
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Differential Privacy Techniques for Cyber Physical Systems: A Survey
Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen
IEEE Communications Surveys & Tutorials (2019) Vol. 22, Iss. 1, pp. 746-789
Open Access | Times Cited: 454
Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen
IEEE Communications Surveys & Tutorials (2019) Vol. 22, Iss. 1, pp. 746-789
Open Access | Times Cited: 454
Showing 1-25 of 454 citing articles:
Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions
Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen
Future Generation Computer Systems (2019) Vol. 97, pp. 512-529
Closed Access | Times Cited: 470
Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen
Future Generation Computer Systems (2019) Vol. 97, pp. 512-529
Closed Access | Times Cited: 470
DEAL: Differentially Private Auction for Blockchain based Microgrids Energy Trading
Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen
IEEE Transactions on Services Computing (2019), pp. 1-1
Closed Access | Times Cited: 265
Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen
IEEE Transactions on Services Computing (2019), pp. 1-1
Closed Access | Times Cited: 265
Cyber-Physical Power System (CPPS): A Review on Modeling, Simulation, and Analysis With Cyber Security Applications
Rajaa Vikhram Yohanandhan, Rajvikram Madurai Elavarasan, M. Premkumar, et al.
IEEE Access (2020) Vol. 8, pp. 151019-151064
Open Access | Times Cited: 249
Rajaa Vikhram Yohanandhan, Rajvikram Madurai Elavarasan, M. Premkumar, et al.
IEEE Access (2020) Vol. 8, pp. 151019-151064
Open Access | Times Cited: 249
A Multicloud-Model-Based Many-Objective Intelligent Algorithm for Efficient Task Scheduling in Internet of Things
Xingjuan Cai, Shaojin Geng, Di Wu, et al.
IEEE Internet of Things Journal (2020) Vol. 8, Iss. 12, pp. 9645-9653
Closed Access | Times Cited: 212
Xingjuan Cai, Shaojin Geng, Di Wu, et al.
IEEE Internet of Things Journal (2020) Vol. 8, Iss. 12, pp. 9645-9653
Closed Access | Times Cited: 212
A Survey on Differential Privacy for Unstructured Data Content
Ying Zhao, Jinjun Chen
ACM Computing Surveys (2022) Vol. 54, Iss. 10s, pp. 1-28
Closed Access | Times Cited: 183
Ying Zhao, Jinjun Chen
ACM Computing Surveys (2022) Vol. 54, Iss. 10s, pp. 1-28
Closed Access | Times Cited: 183
A New Subspace Clustering Strategy for AI-Based Data Analysis in IoT System
Zhihua Cui, Xuechun Jing, Peng Zhao, et al.
IEEE Internet of Things Journal (2021) Vol. 8, Iss. 16, pp. 12540-12549
Closed Access | Times Cited: 180
Zhihua Cui, Xuechun Jing, Peng Zhao, et al.
IEEE Internet of Things Journal (2021) Vol. 8, Iss. 16, pp. 12540-12549
Closed Access | Times Cited: 180
The Performance Evaluation of Blockchain-Based Security and Privacy Systems for the Internet of Things: A Tutorial
Mohamed Amine Ferrag, Lei Shu
IEEE Internet of Things Journal (2021) Vol. 8, Iss. 24, pp. 17236-17260
Closed Access | Times Cited: 168
Mohamed Amine Ferrag, Lei Shu
IEEE Internet of Things Journal (2021) Vol. 8, Iss. 24, pp. 17236-17260
Closed Access | Times Cited: 168
Recommendations for Responsible Development and Application of Neurotechnologies
Sara Goering, Eran Klein, Laura Specker Sullivan, et al.
Neuroethics (2021) Vol. 14, Iss. 3, pp. 365-386
Open Access | Times Cited: 153
Sara Goering, Eran Klein, Laura Specker Sullivan, et al.
