OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

This Sneaky Piggy Went to the Android Ad Market: Misusing Mobile Sensors for Stealthy Data Exfiltration
Michalis Diamantaris, Serafeim Moustakas, Lichao Sun, et al.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2021), pp. 1065-1081
Open Access | Times Cited: 7

Showing 7 citing articles:

KFFPDet: Android malicious application detection system with assisted detection of adversarial samples
Ke Kong, Lühua Wang, Zhaoxin Zhang, et al.
Expert Systems with Applications (2024) Vol. 252, pp. 124095-124095
Closed Access | Times Cited: 2

"Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences
Daniel Olszewski, A. Lu, Carson Stillman, et al.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2023), pp. 3433-3459
Closed Access | Times Cited: 5

Stealthy and Practical Multi-modal Attacks on Mixed Reality Tracking
Yasra Chandio, Noman Bashir, Fatima M. Anwar
(2024), pp. 11-20
Closed Access

RefreshChannels: Exploiting Dynamic Refresh Rate Switching for Mobile Device Attacks
Gaofeng Dong, Jason Wu, Julian de Gortari Briseno, et al.
(2024)
Open Access

Press play, install malware: a study of rhythm game-based malware dropping
Efstratios Vasilellis, Grigoris Gkionis, Dimitris Gritzalis
International Journal of Information Security (2024) Vol. 23, Iss. 5, pp. 3369-3391
Closed Access

Deployment and Detection of Anti-Forensics Shredding Technique in Android Mobile Devices
Fatemah Abozaid, Sharifa Yousif, Shafi’i Muhammad Abdulhamid, et al.
(2023), pp. 150-155
Closed Access

Page 1

Scroll to top