
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Hybrid Approach With GAN and DP for Privacy Preservation of IIoT Data
Yavuz Selim Hindistan, E. Fatih Yetkin
IEEE Access (2023) Vol. 11, pp. 5837-5849
Open Access | Times Cited: 20
Yavuz Selim Hindistan, E. Fatih Yetkin
IEEE Access (2023) Vol. 11, pp. 5837-5849
Open Access | Times Cited: 20
Showing 20 citing articles:
Security and Privacy on Generative Data in AIGC: A Survey
Tao Wang, Yushu Zhang, Shuren Qi, et al.
ACM Computing Surveys (2024) Vol. 57, Iss. 4, pp. 1-34
Open Access | Times Cited: 13
Tao Wang, Yushu Zhang, Shuren Qi, et al.
ACM Computing Surveys (2024) Vol. 57, Iss. 4, pp. 1-34
Open Access | Times Cited: 13
When AI Meets Information Privacy: The Adversarial Role of AI in Data Sharing Scenario
Abdul Majeed, Seong Oun Hwang
IEEE Access (2023) Vol. 11, pp. 76177-76195
Open Access | Times Cited: 18
Abdul Majeed, Seong Oun Hwang
IEEE Access (2023) Vol. 11, pp. 76177-76195
Open Access | Times Cited: 18
Generative Adversarial Network Applications in Industry 4.0: A Review
Chafic Abou Akar, Rachelle Abdel Massih, Anthony Yaghi, et al.
International Journal of Computer Vision (2024) Vol. 132, Iss. 6, pp. 2195-2254
Closed Access | Times Cited: 8
Chafic Abou Akar, Rachelle Abdel Massih, Anthony Yaghi, et al.
International Journal of Computer Vision (2024) Vol. 132, Iss. 6, pp. 2195-2254
Closed Access | Times Cited: 8
Attribute-Centric and Synthetic Data Based Privacy Preserving Methods: A Systematic Review
Abdul Majeed
Journal of Cybersecurity and Privacy (2023) Vol. 3, Iss. 3, pp. 638-661
Open Access | Times Cited: 15
Abdul Majeed
Journal of Cybersecurity and Privacy (2023) Vol. 3, Iss. 3, pp. 638-661
Open Access | Times Cited: 15
The Management of IoT-Based Organizational and Industrial Digitalization Using Machine Learning Methods
Aoqi Xu, Mehdi Darbandi, Danial Javaheri, et al.
Sustainability (2023) Vol. 15, Iss. 7, pp. 5932-5932
Open Access | Times Cited: 12
Aoqi Xu, Mehdi Darbandi, Danial Javaheri, et al.
Sustainability (2023) Vol. 15, Iss. 7, pp. 5932-5932
Open Access | Times Cited: 12
Solving Truthfulness-Privacy Trade-off in Mixed Data Outsourcing by Using Data Balancing and Attribute Correlation-Aware Differential Privacy
Abdul Majeed, Seong Oun Hwang
IEEE Access (2025) Vol. 13, pp. 23171-23194
Open Access
Abdul Majeed, Seong Oun Hwang
IEEE Access (2025) Vol. 13, pp. 23171-23194
Open Access
GSTLB: A Secure GPS-Enabled Software-Defined Network Leveraging Transfer Learning and Blockchain for Industrial IoT (IIoT)
BAZEER AHAMED BAGRUDEEN
Research Square (Research Square) (2025)
Closed Access
BAZEER AHAMED BAGRUDEEN
Research Square (Research Square) (2025)
Closed Access
Multi-modal Probabilistic Conditional Generative Adversarial Networks for Electric Vehicles Range Prediction
Prajna Dora, N. Harini
Communications in computer and information science (2025), pp. 234-245
Closed Access
Prajna Dora, N. Harini
Communications in computer and information science (2025), pp. 234-245
Closed Access
A verifiable scheme for differential privacy based on zero-knowledge proofs
J.Y. Wei, Yuling Chen, X. Jessie Yang, et al.
Journal of King Saud University - Computer and Information Sciences (2025) Vol. 37, Iss. 3
Open Access
J.Y. Wei, Yuling Chen, X. Jessie Yang, et al.
