OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Visualizing Differences to Improve End-User Understanding of Trigger-Action Programs
Valerie Zhao, Lefan Zhang, Bo Wang, et al.
(2020), pp. 1-10
Closed Access | Times Cited: 18

Showing 18 citing articles:

Identifying Security and Privacy Violation Rules in Trigger-Action IoT Platforms With NLP Models
Bernardo Breve, Gaetano Cimino, Vincenzo Deufemia
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 6, pp. 5607-5622
Open Access | Times Cited: 27

A Survey on Conflict Detection in IoT-based Smart Homes
Bing Huang, Dipankar Chaki, Athman Bouguettaya, et al.
ACM Computing Surveys (2023) Vol. 56, Iss. 5, pp. 1-40
Open Access | Times Cited: 6

A Room With an Overview: Toward Meaningful Transparency for the Consumer Internet of Things
Chris Norval, Jatinder Singh
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 5, pp. 7583-7603
Open Access | Times Cited: 4

TapChecker: A Lightweight SMT-Based Conflict Analysis for Trigger-Action Programming
Liangyu Chen, Chen Wang, Cheng Chen, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 12, pp. 21411-21426
Closed Access | Times Cited: 1

Helping Users Debug Trigger-Action Programs
Lefan Zhang, Cyrus Zhou, Michael L. Littman, et al.
Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies (2022) Vol. 6, Iss. 4, pp. 1-32
Open Access | Times Cited: 7

On the User Perception of Security Risks of TAP Rules: A User Study
Bernardo Breve, Gaetano Cimino, Giuseppe Desolda, et al.
Lecture notes in computer science (2023), pp. 162-179
Closed Access | Times Cited: 3

Data Transparency Design in Internet of Things: A Systematic Review
Yonghao Long, Xiapu Luo, Yujie Zhu, et al.
International Journal of Human-Computer Interaction (2023) Vol. 40, Iss. 18, pp. 5003-5025
Closed Access | Times Cited: 3

End-user development of smart home rules using block-based programming: a comparative usability evaluation with programmers and non-programmers
Mateus Carvalho Gonçalves, Otávio Neves Lara, Raphael Winckler de Bettio, et al.
Behaviour and Information Technology (2021) Vol. 40, Iss. 10, pp. 974-996
Closed Access | Times Cited: 7

SCTAP: Supporting Scenario-Centric Trigger-Action Programming based on Software-Defined Physical Environments
Bingkun Sun, Liwei Shen, Xin Peng, et al.
Proceedings of the ACM Web Conference 2022 (2023)
Closed Access | Times Cited: 2

Generating Scenario-Centric TAP Rules for Smart Homes by Mining Historical Event Logs
Liwei Liu, Wei Chen, Tao Wang, et al.
(2023), pp. 21-27
Closed Access | Times Cited: 2

Discovering Physical Interaction Vulnerabilities in IoT Deployments.
Muslum Ozgur Ozmen, Xuansong Li, Andrew Chun-An Chu, et al.
arXiv (Cornell University) (2021)
Closed Access | Times Cited: 5

User-Driven Privacy Factors in Trigger-Action Apps: A Comparative Analysis with General IoT
Piero Romare
IFIP advances in information and communication technology (2024), pp. 244-264
Closed Access

End-User Development for Human-Robot Interaction: Results and Trends in an Emerging Field
Giacomo Vaiani, Fabio Paternò
Proceedings of the ACM on Human-Computer Interaction (2024) Vol. 8, Iss. EICS, pp. 1-40
Open Access

Home Smart Home: Approachable Interfaces for Intelligibility, Modification, and End-User Programming
Michaela Reisinger, Johann Schrammel, Stefan Suette, et al.
Deleted Journal (2020), Iss. 45, pp. 226-245
Open Access | Times Cited: 3

Understanding User Needs in Smart Homes and How to Fulfil Them
Andrea Mattioli, Fabio Paternò
Lecture notes in computer science (2023), pp. 125-142
Closed Access | Times Cited: 1

TAGen: Generating Trigger-Action Rules for Smart Homes by Mining Event Traces
Liwei Liu, Wei Chen, Lu Liu, et al.
Lecture notes in computer science (2021), pp. 652-662
Closed Access | Times Cited: 3

TapChain: A Rule Chain Recognition Model Based on Multiple Features
Keyu Jiang, Hanyi Zhang, Weiting Zhang, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-11
Open Access | Times Cited: 2

iThem: Programming Internet of Things Beyond Trigger-Action Pattern
Marx Boyuan Wang, Daniel Manesh, Ruipu Hu, et al.
(2022), pp. 1-5
Closed Access

Page 1

Scroll to top