
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Applications of Differential Privacy in Social Network Analysis: A Survey
Honglu Jiang, Jian Pei, Dongxiao Yu, et al.
IEEE Transactions on Knowledge and Data Engineering (2021), pp. 1-1
Open Access | Times Cited: 92
Honglu Jiang, Jian Pei, Dongxiao Yu, et al.
IEEE Transactions on Knowledge and Data Engineering (2021), pp. 1-1
Open Access | Times Cited: 92
Showing 1-25 of 92 citing articles:
A Survey on Differential Privacy for Unstructured Data Content
Ying Zhao, Jinjun Chen
ACM Computing Surveys (2022) Vol. 54, Iss. 10s, pp. 1-28
Closed Access | Times Cited: 190
Ying Zhao, Jinjun Chen
ACM Computing Surveys (2022) Vol. 54, Iss. 10s, pp. 1-28
Closed Access | Times Cited: 190
Bounded and Unbiased Composite Differential Privacy
Kai Zhang, Yanjun Zhang, Ruoxi Sun, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2024) Vol. 30, pp. 972-990
Closed Access | Times Cited: 23
Kai Zhang, Yanjun Zhang, Ruoxi Sun, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2024) Vol. 30, pp. 972-990
Closed Access | Times Cited: 23
SPDL: A Blockchain-Enabled Secure and Privacy-Preserving Decentralized Learning System
Minghui Xu, Zongrui Zou, Ye Cheng, et al.
IEEE Transactions on Computers (2022) Vol. 72, Iss. 2, pp. 548-558
Closed Access | Times Cited: 53
Minghui Xu, Zongrui Zou, Ye Cheng, et al.
IEEE Transactions on Computers (2022) Vol. 72, Iss. 2, pp. 548-558
Closed Access | Times Cited: 53
Differential privacy in edge computing-based smart city Applications:Security issues, solutions and future directions
Aiting Yao, Gang Li, Xuejun Li, et al.
Array (2023) Vol. 19, pp. 100293-100293
Open Access | Times Cited: 23
Aiting Yao, Gang Li, Xuejun Li, et al.
Array (2023) Vol. 19, pp. 100293-100293
Open Access | Times Cited: 23
Federated learning-empowered smart manufacturing and product lifecycle management: A review
Jiewu Leng, Richard Li, Junxing Xie, et al.
Advanced Engineering Informatics (2025) Vol. 65, pp. 103179-103179
Closed Access | Times Cited: 1
Jiewu Leng, Richard Li, Junxing Xie, et al.
Advanced Engineering Informatics (2025) Vol. 65, pp. 103179-103179
Closed Access | Times Cited: 1
Differential Privacy for IoT-Enabled Critical Infrastructure: A Comprehensive Survey
Muhammad Akbar Husnoo, Adnan Anwar, Ripon K. Chakrabortty, et al.
IEEE Access (2021) Vol. 9, pp. 153276-153304
Open Access | Times Cited: 43
Muhammad Akbar Husnoo, Adnan Anwar, Ripon K. Chakrabortty, et al.
IEEE Access (2021) Vol. 9, pp. 153276-153304
Open Access | Times Cited: 43
Anonymous and Efficient Authentication Scheme for Privacy-Preserving Distributed Learning
Yili Jiang, Kuan Zhang, Yi Qian, et al.
IEEE Transactions on Information Forensics and Security (2022) Vol. 17, pp. 2227-2240
Closed Access | Times Cited: 30
Yili Jiang, Kuan Zhang, Yi Qian, et al.
IEEE Transactions on Information Forensics and Security (2022) Vol. 17, pp. 2227-2240
Closed Access | Times Cited: 30
Incomplete Graph Learning via Attribute-Structure Decoupled Variational Auto-Encoder
Xinke Jiang, Zidi Qin, Jiarong Xu, et al.
(2024)
Open Access | Times Cited: 7
Xinke Jiang, Zidi Qin, Jiarong Xu, et al.
(2024)
Open Access | Times Cited: 7
Joint User Association and Resource Pricing for Metaverse: Distributed and Centralized Approaches
Xumin Huang, Weifeng Zhong, Jiangtian Nie, et al.
2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems (MASS) (2022)
Open Access | Times Cited: 23
Xumin Huang, Weifeng Zhong, Jiangtian Nie, et al.
2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems (MASS) (2022)
Open Access | Times Cited: 23
Invertible mask network for face privacy preservation
Yang Yang, Yiyang Huang, Ming Shi, et al.
Information Sciences (2023) Vol. 629, pp. 566-579
Closed Access | Times Cited: 16
Yang Yang, Yiyang Huang, Ming Shi, et al.
Information Sciences (2023) Vol. 629, pp. 566-579
Closed Access | Times Cited: 16
A survey on security analysis of machine learning-oriented hardware and software intellectual property
Ashraful Tauhid, Lei Xu, Md. Mostafizur Rahman, et al.
High-Confidence Computing (2023) Vol. 3, Iss. 2, pp. 100114-100114
Open Access | Times Cited: 11
Ashraful Tauhid, Lei Xu, Md. Mostafizur Rahman, et al.
High-Confidence Computing (2023) Vol. 3, Iss. 2, pp. 100114-100114
Open Access | Times Cited: 11
LH-IDS: Lightweight Hybrid Intrusion Detection System Based on Differential Privacy in VANETs
Jie Cui, Jietian Xiao, Hong Zhong, et al.
