
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Applications of Differential Privacy in Social Network Analysis: A Survey
Honglu Jiang, Jian Pei, Dongxiao Yu, et al.
IEEE Transactions on Knowledge and Data Engineering (2021), pp. 1-1
Open Access | Times Cited: 90
Honglu Jiang, Jian Pei, Dongxiao Yu, et al.
IEEE Transactions on Knowledge and Data Engineering (2021), pp. 1-1
Open Access | Times Cited: 90
Showing 1-25 of 90 citing articles:
A Survey on Differential Privacy for Unstructured Data Content
Ying Zhao, Jinjun Chen
ACM Computing Surveys (2022) Vol. 54, Iss. 10s, pp. 1-28
Closed Access | Times Cited: 183
Ying Zhao, Jinjun Chen
ACM Computing Surveys (2022) Vol. 54, Iss. 10s, pp. 1-28
Closed Access | Times Cited: 183
Bounded and Unbiased Composite Differential Privacy
Kai Zhang, Yanjun Zhang, Ruoxi Sun, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2024) Vol. 30, pp. 972-990
Closed Access | Times Cited: 22
Kai Zhang, Yanjun Zhang, Ruoxi Sun, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2024) Vol. 30, pp. 972-990
Closed Access | Times Cited: 22
SPDL: A Blockchain-Enabled Secure and Privacy-Preserving Decentralized Learning System
Minghui Xu, Zongrui Zou, Ye Cheng, et al.
IEEE Transactions on Computers (2022) Vol. 72, Iss. 2, pp. 548-558
Closed Access | Times Cited: 52
Minghui Xu, Zongrui Zou, Ye Cheng, et al.
IEEE Transactions on Computers (2022) Vol. 72, Iss. 2, pp. 548-558
Closed Access | Times Cited: 52
Differential privacy in edge computing-based smart city Applications:Security issues, solutions and future directions
Aiting Yao, Gang Li, Xuejun Li, et al.
Array (2023) Vol. 19, pp. 100293-100293
Open Access | Times Cited: 21
Aiting Yao, Gang Li, Xuejun Li, et al.
Array (2023) Vol. 19, pp. 100293-100293
Open Access | Times Cited: 21
Differential Privacy for IoT-Enabled Critical Infrastructure: A Comprehensive Survey
Muhammad Akbar Husnoo, Adnan Anwar, Ripon K. Chakrabortty, et al.
IEEE Access (2021) Vol. 9, pp. 153276-153304
Open Access | Times Cited: 42
Muhammad Akbar Husnoo, Adnan Anwar, Ripon K. Chakrabortty, et al.
IEEE Access (2021) Vol. 9, pp. 153276-153304
Open Access | Times Cited: 42
Who is the antecedent? Mapping the relation from mental health to mobile phone addiction using cross-lagged panel network analysis
Xiantong Yang, Yujia Yang, Dan Qin, et al.
Current Psychology (2025)
Closed Access
Xiantong Yang, Yujia Yang, Dan Qin, et al.
Current Psychology (2025)
Closed Access
Federated learning-empowered smart manufacturing and product lifecycle management: A review
Jiewu Leng, Richard Li, Junxing Xie, et al.
Advanced Engineering Informatics (2025) Vol. 65, pp. 103179-103179
Closed Access
Jiewu Leng, Richard Li, Junxing Xie, et al.
Advanced Engineering Informatics (2025) Vol. 65, pp. 103179-103179
Closed Access
CropsDisNet: An AI-Based Platform for Disease Detection and Advancing On-Farm Privacy Solutions
Mohammad Badhruddouza Khan, Salwa Tamkin, Jinat Ara, et al.
Data (2025) Vol. 10, Iss. 2, pp. 25-25
Open Access
Mohammad Badhruddouza Khan, Salwa Tamkin, Jinat Ara, et al.
Data (2025) Vol. 10, Iss. 2, pp. 25-25
Open Access
GenRAN: GenFusion-guided Reversible Anonymization Network for face privacy preserving
Ruilin Wang, Lingchen Gu, Jing Li, et al.
Information Fusion (2025), pp. 103120-103120
Closed Access
Ruilin Wang, Lingchen Gu, Jing Li, et al.
Information Fusion (2025), pp. 103120-103120
Closed Access
Anonymous and Efficient Authentication Scheme for Privacy-Preserving Distributed Learning
Yili Jiang, Kuan Zhang, Yi Qian, et al.
IEEE Transactions on Information Forensics and Security (2022) Vol. 17, pp. 2227-2240
Closed Access | Times Cited: 27
Yili Jiang, Kuan Zhang, Yi Qian, et al.
IEEE Transactions on Information Forensics and Security (2022) Vol. 17, pp. 2227-2240
Closed Access | Times Cited: 27
Joint User Association and Resource Pricing for Metaverse: Distributed and Centralized Approaches
Xumin Huang, Weifeng Zhong, Jiangtian Nie, et al.
2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems (MASS) (2022)
Open Access | Times Cited: 22
Xumin Huang, Weifeng Zhong, Jiangtian Nie, et al.
2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems (MASS) (2022)
Open Access | Times Cited: 22
Invertible mask network for face privacy preservation
Yang Yang, Yiyang Huang, Ming Shi, et al.
Information Sciences (2023) Vol. 629, pp. 566-579
Closed Access | Times Cited: 15
Yang Yang, Yiyang Huang, Ming Shi, et al.
Information Sciences (2023) Vol. 629, pp. 566-579
Closed Access | Times Cited: 15
Incomplete Graph Learning via Attribute-Structure Decoupled Variational Auto-Encoder
Xinke Jiang, Zidi Qin, Jiarong Xu, et al.
(2024)
Open Access | Times Cited: 4
Xinke Jiang, Zidi Qin, Jiarong Xu, et al.
