
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
High-performance implementation of evolutionary privacy-preserving algorithm for big data using GPU platform
Akbar Telikani, Asadollah Shahbahrami, Amir H. Gandomi
Information Sciences (2021) Vol. 579, pp. 251-265
Closed Access | Times Cited: 9
Akbar Telikani, Asadollah Shahbahrami, Amir H. Gandomi
Information Sciences (2021) Vol. 579, pp. 251-265
Closed Access | Times Cited: 9
Showing 9 citing articles:
Preserving Privacy in Association Rule Mining Using Metaheuristic-Based Algorithms: A Systematic Literature Review
Shahad Aljehani, Youseef Alotaibi
IEEE Access (2024) Vol. 12, pp. 21217-21236
Open Access | Times Cited: 7
Shahad Aljehani, Youseef Alotaibi
IEEE Access (2024) Vol. 12, pp. 21217-21236
Open Access | Times Cited: 7
Knowledge extraction and retention based continual learning by using convolutional autoencoder-based learning classifier system
Muhammad Irfan, Jiangbin Zheng, Muhammad Iqbal, et al.
Information Sciences (2022) Vol. 591, pp. 287-305
Closed Access | Times Cited: 26
Muhammad Irfan, Jiangbin Zheng, Muhammad Iqbal, et al.
Information Sciences (2022) Vol. 591, pp. 287-305
Closed Access | Times Cited: 26
Deep Learning
Advances in computer and electrical engineering book series (2023), pp. 107-138
Closed Access | Times Cited: 10
Advances in computer and electrical engineering book series (2023), pp. 107-138
Closed Access | Times Cited: 10
An edge-aided parallel evolutionary privacy-preserving algorithm for Internet of Things
Akbar Telikani, Asadollah Shahbahrami, Jun Shen, et al.
Internet of Things (2023) Vol. 23, pp. 100831-100831
Open Access | Times Cited: 7
Akbar Telikani, Asadollah Shahbahrami, Jun Shen, et al.
Internet of Things (2023) Vol. 23, pp. 100831-100831
Open Access | Times Cited: 7
Verifiable privacy-preserving association rule mining using distributed decryption mechanism on the cloud
Yange Chen, Qingqing Zhao, Pu Duan, et al.
Expert Systems with Applications (2022) Vol. 201, pp. 117086-117086
Closed Access | Times Cited: 7
Yange Chen, Qingqing Zhao, Pu Duan, et al.
Expert Systems with Applications (2022) Vol. 201, pp. 117086-117086
Closed Access | Times Cited: 7
Parallel depth buffer algorithm based on a ternary optical computer
Kai Song, Jinliang Zhu, Zhenxing Wang, et al.
Applied Optics (2022) Vol. 61, Iss. 23, pp. 6841-6841
Closed Access | Times Cited: 3
Kai Song, Jinliang Zhu, Zhenxing Wang, et al.
Applied Optics (2022) Vol. 61, Iss. 23, pp. 6841-6841
Closed Access | Times Cited: 3
An end-to-end knowledge graph solution to the frequent itemset hiding problem
Panteleimon Krasadakis, Giuseppe Futia, Vassilios S. Verykios, et al.
Information Sciences (2024) Vol. 672, pp. 120680-120680
Closed Access
Panteleimon Krasadakis, Giuseppe Futia, Vassilios S. Verykios, et al.
Information Sciences (2024) Vol. 672, pp. 120680-120680
Closed Access
Data access security monitoring system based on zero trust mechanism
Jianliang Han
(2023) Vol. 891, pp. 88-88
Closed Access | Times Cited: 1
Jianliang Han
(2023) Vol. 891, pp. 88-88
Closed Access | Times Cited: 1
A privacy-aware data sharing framework for Internet of Things through edge computing platform
Akbar Telikani, Jun Shen, Peng Wang, et al.
(2022), pp. 114-122
Closed Access | Times Cited: 1
Akbar Telikani, Jun Shen, Peng Wang, et al.
(2022), pp. 114-122
Closed Access | Times Cited: 1