Neuroethics (2021) Vol. 14, Iss. 3, pp. 365-386
Open Access | Times Cited: 153
Detection algorithm of safety helmet wearing based on deep learning
Li Huang, Qiaobo Fu, Meiling He, et al.
Concurrency and Computation Practice and Experience (2021) Vol. 33, Iss. 13
Closed Access | Times Cited: 150
Li Huang, Qiaobo Fu, Meiling He, et al.
Concurrency and Computation Practice and Experience (2021) Vol. 33, Iss. 13
Closed Access | Times Cited: 150
Developing future human-centered smart cities: Critical analysis of smart city security, Data management, and Ethical challenges
Kashif Ahmad, Majdi Maabreh, Mohamed Ghaly, et al.
Computer Science Review (2021) Vol. 43, pp. 100452-100452
Closed Access | Times Cited: 150
Kashif Ahmad, Majdi Maabreh, Mohamed Ghaly, et al.
Computer Science Review (2021) Vol. 43, pp. 100452-100452
Closed Access | Times Cited: 150
Anomaly Detection in Blockchain Networks: A Comprehensive Survey
Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen
IEEE Communications Surveys & Tutorials (2022) Vol. 25, Iss. 1, pp. 289-318
Open Access | Times Cited: 149
Muneeb Ul Hassan, Mubashir Husain Rehmani, Jinjun Chen
IEEE Communications Surveys & Tutorials (2022) Vol. 25, Iss. 1, pp. 289-318
Open Access | Times Cited: 149
Artificial Intelligence Trust, Risk and Security Management (AI TRiSM): Frameworks, applications, challenges and future research directions
Adib Habbal, Mohamed Khalif Ali, Mustafa Ali Abuzaraida
Expert Systems with Applications (2023) Vol. 240, pp. 122442-122442
Closed Access | Times Cited: 138
Adib Habbal, Mohamed Khalif Ali, Mustafa Ali Abuzaraida
Expert Systems with Applications (2023) Vol. 240, pp. 122442-122442
Closed Access | Times Cited: 138
Manipulator grabbing position detection with information fusion of color image and depth image using deep learning
Du Jiang, Gongfa Li, Ying Sun, et al.
Journal of Ambient Intelligence and Humanized Computing (2021) Vol. 12, Iss. 12, pp. 10809-10822
Closed Access | Times Cited: 126
Du Jiang, Gongfa Li, Ying Sun, et al.
Journal of Ambient Intelligence and Humanized Computing (2021) Vol. 12, Iss. 12, pp. 10809-10822
Closed Access | Times Cited: 126
A Comprehensive Survey on the Applications of Blockchain for Securing Vehicular Networks
Tejasvi Alladi, Vinay Chamola, Nishad Sahu, et al.
IEEE Communications Surveys & Tutorials (2022) Vol. 24, Iss. 2, pp. 1212-1239
Open Access | Times Cited: 87
Tejasvi Alladi, Vinay Chamola, Nishad Sahu, et al.
IEEE Communications Surveys & Tutorials (2022) Vol. 24, Iss. 2, pp. 1212-1239
Open Access | Times Cited: 87
Operationalising ethics in artificial intelligence for healthcare: a framework for AI developers
Pravik Solanki, John Grundy, Waqar Hussain
AI and Ethics (2022) Vol. 3, Iss. 1, pp. 223-240
Open Access | Times Cited: 83
Pravik Solanki, John Grundy, Waqar Hussain
AI and Ethics (2022) Vol. 3, Iss. 1, pp. 223-240
Open Access | Times Cited: 83
Data Integration Challenges for Machine Learning in Precision Medicine
Mireya Martínez-García, Enrique Hernández-Lemus
Frontiers in Medicine (2022) Vol. 8
Open Access | Times Cited: 78
Mireya Martínez-García, Enrique Hernández-Lemus
Frontiers in Medicine (2022) Vol. 8
Open Access | Times Cited: 78
A Survey of mmWave-Based Human Sensing: Technology, Platforms and Applications
Jia Zhang, Rui Xi, Yuan He, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 4, pp. 2052-2087
Open Access | Times Cited: 57
Jia Zhang, Rui Xi, Yuan He, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 4, pp. 2052-2087
Open Access | Times Cited: 57
Advancing 3D bioprinting through machine learning and artificial intelligence
Srikanthan Ramesh, Akash Deep, Ali Tamayol, et al.
