
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Survey on Differential Privacy for Unstructured Data Content
Ying Zhao, Jinjun Chen
ACM Computing Surveys (2022) Vol. 54, Iss. 10s, pp. 1-28
Closed Access | Times Cited: 190
Ying Zhao, Jinjun Chen
ACM Computing Surveys (2022) Vol. 54, Iss. 10s, pp. 1-28
Closed Access | Times Cited: 190
Showing 1-25 of 190 citing articles:
A Correlation Graph based Approach for Personalized and Compatible Web APIs Recommendation in Mobile APP Development
Lianyong Qi, Wenmin Lin, Xuyun Zhang, et al.
IEEE Transactions on Knowledge and Data Engineering (2022), pp. 1-1
Closed Access | Times Cited: 134
Lianyong Qi, Wenmin Lin, Xuyun Zhang, et al.
IEEE Transactions on Knowledge and Data Engineering (2022), pp. 1-1
Closed Access | Times Cited: 134
A comprehensive review on deep learning algorithms: Security and privacy issues
Muhammad Tayyab, Mohsen Marjani, N. Z. Jhanjhi, et al.
Computers & Security (2023) Vol. 131, pp. 103297-103297
Closed Access | Times Cited: 30
Muhammad Tayyab, Mohsen Marjani, N. Z. Jhanjhi, et al.
Computers & Security (2023) Vol. 131, pp. 103297-103297
Closed Access | Times Cited: 30
Distributed Cooperative Coevolution of Data Publishing Privacy and Transparency
Yong-Feng Ge, Elisa Bertino, Hua Wang, et al.
ACM Transactions on Knowledge Discovery from Data (2023) Vol. 18, Iss. 1, pp. 1-23
Closed Access | Times Cited: 25
Yong-Feng Ge, Elisa Bertino, Hua Wang, et al.
ACM Transactions on Knowledge Discovery from Data (2023) Vol. 18, Iss. 1, pp. 1-23
Closed Access | Times Cited: 25
Ubiquitous intelligent federated learning privacy-preserving scheme under edge computing
Dongfen Li, Jinshan Lai, Ruijin Wang, et al.
Future Generation Computer Systems (2023) Vol. 144, pp. 205-218
Closed Access | Times Cited: 24
Dongfen Li, Jinshan Lai, Ruijin Wang, et al.
Future Generation Computer Systems (2023) Vol. 144, pp. 205-218
Closed Access | Times Cited: 24
A Survey on Intelligent Internet of Things: Applications, Security, Privacy, and Future Directions
Ons Aouedi, Thai-Hoc Vu, Alessio Sacco, et al.
IEEE Communications Surveys & Tutorials (2024), pp. 1-1
Open Access | Times Cited: 14
Ons Aouedi, Thai-Hoc Vu, Alessio Sacco, et al.
IEEE Communications Surveys & Tutorials (2024), pp. 1-1
Open Access | Times Cited: 14
A Comprehensive Review of Current Trends, Challenges, and Opportunities in Text Data Privacy
Sakib Shahriar, Rozita Dara, Rajen Akalu
Computers & Security (2025), pp. 104358-104358
Open Access | Times Cited: 1
Sakib Shahriar, Rozita Dara, Rajen Akalu
Computers & Security (2025), pp. 104358-104358
Open Access | Times Cited: 1
Zhiwen Wang, Junjian Huang, Junlin Huang, et al.
Concurrency and Computation Practice and Experience (2025) Vol. 37, Iss. 4-5
Closed Access | Times Cited: 1
The DeepLabV3 + Algorithm Combined With the ResNeXt Network for Medical Image Segmentation
Yanyan Wu, Yajun Xie, Yintao Hong
Concurrency and Computation Practice and Experience (2025) Vol. 37, Iss. 4-5
Closed Access | Times Cited: 1
Yanyan Wu, Yajun Xie, Yintao Hong
Concurrency and Computation Practice and Experience (2025) Vol. 37, Iss. 4-5
Closed Access | Times Cited: 1
Privacy and Integrity Protection for IoT Multimodal Data Using Machine Learning and Blockchain
Qingzhi Liu, Yuchen Huang, Chenglu Jin, et al.
ACM Transactions on Multimedia Computing Communications and Applications (2024) Vol. 20, Iss. 6, pp. 1-18
Closed Access | Times Cited: 6
Qingzhi Liu, Yuchen Huang, Chenglu Jin, et al.
ACM Transactions on Multimedia Computing Communications and Applications (2024) Vol. 20, Iss. 6, pp. 1-18
Closed Access | Times Cited: 6
Security, privacy, and robustness for trustworthy AI systems: A review
Mozamel M. Saeed, Mohammed Alsharidah
Computers & Electrical Engineering (2024) Vol. 119, pp. 109643-109643
Closed Access | Times Cited: 6
Mozamel M. Saeed, Mohammed Alsharidah
Computers & Electrical Engineering (2024) Vol. 119, pp. 109643-109643
Closed Access | Times Cited: 6
RPIFL: Reliable and Privacy-Preserving Federated Learning for the Internet of Things
Ruijin Wang, Jinshan Lai, Xiong Li, et al.
Journal of Network and Computer Applications (2023) Vol. 221, pp. 103768-103768
Open Access | Times Cited: 16
Ruijin Wang, Jinshan Lai, Xiong Li, et al.
Journal of Network and Computer Applications (2023) Vol. 221, pp. 103768-103768
Open Access | Times Cited: 16
A Framework for User Biometric Privacy Protection in UAV Delivery Systems with Edge Computing
Aiting Yao, Shantanu Pal, Chengzu Dong, et al.