(2024)
Open Access | Times Cited: 4
A survey on security analysis of machine learning-oriented hardware and software intellectual property
Ashraful Tauhid, Lei Xu, Md. Mostafizur Rahman, et al.
High-Confidence Computing (2023) Vol. 3, Iss. 2, pp. 100114-100114
Open Access | Times Cited: 10
Ashraful Tauhid, Lei Xu, Md. Mostafizur Rahman, et al.
High-Confidence Computing (2023) Vol. 3, Iss. 2, pp. 100114-100114
Open Access | Times Cited: 10
Privacy-Preserving Collaborative Learning: A Scheme Providing Heterogeneous Protection
Xin Wang, Heng Zhang, Ming Yang, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 2, pp. 1840-1853
Closed Access | Times Cited: 9
Xin Wang, Heng Zhang, Ming Yang, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 2, pp. 1840-1853
Closed Access | Times Cited: 9
Scenario-based Adaptations of Differential Privacy: A Technical Survey
Ying Zhao, Jia Tina Du, Jinjun Chen
ACM Computing Surveys (2024) Vol. 56, Iss. 8, pp. 1-39
Closed Access | Times Cited: 3
Ying Zhao, Jia Tina Du, Jinjun Chen
ACM Computing Surveys (2024) Vol. 56, Iss. 8, pp. 1-39
Closed Access | Times Cited: 3
Privacy-Preserving Bilateral Multi-receiver Matching with Revocability for Mobile Social Networks
Axin Wu, Dengguo Feng, Min Zhang, et al.
IEEE Transactions on Mobile Computing (2024) Vol. 23, Iss. 12, pp. 11080-11090
Closed Access | Times Cited: 3
Axin Wu, Dengguo Feng, Min Zhang, et al.
IEEE Transactions on Mobile Computing (2024) Vol. 23, Iss. 12, pp. 11080-11090
Closed Access | Times Cited: 3
Game-theoretic analytics for privacy preservation in Internet of Things networks: A survey
Yizhou Shen, Carlton Shepherd, Chuadhry Mujeeb Ahmed, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 133, pp. 108449-108449
Closed Access | Times Cited: 3
Yizhou Shen, Carlton Shepherd, Chuadhry Mujeeb Ahmed, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 133, pp. 108449-108449
Closed Access | Times Cited: 3
LSTEG: An Evolutionary Game Model Leveraging Deep Reinforcement Learning for Privacy Behavior Analysis on Social Networks
Yu Wu, Li Pan
Information Sciences (2024) Vol. 676, pp. 120842-120842
Closed Access | Times Cited: 3
Yu Wu, Li Pan
Information Sciences (2024) Vol. 676, pp. 120842-120842
Closed Access | Times Cited: 3
Privacy and efficiency guaranteed social subgraph matching
Kai Huang, Haibo Hu, Shuigeng Zhou, et al.
The VLDB Journal (2021) Vol. 31, Iss. 3, pp. 581-602
Closed Access | Times Cited: 20
Kai Huang, Haibo Hu, Shuigeng Zhou, et al.
The VLDB Journal (2021) Vol. 31, Iss. 3, pp. 581-602
Closed Access | Times Cited: 20
A Comprehensive Analysis of Privacy-Preserving Solutions Developed for Online Social Networks
Abdul Majeed, Safiullah Khan, Seong Oun Hwang
Electronics (2022) Vol. 11, Iss. 13, pp. 1931-1931
Open Access | Times Cited: 12
Abdul Majeed, Safiullah Khan, Seong Oun Hwang
Electronics (2022) Vol. 11, Iss. 13, pp. 1931-1931
Open Access | Times Cited: 12
Lessons Learned: Surveying the Practicality of Differential Privacy in the Industry
Gonzalo Munilla Garrido, Xiaoyuan Liu, Floria Matthes, et al.
Proceedings on Privacy Enhancing Technologies (2023) Vol. 2023, Iss. 2, pp. 151-170
Open Access | Times Cited: 7
Gonzalo Munilla Garrido, Xiaoyuan Liu, Floria Matthes, et al.
Proceedings on Privacy Enhancing Technologies (2023) Vol. 2023, Iss. 2, pp. 151-170
Open Access | Times Cited: 7
Técnicas de anonimización y pseudonimización en la protección de datos personales
Jorge Luis Córdova-Real, Galo Mauricio López-Sevilla
MQRInvestigar (2024) Vol. 8, Iss. 1, pp. 204-235
Open Access | Times Cited: 2
Jorge Luis Córdova-Real, Galo Mauricio López-Sevilla
MQRInvestigar (2024) Vol. 8, Iss. 1, pp. 204-235
Open Access | Times Cited: 2
A Socially Optimal Data Marketplace With Differentially Private Federated Learning
Peng Sun, Guocheng Liao, Xu Chen, et al.
IEEE/ACM Transactions on Networking (2024) Vol. 32, Iss. 3, pp. 2221-2236
Closed Access | Times Cited: 2
Peng Sun, Guocheng Liao, Xu Chen, et al.
IEEE/ACM Transactions on Networking (2024) Vol. 32, Iss. 3, pp. 2221-2236
Closed Access | Times Cited: 2
LH-IDS: Lightweight Hybrid Intrusion Detection System Based on Differential Privacy in VANETs
Jie Cui, Jietian Xiao, Hong Zhong, et al.
IEEE Transactions on Mobile Computing (2024) Vol. 23, Iss. 12, pp. 12195-12210
Closed Access | Times Cited: 2
Jie Cui, Jietian Xiao, Hong Zhong, et al.
IEEE Transactions on Mobile Computing (2024) Vol. 23, Iss. 12, pp. 12195-12210
Closed Access | Times Cited: 2