OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

DP-TrajGAN: A privacy-aware trajectory generation model with differential privacy
Jing Zhang, Qihan Huang, Yirui Huang, et al.
Future Generation Computer Systems (2022) Vol. 142, pp. 25-40
Closed Access | Times Cited: 22

Showing 22 citing articles:

GeoPM-DMEIRL: A deep inverse reinforcement learning security trajectory generation framework with serverless computing
Yi-rui Huang, Jing Zhang, H. Hou, et al.
Future Generation Computer Systems (2024) Vol. 154, pp. 123-139
Closed Access | Times Cited: 7

Modeling and Synthesis of GPS Trajectories for Privacy-Preserving Mobility Data Generation
Arianna Burzacchi, Lise Bellanger, Klervi Le Gall, et al.
(2025), pp. 309-314
Closed Access

Trajectory generation: a survey on methods and techniques
Xin Chen, Chengrui Huang, Chenhao Wang, et al.
GeoInformatica (2025)
Closed Access

Privacy-preserving generation and publication of synthetic trajectory microdata: A comprehensive survey
Jong Wook Kim, Beakcheol Jang
Journal of Network and Computer Applications (2024) Vol. 230, pp. 103951-103951
Closed Access | Times Cited: 3

PPDF-FedTMI: A Federated Learning-based Transport Mode Inference Model with Privacy-Preserving Data Fusion
Qihan Huang, Jing Zhang, Zuanyang Zeng, et al.
Simulation Modelling Practice and Theory (2023) Vol. 129, pp. 102845-102845
Closed Access | Times Cited: 6

Spatiotemporal gated traffic trajectory simulation with semantic-aware graph learning
Yu Wang, Ji Cao, Wenjie Huang, et al.
Information Fusion (2024) Vol. 108, pp. 102404-102404
Closed Access | Times Cited: 1

Protecting privacy and enhancing utility: A novel approach for personalized trajectory data publishing using noisy prefix tree
Yongxin Zhao, Chundong Wang
Computers & Security (2024) Vol. 144, pp. 103922-103922
Closed Access | Times Cited: 1

SoK: Can Trajectory Generation Combine Privacy and Utility?
Erik Buchholz, Alsharif Abuadbba, Shuo Wang, et al.
Proceedings on Privacy Enhancing Technologies (2024) Vol. 2024, Iss. 3, pp. 75-93
Open Access | Times Cited: 1

STAGE: a spatiotemporal-knowledge enhanced multi-task generative adversarial network (GAN) for trajectory generation
Zhongcai Cao, Kang Liu, Jinyuan Xin, et al.
International Journal of Geographical Information Science (2024), pp. 1-28
Closed Access | Times Cited: 1

TLPP: Deep Learning Based Two-layer Privacy Preserving Mechanism for Protecting Vehicle Trajectory Data
Na Fan, Jia Liu, Shudi Zhao, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 22, pp. 36084-36098
Closed Access | Times Cited: 1

LSTM-Oppurs: Opportunistic user recruitment strategy based on deep learning in mobile crowdsensing system
Jing Zhang, Ding He, Xueqi Chen, et al.
Future Generation Computer Systems (2024) Vol. 162, pp. 107490-107490
Closed Access | Times Cited: 1

Correlated differential privacy based logistic regression for supplier data protection
Ming Liu, Xiao Song, Yong Li, et al.
Computers & Security (2023) Vol. 136, pp. 103542-103542
Closed Access | Times Cited: 3

Personalized trajectory differential privacy protection mechanism based on spatiotemporal correlation prediction
Yanmei Shen, Hua Rui, Hui Wang, et al.
Academic Journal of Computing & Information Science (2024) Vol. 7, Iss. 1
Open Access

A Hybrid Reinforcement Learning-Based Method for Generating Privacy-Preserving Trajectories in Low-Density Traffic Environments
Zhixiang Zhang, Wai‐Choong Wong, Biplab Sikdar
IEEE Transactions on Intelligent Transportation Systems (2024) Vol. 25, Iss. 10, pp. 14740-14757
Closed Access

Effective Route Recommendation Leveraging Differentially Private Location Data
Jong Wook Kim
Mathematics (2024) Vol. 12, Iss. 19, pp. 2977-2977
Open Access

Dynamic-Parameter Genetic Algorithm for Multi-objective Privacy-Preserving Trajectory Data Publishing
Samsad Jahan, Yong-Feng Ge, Hua Wang, et al.
Lecture notes in computer science (2024), pp. 46-57
Closed Access

DP-LTGAN: Differentially private trajectory publishing via Locally-aware Transformer-based GAN
R. Zhang, Wen‐Fei Ni, Nan Fu, et al.
Future Generation Computer Systems (2024), pp. 107686-107686
Closed Access

Genomic Data Fusion using Paillier Cryptosystem
P. Shobha, N. Nalini
Journal of Current Science and Technology (2024) Vol. 14, Iss. 3, pp. 57-57
Open Access

GeoSecure-B:A Method for Secure Bearing Calculation
Vikram Patil, S. Rajan, Pradeep K. Atrey
(2024) Vol. 13, pp. 446-451
Closed Access

Acceptable Margin of Error: Quantifying Location Privacy in BLE Localization
Viktoriia Shubina, Aleksandr Ometov, Dragoş Niculescu, et al.
(2023), pp. 1-7
Open Access

Page 1

Scroll to top