OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Automated detection of password leakage from public GitHub repositories
Runhan Feng, Ziyang Yan, Shiyan Peng, et al.
Proceedings of the 44th International Conference on Software Engineering (2022)
Closed Access | Times Cited: 17

Showing 17 citing articles:

A Survey of Source Code Representations for Machine Learning-Based Cybersecurity Tasks
Beatrice Casey, Joanna C. S. Santos, George Perry
ACM Computing Surveys (2025)
Open Access | Times Cited: 1

Unveiling Memorization in Code Models
Zhou Yang, Zhipeng Zhao, Chenyu Wang, et al.
(2024), pp. 1-13
Open Access | Times Cited: 7

Your Code Secret Belongs to Me: Neural Code Completion Tools Can Memorize Hard-Coded Credentials
Zhuangbin Chen, Yichen Li, Weibin Wu, et al.
Proceedings of the ACM on software engineering. (2024) Vol. 1, Iss. FSE, pp. 2515-2537
Closed Access | Times Cited: 4

How far are app secrets from being stolen? a case study on android
Lili Wei, Heqing Huang, Shing-Chi Cheung, et al.
Empirical Software Engineering (2025) Vol. 30, Iss. 3
Open Access

Secrets Revealed in Container Images: An Internet-wide Study on Occurrence and Impact
Markus Dahlmanns, Constantin Sander, R Decker, et al.
(2023)
Open Access | Times Cited: 6

Unveiling Memorization in Code Models
Zhou Yang, Zhipeng Zhao, Chenyu Wang, et al.
arXiv (Cornell University) (2023)
Open Access | Times Cited: 6

Do Not Give Away My Secrets: Uncovering the Privacy Issue of Neural Code Completion Tools
Yizhan Huang, Yichen Li, Weibin Wu, et al.
arXiv (Cornell University) (2023)
Open Access | Times Cited: 4

A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects
Ruidong Han, Huihui Gong, Siqi Ma, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 19, pp. 722-734
Closed Access | Times Cited: 2

SoK: A Comprehensive Analysis and Evaluation of Docker Container Attack and Defense Mechanisms
Md Sadun Haq, Thien Duc Nguyen, Ali Şaman Tosun, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2024), pp. 4573-4590
Closed Access

More Haste, Less Speed: Cache Related Security Threats in Continuous Integration Services
Yacong Gu, Lingyun Ying, Huajun Chai, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2024), pp. 1179-1197
Closed Access

SecretHunter: A Large-scale Secret Scanner for Public Git Repositories
Elliott Wen, Jia Wang, Jens Dietrich
(2022)
Closed Access | Times Cited: 2

Connecting the .dotfiles: Checked-In Secret Exposure with Extra (Lateral Movement) Steps
Gerhard Jungwirth, Aakanksha Saha, Michael Schröder, et al.
(2023), pp. 322-333
Closed Access

A Comparative Study of Software Secrets Reporting by Secret Detection Tools
Setu Kumar Basak, J. L. Cox, Bradley Reaves, et al.
(2023), pp. 1-12
Open Access

A Method for Detecting Secret-Key Leaks in Public Container Images on DockerHub
Siwei Yin, Zhitao Dai
2021 7th International Conference on Computer and Communications (ICCC) (2023), pp. 2068-2073
Closed Access

Page 1

Scroll to top