Journal of King Saud University - Computer and Information Sciences (2025) Vol. 37, Iss. 3
Open Access
GSTLB-GPS Enabled Secured Software Defined Network using Transfer Learning and BlockChain Technology for Industrial IoT (IIoT)
S. Yazhinian, R. Sofia, D. Haripriya, et al.
Studies in computational intelligence (2025), pp. 51-61
Closed Access
S. Yazhinian, R. Sofia, D. Haripriya, et al.
Studies in computational intelligence (2025), pp. 51-61
Closed Access
AI & The Privacy Paradox: Navigating Synthetic Data Vaults
Nithin Manoj, M A Pavithran, Sivani Binu, et al.
International Journal for Research in Applied Science and Engineering Technology (2024) Vol. 12, Iss. 5, pp. 482-487
Open Access | Times Cited: 1
Nithin Manoj, M A Pavithran, Sivani Binu, et al.
International Journal for Research in Applied Science and Engineering Technology (2024) Vol. 12, Iss. 5, pp. 482-487
Open Access | Times Cited: 1
Privacy-Preserving Synthetic Data Generation Method for IoT-Sensor Network IDS Using CTGAN
Saleh Alabdulwahab, Young-Tak Kim, Yunsik Son
Sensors (2024) Vol. 24, Iss. 22, pp. 7389-7389
Open Access | Times Cited: 1
Saleh Alabdulwahab, Young-Tak Kim, Yunsik Son
Sensors (2024) Vol. 24, Iss. 22, pp. 7389-7389
Open Access | Times Cited: 1
A Comprehensive Survey on Generative AI Solutions in IoT Security
Juan Luis López Delgado, Juan Antonio López Ramos
Electronics (2024) Vol. 13, Iss. 24, pp. 4965-4965
Open Access | Times Cited: 1
Juan Luis López Delgado, Juan Antonio López Ramos
Electronics (2024) Vol. 13, Iss. 24, pp. 4965-4965
Open Access | Times Cited: 1
Privacy Preservation in Federated Learning: its Attacks and Defenses
Jyoti Maurya, Shiva Prakash
(2023), pp. 1042-1047
Closed Access | Times Cited: 3
Jyoti Maurya, Shiva Prakash
(2023), pp. 1042-1047
Closed Access | Times Cited: 3
Design of an efficient dynamic context‐based privacy policy deployment model via dual bioinspired Q learning optimisations
Namrata Jiten Patel, Ashish Jadhav
IET Cyber-Physical Systems Theory & Applications (2024)
Open Access
Namrata Jiten Patel, Ashish Jadhav
IET Cyber-Physical Systems Theory & Applications (2024)
Open Access
KBD-Share: Key Aggregation, Blockchain, and Differential Privacy based Secured Data Sharing for Multi-User Cloud Computing
Et al. Badugu Ranjith Kumar
International Journal on Recent and Innovation Trends in Computing and Communication (2023) Vol. 11, Iss. 10, pp. 1290-1301
Open Access | Times Cited: 1
Et al. Badugu Ranjith Kumar
International Journal on Recent and Innovation Trends in Computing and Communication (2023) Vol. 11, Iss. 10, pp. 1290-1301
Open Access | Times Cited: 1
A data-driven approach for generating load profiles based on InfoGAN and MKDE
Jian Lan, Yanzhen Zhou, Qinglai Guo, et al.
Frontiers in Energy Research (2023) Vol. 11
Open Access | Times Cited: 1
Jian Lan, Yanzhen Zhou, Qinglai Guo, et al.
Frontiers in Energy Research (2023) Vol. 11
Open Access | Times Cited: 1
Privacy Preservation in Federated Learning, its Attacks and Defenses using SMC-GAN
Jyoti Maurya, Shiva Prakash
(2023), pp. 55-60
Closed Access
Jyoti Maurya, Shiva Prakash
(2023), pp. 55-60
Closed Access
A hybrid approach for generative process model with topic modelling towards efficient and dynamic document clustering
Gugulothu Venkanna, K. F. Bharati
International Journal of Advanced Technology and Engineering Exploration (2023) Vol. 10, Iss. 106
Open Access
Gugulothu Venkanna, K. F. Bharati
International Journal of Advanced Technology and Engineering Exploration (2023) Vol. 10, Iss. 106
Open Access
Fs-Tgan: An Enhanced Approach for Internet of Things (Iot) Intrusion Detection System Based on Feature Selection and Tabular Generative Adversarial Network
Mohammed Chemmakha, Abdellah Chehri, Omar Habibi, et al.
(2023)
Closed Access
Mohammed Chemmakha, Abdellah Chehri, Omar Habibi, et al.
(2023)
Closed Access