OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Data Privacy in Trigger-Action Systems
Yunang Chen, Amrita Roy Chowdhury, Ruizhe Wang, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2021)
Open Access | Times Cited: 10

Showing 10 citing articles:

Identifying Security and Privacy Violation Rules in Trigger-Action IoT Platforms With NLP Models
Bernardo Breve, Gaetano Cimino, Vincenzo Deufemia
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 6, pp. 5607-5622
Open Access | Times Cited: 26

CCDF-TAP: A Context-Aware Conflict Detection Framework for IoT Trigger-Action Programming With Graph Neural Network
Yongheng Xing, Liang Hu, Xinqi Du, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 19, pp. 31534-31544
Closed Access | Times Cited: 2

Don't Bite Off More than You Can Chew: Investigating Excessive Permission Requests in Trigger-Action Integrations
Liuhuo Wan, Kailong Wang, Kulani Mahadewa, et al.
Proceedings of the ACM Web Conference 2022 (2024), pp. 3106-3116
Closed Access | Times Cited: 1

Perils and Mitigation of Security Risks of Cooperation in Mobile-as-a-Gateway IoT
Xin'an Zhou, Jiale Guan, Luyi Xing, et al.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2022), pp. 3285-3299
Open Access | Times Cited: 5

LazyTAP: On-Demand Data Minimization for Trigger-Action Applications
Mohammad M. Ahmadpanah, Daniel Hedin, Andrei Sabelfeld
2022 IEEE Symposium on Security and Privacy (SP) (2023), pp. 3079-3097
Open Access | Times Cited: 2

Threat Detection in Trigger-Action Programming Rules of Smart Home With Heterogeneous Information Network Model
Dongming Sun, Liang Hu, Gang Wu, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 10, pp. 18320-18334
Closed Access

Activity Recognition Protection for IoT Trigger-Action Platforms
Mahmoud Aghvamipanah, Morteza Amini, Cyrille Artho, et al.
(2024), pp. 600-616
Closed Access

Listing the ingredients for IFTTT recipes
Shirin Kalantari, Danny Hughes, Bart De Decker
(2022)
Open Access | Times Cited: 2

WREP: A lightweight event real-time processing engine for IoT
Lei Feng, Yuanfei Zhang, Zhiqiang Hao, et al.
(2022), pp. 79-85
Closed Access

Page 1

Scroll to top