Bioprinting (2024) Vol. 38, pp. e00331-e00331
Closed Access | Times Cited: 28
Srikanthan Ramesh, Akash Deep, Ali Tamayol, et al.
Bioprinting (2024) Vol. 38, pp. e00331-e00331
Closed Access | Times Cited: 28
A Survey of IoT Privacy Security: Architecture, Technology, Challenges, and Trends
Panjun Sun, Shigen Shen, Yi Wan, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 21, pp. 34567-34591
Closed Access | Times Cited: 23
Panjun Sun, Shigen Shen, Yi Wan, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 21, pp. 34567-34591
Closed Access | Times Cited: 23
Advances and Vulnerabilities in Modern Cryptographic Techniques: A Comprehensive Survey on Cybersecurity in the Domain of Machine/Deep Learning and Quantum Techniques
Abid Mehmood, Arslan Shafique, Moatsum Alawida, et al.
IEEE Access (2024) Vol. 12, pp. 27530-27555
Open Access | Times Cited: 15
Abid Mehmood, Arslan Shafique, Moatsum Alawida, et al.
IEEE Access (2024) Vol. 12, pp. 27530-27555
Open Access | Times Cited: 15
Security and Privacy in the Industrial Internet of Things: Current Standards and Future Challenges
Teklay Gebremichael, Lehlogonolo P. I. Ledwaba, Mohamed Hamdy Eldefrawy, et al.
IEEE Access (2020) Vol. 8, pp. 152351-152366
Open Access | Times Cited: 116
Teklay Gebremichael, Lehlogonolo P. I. Ledwaba, Mohamed Hamdy Eldefrawy, et al.
IEEE Access (2020) Vol. 8, pp. 152351-152366
Open Access | Times Cited: 116
A many-objective optimization recommendation algorithm based on knowledge mining
Xingjuan Cai, Zhaoming Hu, Jinjun Chen
Information Sciences (2020) Vol. 537, pp. 148-161
Closed Access | Times Cited: 103
Xingjuan Cai, Zhaoming Hu, Jinjun Chen
Information Sciences (2020) Vol. 537, pp. 148-161
Closed Access | Times Cited: 103
Applications of Differential Privacy in Social Network Analysis: A Survey
Honglu Jiang, Jian Pei, Dongxiao Yu, et al.
IEEE Transactions on Knowledge and Data Engineering (2021), pp. 1-1
Open Access | Times Cited: 90
Honglu Jiang, Jian Pei, Dongxiao Yu, et al.
IEEE Transactions on Knowledge and Data Engineering (2021), pp. 1-1
Open Access | Times Cited: 90
Survey on blockchain for future smart grids: Technical aspects, applications, integration challenges and future research
Charithri Yapa, Chamitha de Alwis, Madhusanka Liyanage, et al.
Energy Reports (2021) Vol. 7, pp. 6530-6564
Open Access | Times Cited: 85
Charithri Yapa, Chamitha de Alwis, Madhusanka Liyanage, et al.
Energy Reports (2021) Vol. 7, pp. 6530-6564
Open Access | Times Cited: 85
Gesture recognition based on surface electromyography‐feature image
Yangwei Cheng, Gongfa Li, Mingchao Yu, et al.
Concurrency and Computation Practice and Experience (2020) Vol. 33, Iss. 6
Closed Access | Times Cited: 84
Yangwei Cheng, Gongfa Li, Mingchao Yu, et al.
Concurrency and Computation Practice and Experience (2020) Vol. 33, Iss. 6
Closed Access | Times Cited: 84