164159-164187
Open Access | Times Cited: 26
A distributed computing model for big data anonymization in the networks
Farough Ashkouti, Keyhan Khamforoosh
PLoS ONE (2023) Vol. 18, Iss. 4, pp. e0285212-e0285212
Open Access | Times Cited: 10
Farough Ashkouti, Keyhan Khamforoosh
PLoS ONE (2023) Vol. 18, Iss. 4, pp. e0285212-e0285212
Open Access | Times Cited: 10
DI-Mondrian: Distributed improved Mondrian for satisfaction of the L-diversity privacy model using Apache Spark
Farough Ashkouti, Keyhan Khamforoosh, Amir Sheikhahmadi
Information Sciences (2020) Vol. 546, pp. 1-24
Closed Access | Times Cited: 27
Farough Ashkouti, Keyhan Khamforoosh, Amir Sheikhahmadi
Information Sciences (2020) Vol. 546, pp. 1-24
Closed Access | Times Cited: 27
Federated transfer learning for intrusion detection system in industrial iot 4.0
N Malathy, Shree Harish Kumar G, Ram D. Sriram, et al.
Multimedia Tools and Applications (2024) Vol. 83, Iss. 19, pp. 57913-57941
Closed Access | Times Cited: 3
N Malathy, Shree Harish Kumar G, Ram D. Sriram, et al.
Multimedia Tools and Applications (2024) Vol. 83, Iss. 19, pp. 57913-57941
Closed Access | Times Cited: 3
Beyond the sandbox: Leveraging symbolic execution for evasive malware classification
Vasilis Vouvoutsis, Fran Casino, Constantinos Patsakis
Computers & Security (2024) Vol. 149, pp. 104193-104193
Open Access | Times Cited: 2
Vasilis Vouvoutsis, Fran Casino, Constantinos Patsakis
Computers & Security (2024) Vol. 149, pp. 104193-104193
Open Access | Times Cited: 2
Preserving Patients’ Privacy in Medical IoT Using Blockchain
Bandar Alamri, Ibrahim Tariq Javed, Tiziana Margaria
Lecture notes in computer science (2020), pp. 103-110
Closed Access | Times Cited: 18
Bandar Alamri, Ibrahim Tariq Javed, Tiziana Margaria
Lecture notes in computer science (2020), pp. 103-110
Closed Access | Times Cited: 18
On the effectiveness of binary emulation in malware classification
Vasilis Vouvoutsis, Fran Casino, Constantinos Patsakis
Journal of Information Security and Applications (2022) Vol. 68, pp. 103258-103258
Open Access | Times Cited: 10
Vasilis Vouvoutsis, Fran Casino, Constantinos Patsakis
Journal of Information Security and Applications (2022) Vol. 68, pp. 103258-103258
Open Access | Times Cited: 10
BLIND: A privacy preserving truth discovery system for mobile crowdsensing
Vincenzo Agate, Pierluca Ferraro, Giuseppe Lo Re, et al.
Journal of Network and Computer Applications (2023) Vol. 223, pp. 103811-103811
Open Access | Times Cited: 5
Vincenzo Agate, Pierluca Ferraro, Giuseppe Lo Re, et al.
Journal of Network and Computer Applications (2023) Vol. 223, pp. 103811-103811
Open Access | Times Cited: 5
Disclosure of Multiple "Patient Characteristics" Format Statistics leaks Quasi-identifier Linkage
Kenta Kitamura, Mhd Irvan, Rie Shigetomi Yamaguchi
(2023), pp. 15-25
Open Access | Times Cited: 4
Kenta Kitamura, Mhd Irvan, Rie Shigetomi Yamaguchi
(2023), pp. 15-25
Open Access | Times Cited: 4
PPaaS: Privacy Preservation as a Service
M.A.P. Chamikara, Péter Bertök, Ibrahim Khalil, et al.
Computer Communications (2021) Vol. 173, pp. 192-205
Open Access | Times Cited: 10
M.A.P. Chamikara, Péter Bertök, Ibrahim Khalil, et al.
Computer Communications (2021) Vol. 173, pp. 192-205
Open Access | Times Cited: 10
DHkmeans-ℓdiversity: distributed hierarchical K-means for satisfaction of the ℓ-diversity privacy model using Apache Spark
Farough Ashkouti, Keyhan Khamforoosh, Amir Sheikhahmadi, et al.
The Journal of Supercomputing (2021) Vol. 78, Iss. 2, pp. 2616-2650
Closed Access | Times Cited: 10
Farough Ashkouti, Keyhan Khamforoosh, Amir Sheikhahmadi, et al.
The Journal of Supercomputing (2021) Vol. 78, Iss. 2, pp. 2616-2650
Closed Access | Times Cited: 10
Algorithm to satisfy l‐diversity by combining dummy records and grouping
Keiichiro Oishi, Yuichi Sei, J. Andrew, et al.
Security and Privacy (2024) Vol. 7, Iss. 3
Open Access | Times Cited: 1
Keiichiro Oishi, Yuichi Sei, J. Andrew, et al.
Security and Privacy (2024) Vol. 7, Iss. 3
Open Access | Times Cited: 1
An Automated Quasi-Identification (QID) for Re-identification
Saida Nafisah Roslan, Isredza Rahmi A. Hamid, Abdulbasit A. Darem, et al.
Lecture notes in networks and systems (2024), pp. 421-431
Closed Access | Times Cited: 1
Saida Nafisah Roslan, Isredza Rahmi A. Hamid, Abdulbasit A. Darem, et al.
Lecture notes in networks and systems (2024), pp. 421-431
Closed Access | Times Cited: 1
Iterative local search for preserving data privacy
Alejandro Arbeláez, Laura Climent
Applied Intelligence (2024) Vol. 55, Iss. 3
Open Access | Times Cited: 1
Alejandro Arbeláez, Laura Climent
Applied Intelligence (2024) Vol. 55, Iss. 3
Open Access | Times Cited: 1