2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops) (2024), pp. 631-636
Closed Access | Times Cited: 5
Aiting Yao, Shantanu Pal, Chengzu Dong, et al.
2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops) (2024), pp. 631-636
Closed Access | Times Cited: 5
TEAR: Exploring Temporal Evolution of Adversarial Robustness for Membership Inference Attacks Against Federated Learning
Gaoyang Liu, Zehao Tian, Jian Chen, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 18, pp. 4996-5010
Closed Access | Times Cited: 11
Gaoyang Liu, Zehao Tian, Jian Chen, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 18, pp. 4996-5010
Closed Access | Times Cited: 11
Privacy-preserving data integration and sharing in multi-party IoT environments: An entity embedding perspective
Junyu Lu, Henry Leung, Nan Xie
Information Fusion (2024) Vol. 108, pp. 102380-102380
Closed Access | Times Cited: 4
Junyu Lu, Henry Leung, Nan Xie
Information Fusion (2024) Vol. 108, pp. 102380-102380
Closed Access | Times Cited: 4
Differentially private consensus and distributed optimization in multi-agent systems: A review
Yamin Wang, Hong Lin, James Lam, et al.
Neurocomputing (2024) Vol. 597, pp. 127986-127986
Closed Access | Times Cited: 4
Yamin Wang, Hong Lin, James Lam, et al.
Neurocomputing (2024) Vol. 597, pp. 127986-127986
Closed Access | Times Cited: 4
An evolutionary game model for indirect data sharing in manufacturing big data consortium
Xiaochuan Tang, Lan Tao, Hao Zhong, et al.
Expert Systems with Applications (2024) Vol. 255, pp. 124807-124807
Closed Access | Times Cited: 4
Xiaochuan Tang, Lan Tao, Hao Zhong, et al.
Expert Systems with Applications (2024) Vol. 255, pp. 124807-124807
Closed Access | Times Cited: 4
Cascade Ownership Verification Framework Based on Invisible Watermark for Model Copyright Protection
Ruoxi Wang, Yujia Zhu, Daoxun Xia
Concurrency and Computation Practice and Experience (2025) Vol. 37, Iss. 4-5
Closed Access
Ruoxi Wang, Yujia Zhu, Daoxun Xia
Concurrency and Computation Practice and Experience (2025) Vol. 37, Iss. 4-5
Closed Access
Improved Co‐DETR With Dropkey and Its Application to Hot Work Detection
Yuting Zhang, Yangfeng Wu, Xu Huang, et al.
Concurrency and Computation Practice and Experience (2025) Vol. 37, Iss. 4-5
Closed Access
Yuting Zhang, Yangfeng Wu, Xu Huang, et al.
Concurrency and Computation Practice and Experience (2025) Vol. 37, Iss. 4-5
Closed Access
Machine Learning‐Based Modeling of Clinical Diagnosis and Treatment of Patients With Hemorrhagic Stroke
Qing Wu, Tinghong Gao
Concurrency and Computation Practice and Experience (2025) Vol. 37, Iss. 6-8
Closed Access
Qing Wu, Tinghong Gao
Concurrency and Computation Practice and Experience (2025) Vol. 37, Iss. 6-8
Closed Access
Deep Autoencoder Neural Networks: A Comprehensive Review and New Perspectives
Ibomoiye Domor Mienye, Theo G. Swart
Archives of Computational Methods in Engineering (2025)
Open Access
Ibomoiye Domor Mienye, Theo G. Swart
Archives of Computational Methods in Engineering (2025)
Open Access
Socially beneficial metaverse: Framework, technologies, applications, and challenges
Xiaolong Xu, Xuanhong Zhou, Muhammad Bilal, et al.
Computer Networks (2025), pp. 111198-111198
Closed Access
Xiaolong Xu, Xuanhong Zhou, Muhammad Bilal, et al.
Computer Networks (2025), pp. 111198-111198
Closed Access
The role of Large Language Models in addressing IoT challenges: A systematic literature review
Gabriele De Vito, Fabio Palomba, Filomena Ferrucci
Future Generation Computer Systems (2025), pp. 107829-107829
Closed Access
Gabriele De Vito, Fabio Palomba, Filomena Ferrucci
Future Generation Computer Systems (2025), pp. 107829-107829
Closed Access
Balancing usability, user experience, security and privacy in XR systems: a multidimensional approach
Rebecca Acheampong, Titus Bălan, Dorin-Mircea Popovici, et al.
International Journal of Information Security (2025) Vol. 24, Iss. 3
Open Access
Rebecca Acheampong, Titus Bălan, Dorin-Mircea Popovici, et al.
International Journal of Information Security (2025) Vol. 24, Iss. 3
Open Access
Privacy-Preserving Federated Learning for Space–Air–Ground Integrated Networks: A Bi-Level Reinforcement Learning and Adaptive Transfer Learning Optimization Framework
Ling Li, Lidong Zhu, Weibang Li
Sensors (2025) Vol. 25, Iss. 9, pp. 2828-2828
Open Access
Ling Li, Lidong Zhu, Weibang Li
Sensors (2025) Vol. 25, Iss. 9, pp. 2828-2828
Open Access
Face image de‐identification by feature space adversarial perturbation
Hanyu Xue, Bo Liu, Xin Yuan, et al.
Concurrency and Computation Practice and Experience (2022) Vol. 35, Iss. 5
Open Access | Times Cited: 18
Hanyu Xue, Bo Liu, Xin Yuan, et al.
Concurrency and Computation Practice and Experience (2022) Vol. 35, Iss. 5
Open Access | Times Cited: 18