IEEE Transactions on Mobile Computing (2024) Vol. 23, Iss. 12, pp. 12195-12210
Closed Access | Times Cited: 4
Jie Cui, Jietian Xiao, Hong Zhong, et al.
IEEE Transactions on Mobile Computing (2024) Vol. 23, Iss. 12, pp. 12195-12210
Closed Access | Times Cited: 4
LSTEG: An Evolutionary Game Model Leveraging Deep Reinforcement Learning for Privacy Behavior Analysis on Social Networks
Yu Wu, Li Pan
Information Sciences (2024) Vol. 676, pp. 120842-120842
Closed Access | Times Cited: 4
Yu Wu, Li Pan
Information Sciences (2024) Vol. 676, pp. 120842-120842
Closed Access | Times Cited: 4
Who is the antecedent? Mapping the relation from mental health to mobile phone addiction using cross-lagged panel network analysis
Xiantong Yang, Yujia Yang, Dan Qin, et al.
Current Psychology (2025)
Closed Access
Xiantong Yang, Yujia Yang, Dan Qin, et al.
Current Psychology (2025)
Closed Access
CropsDisNet: An AI-Based Platform for Disease Detection and Advancing On-Farm Privacy Solutions
Mohammad Badhruddouza Khan, Salwa Tamkin, Jinat Ara, et al.
Data (2025) Vol. 10, Iss. 2, pp. 25-25
Open Access
Mohammad Badhruddouza Khan, Salwa Tamkin, Jinat Ara, et al.
Data (2025) Vol. 10, Iss. 2, pp. 25-25
Open Access
GenRAN: GenFusion-guided Reversible Anonymization Network for face privacy preserving
Ruilin Wang, Lingchen Gu, Jing Li, et al.
Information Fusion (2025), pp. 103120-103120
Closed Access
Ruilin Wang, Lingchen Gu, Jing Li, et al.
Information Fusion (2025), pp. 103120-103120
Closed Access
Achieving Personalized Privacy-Preserving Graph Neural Network via Topology Awareness
Dian Lei, Zijun Song, Yanli Yuan, et al.
(2025), pp. 3552-3560
Closed Access
Dian Lei, Zijun Song, Yanli Yuan, et al.
(2025), pp. 3552-3560
Closed Access
Clustering Coefficient Estimating of Distributed Graph Data Based on Shuffled Differential Privacy
Hongfa Ding, Peiwang Fu, Heling Jiang, et al.
Lecture notes in computer science (2025), pp. 403-423
Closed Access
Hongfa Ding, Peiwang Fu, Heling Jiang, et al.
Lecture notes in computer science (2025), pp. 403-423
Closed Access
FMEA risk assessment method based on large-scale group decision-making in social networks: considering quantum interference and multiple identities
Mei Cai, S. S. Sun
Kybernetes (2025)
Closed Access
Mei Cai, S. S. Sun
Kybernetes (2025)
Closed Access
Privacy-Preserving Collaborative Learning: A Scheme Providing Heterogeneous Protection
Xin Wang, Heng Zhang, Ming Yang, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 2, pp. 1840-1853
Closed Access | Times Cited: 10
Xin Wang, Heng Zhang, Ming Yang, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 2, pp. 1840-1853
Closed Access | Times Cited: 10
Scenario-based Adaptations of Differential Privacy: A Technical Survey
Ying Zhao, Jia Tina Du, Jinjun Chen
ACM Computing Surveys (2024) Vol. 56, Iss. 8, pp. 1-39
Closed Access | Times Cited: 3
Ying Zhao, Jia Tina Du, Jinjun Chen
ACM Computing Surveys (2024) Vol. 56, Iss. 8, pp. 1-39
Closed Access | Times Cited: 3
Privacy-Preserving Bilateral Multi-receiver Matching with Revocability for Mobile Social Networks
Axin Wu, Dengguo Feng, Min Zhang, et al.
IEEE Transactions on Mobile Computing (2024) Vol. 23, Iss. 12, pp. 11080-11090
Closed Access | Times Cited: 3
Axin Wu, Dengguo Feng, Min Zhang, et al.
IEEE Transactions on Mobile Computing (2024) Vol. 23, Iss. 12, pp. 11080-11090
Closed Access | Times Cited: 3
A combined approach of evolutionary game and system dynamics for user privacy protection in human intelligence interaction
Lan Yao, Qiyang Zhang, Shuai Deng
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Lan Yao, Qiyang Zhang, Shuai Deng
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
A Socially Optimal Data Marketplace With Differentially Private Federated Learning
Peng Sun, Guocheng Liao, Xu Chen, et al.
IEEE/ACM Transactions on Networking (2024) Vol. 32, Iss. 3, pp. 2221-2236
Closed Access | Times Cited: 3
Peng Sun, Guocheng Liao, Xu Chen, et al.
IEEE/ACM Transactions on Networking (2024) Vol. 32, Iss. 3, pp. 2221-2236
Closed Access | Times Cited: 3
Game-theoretic analytics for privacy preservation in Internet of Things networks: A survey
Yizhou Shen, Carlton Shepherd, Chuadhry Mujeeb Ahmed, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 133, pp. 108449-108449
Closed Access | Times Cited: 3
Yizhou Shen, Carlton Shepherd, Chuadhry Mujeeb Ahmed, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 133, pp. 108449-108449
Closed Access | Times Cited: 3