OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Heap Bucketization Anonymity—An Efficient Privacy-Preserving Data Publishing Model for Multiple Sensitive Attributes
J. Jayapradha, M. Prakash, Youseef Alotaibi, et al.
IEEE Access (2022) Vol. 10, pp. 28773-28791
Open Access | Times Cited: 48

Showing 1-25 of 48 citing articles:

A Systematic Survey on Energy-Efficient Techniques in Sustainable Cloud Computing
Salil Bharany, Sandeep Sharma, Osamah Ibrahim Khalaf, et al.
Sustainability (2022) Vol. 14, Iss. 10, pp. 6256-6256
Open Access | Times Cited: 124

A New Meta-Heuristics Data Clustering Algorithm Based on Tabu Search and Adaptive Search Memory
Youseef Alotaibi
Symmetry (2022) Vol. 14, Iss. 3, pp. 623-623
Open Access | Times Cited: 63

Chaotic Search-and-Rescue-Optimization-Based Multi-Hop Data Transmission Protocol for Underwater Wireless Sensor Networks
Durairaj Anuradha, S. Neelakandan, Osamah Ibrahim Khalaf, et al.
Sensors (2022) Vol. 22, Iss. 8, pp. 2867-2867
Open Access | Times Cited: 63

Multi-Tier Sentiment Analysis of Social Media Text Using Supervised Machine Learning
Hameedur Rahman, Junaid Tariq, Mahrukh Masood, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 74, Iss. 3, pp. 5527-5543
Open Access | Times Cited: 32

Privacy Preserving Attribute-Focused Anonymization Scheme for Healthcare Data Publishing
J. Andrew, J. Karthikeyan, Jennifer Eunice, et al.
IEEE Access (2022) Vol. 10, pp. 86979-86997
Open Access | Times Cited: 24

K-Anonymity Privacy Protection Algorithm for Multi-Dimensional Data against Skewness and Similarity Attacks
Bing Su, Jiaxuan Huang, Kelei Miao, et al.
Sensors (2023) Vol. 23, Iss. 3, pp. 1554-1554
Open Access | Times Cited: 16

Quantifying the Vulnerability of Attributes for Effective Privacy Preservation Using Machine Learning
Abdul Majeed, Seong Oun Hwang
IEEE Access (2023) Vol. 11, pp. 4400-4411
Open Access | Times Cited: 15

A lightweight and robust authentication scheme for the healthcare system using public cloud server
Irshad Ahmed Abbasi, Saeed Ullah Jan, Abdulrahman Saad Alqahtani, et al.
PLoS ONE (2024) Vol. 19, Iss. 1, pp. e0294429-e0294429
Open Access | Times Cited: 5

Cluster-based anonymity model and algorithm for 1:1 dataset with a single sensitive attribute using machine learning technique
J. Jayapradha, Ghaida Muttashar Abdulsahib, Osamah Ibrahim Khalaf, et al.
Egyptian Informatics Journal (2024) Vol. 27, pp. 100485-100485
Open Access | Times Cited: 5

Fault Coverage-Based Test Case Prioritization and Selection Using African Buffalo Optimization
Shweta Singhal, Nishtha Jatana, Ahmad F. Subahi, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 74, Iss. 3, pp. 6755-6774
Open Access | Times Cited: 20

MayGAN: Mayfly Optimization with Generative Adversarial Network-Based Deep Learning Method to Classify Leukemia Form Blood Smear Images
Neenavath Veeraiah, Youseef Alotaibi, Ahmad F. Subahi
Computer Systems Science and Engineering (2023) Vol. 46, Iss. 2, pp. 2039-2058
Open Access | Times Cited: 10

A Novel Deep Learning-Based Cooperative Communication Channel Model for Wireless Underground Sensor Networks
R. Kanthavel, Dhaya Ramakrishnan, Osamah Ibrahim Khalaf, et al.
Sensors (2022) Vol. 22, Iss. 12, pp. 4475-4475
Open Access | Times Cited: 16

Rapid Text Retrieval and Analysis Supporting Latent Dirichlet Allocation Based on Probabilistic Models
S. Gnanavel, Vinodhini Mani, M. Sreekrishna, et al.
Mobile Information Systems (2022) Vol. 2022, pp. 1-12
Open Access | Times Cited: 13

A novel two phase data sensitivity based access control framework for healthcare data
Sayantani Saha, Chandreyee Chowdhury, Sarmistha Neogy
Multimedia Tools and Applications (2023) Vol. 83, Iss. 3, pp. 8867-8892
Closed Access | Times Cited: 7

An Innovative K-Anonymity Privacy-Preserving Algorithm to Improve Data Availability in the Context of Big Data
Linlin Yuan, Tiantian Zhang, Yuling Chen, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 1, pp. 1561-1579
Open Access | Times Cited: 2

A Novel Gradient Boosted Energy Optimization Model (GBEOM) for MANET
Neenavath Veeraiah, Youseef Alotaibi, Saleh Alghamdi, et al.
Computer Systems Science and Engineering (2023) Vol. 46, Iss. 1, pp. 637-657
Open Access | Times Cited: 5

Histogram-Based Decision Support System for Extraction and Classification of Leukemia in Blood Smear Images
Neenavath Veeraiah, Youseef Alotaibi, Ahmad F. Subahi
Computer Systems Science and Engineering (2023) Vol. 46, Iss. 2, pp. 1879-1900
Open Access | Times Cited: 5

Development of Mobile App to Support the Mobility of Visually Impaired People
R. Meenakshi, R. Ponnusamy, Saleh Alghamdi, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 73, Iss. 2, pp. 3473-3495
Open Access | Times Cited: 8

Group Privacy: An Underrated but Worth Studying Research Problem in the Era of Artificial Intelligence and Big Data
Abdul Majeed, Safiullah Khan, Seong Oun Hwang
Electronics (2022) Vol. 11, Iss. 9, pp. 1449-1449
Open Access | Times Cited: 7

Background knowledge attacks in privacy-preserving data publishing models
Nidhi Desai, Manik Lal Das, Payal Chaudhari, et al.
Computers & Security (2022) Vol. 122, pp. 102874-102874
Closed Access | Times Cited: 7

Algorithm to satisfy l‐diversity by combining dummy records and grouping
Keiichiro Oishi, Yuichi Sei, J. Andrew, et al.
Security and Privacy (2024) Vol. 7, Iss. 3
Open Access | Times Cited: 1

Preserving Privacy in Association Rule Mining Using Multi-Threshold Particle Swarm Optimization
Shahad Aljehani, Youseef Alotaibi
(2024)
Closed Access | Times Cited: 1

Privacy Prevention Techniques in Cyber Physical System for Pharmaceutical Care Services
Swati Devliyal, Sachin Sharma, Himanshu Rai Goyal
2020 International Conference on Power, Instrumentation, Control and Computing (PICC) (2023), pp. 1-6
Closed Access | Times Cited: 3

Automatic Clustering of User Behaviour Profiles for Web Recommendation System
S. Sadesh, Osamah Ibrahim Khalaf, Mohammad Shorfuzzaman, et al.
Intelligent Automation & Soft Computing (2022) Vol. 35, Iss. 3, pp. 3365-3384
Open Access | Times Cited: 5

Liver Tumors Segmentation Using 3D SegNet Deep Learning Approach
G. Nallasivan, V. Ramachandran, Roobaea Alroobaea, et al.
Computer Systems Science and Engineering (2022) Vol. 45, Iss. 2, pp. 1655-1677
Open Access | Times Cited: 4

Page 1 - Next Page

Scroll to top