OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Interaction data are identifiable even across long periods of time
Ana-Maria Creţu, Federico Monti, Stefano Marrone, et al.
Nature Communications (2022) Vol. 13, Iss. 1
Open Access | Times Cited: 24

Showing 24 citing articles:

Generating fine-grained surrogate temporal networks
Antonio Longa, Giulia Cencetti, Sune Lehmann, et al.
Communications Physics (2024) Vol. 7, Iss. 1
Open Access | Times Cited: 7

Anonymization: The imperfect science of using data while preserving privacy
Andrea Gadotti, Luc Rocher, Florimond Houssiau, et al.
Science Advances (2024) Vol. 10, Iss. 29
Open Access | Times Cited: 6

A scaling law to model the effectiveness of identification techniques
Luc Rocher, Julien M. Hendrickx, Yves-Alexandre de Montjoye
Nature Communications (2025) Vol. 16, Iss. 1
Open Access

Data technologies and analytics for policy and governance: a landscape review
Omar Isaac Asensio, Catherine E. Moore, Nícola Ulibarrí, et al.
Data & Policy (2025) Vol. 7
Open Access

SoK: Managing risks of linkage attacks on data privacy
Jovan Powar, Alastair R. Beresford
Proceedings on Privacy Enhancing Technologies (2023) Vol. 2023, Iss. 2, pp. 97-116
Open Access | Times Cited: 8

A Comprehensive Analysis of Privacy-Preserving Solutions Developed for Online Social Networks
Abdul Majeed, Safiullah Khan, Seong Oun Hwang
Electronics (2022) Vol. 11, Iss. 13, pp. 1931-1931
Open Access | Times Cited: 12

Understanding EdTech's Privacy and Security Issues: Understanding the Perception and Awareness of Education Technologies' Privacy and Security Issues
Rakibul Hasan
Proceedings on Privacy Enhancing Technologies (2023) Vol. 2023, Iss. 4, pp. 269-286
Open Access | Times Cited: 6

Characterizing Privacy Risks in Healthcare IoT Systems
Shuai Li, Alessio Baiocco, Shouhuai Xu
Communications in computer and information science (2024), pp. 51-68
Closed Access | Times Cited: 1

Re-pseudonymization Strategies for Smart Meter Data Are Not Robust to Deep Learning Profiling Attacks
Ana-Maria Creţu, Miruna Rusu, Yves-Alexandre de Montjoye
(2024)
Open Access | Times Cited: 1

An embedding-based distance for temporal graphs
Lorenzo Dall’Amico, Alain Barrat, Ciro Cattuto
Nature Communications (2024) Vol. 15, Iss. 1
Open Access | Times Cited: 1

Limits of Individual Consent and Models of Distributed Consent in Online Social Networks
Juniper Lovato, Antoine Allard, Randall Harp, et al.
2022 ACM Conference on Fairness, Accountability, and Transparency (2022), pp. 2251-2262
Open Access | Times Cited: 6

Diseases Prediction from Officially Anonymized Medical and Healthcare Big Data
Hiroaki Kikuchi, Satoshi Ito, Kazuki Ikegami, et al.
2021 IEEE International Conference on Big Data (Big Data) (2022), pp. 1-11
Closed Access | Times Cited: 6

A Dummy User Based Privacy Preserving Model for Online and Offline Crowd Mobility Monitoring Applications
S. Venkatesan, Richard Göbel, Nachiket Tapas, et al.
(2024)
Closed Access

Neighbourhood matching creates realistic surrogate temporal networks
Antonio Longa, Giulia Cencetti, Sune Lehmann, et al.
Research Square (Research Square) (2022)
Open Access | Times Cited: 3

Developing a Human Centred AI Masters
Barry Feeney, Monica Zuccarini, Tarry Singh, et al.
(2022) Vol. 13, pp. 660-661
Closed Access | Times Cited: 3

Multiple Person Tracking Based on Gait Identification Using Kinect and OpenPose
Ryotaro Toma, Terumi Yaguchi, Hiroaki Kikuchi
Lecture notes in computer science (2024), pp. 175-187
Closed Access

User Interaction Data in Apps: Comparing Policy Claims to Implementations
Feiyang Tang, Bjarte M. Østvold
IFIP advances in information and communication technology (2024), pp. 64-80
Closed Access

Knowledge-enhanced heterogeneous graph attention networks for privacy co-disclosure detection in online social network
Gan Liu, Xiongtao Sun, Hui Li, et al.
Expert Systems with Applications (2024), pp. 126266-126266
Closed Access

Emerging Futures and Technology Ethics
Melanie Sage, Gina Griffin
(2023), pp. 499-516
Closed Access | Times Cited: 1

A Vulnerability in Video Anonymization – Privacy Disclosure from Face-obfuscated video
Hiroaki Kikuchi, Shun Miyoshi, Takafumi Mori, et al.
(2022), pp. 1-10
Closed Access | Times Cited: 1

Protection of a Printing Company with Elements of Artificial Intelligence and IIoT from Cyber Threats
Bohdan Durnyak, Tetyana Neroda, Petro Shepita, et al.
Lecture notes on data engineering and communications technologies (2023), pp. 197-205
Closed Access

Emerging Futures and Technology Ethics
Melanie Sage, Gina Griffin
(2022), pp. 1-18
Closed Access

Emerging Futures and Technology Ethics
Melanie Sage, Gina Griffin
(2022), pp. 1-18
Closed Access

Page 1

Scroll to top