
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Disguised as Privacy: Data Poisoning Attacks against Differentially Private Crowdsensing Systems
Zhetao Li, Zhirun Zheng, Suiming Guo, et al.
IEEE Transactions on Mobile Computing (2022), pp. 1-1
Closed Access | Times Cited: 22
Zhetao Li, Zhirun Zheng, Suiming Guo, et al.
IEEE Transactions on Mobile Computing (2022), pp. 1-1
Closed Access | Times Cited: 22
Showing 22 citing articles:
FlexibleFL: Mitigating poisoning attacks with contributions in cloud-edge federated learning systems
Yaru Zhao, Yihao Cao, Jianbiao Zhang, et al.
Information Sciences (2024) Vol. 664, pp. 120350-120350
Closed Access | Times Cited: 6
Yaru Zhao, Yihao Cao, Jianbiao Zhang, et al.
Information Sciences (2024) Vol. 664, pp. 120350-120350
Closed Access | Times Cited: 6
Backdoor Attacks and Defenses Targeting Multi-Domain AI Models: A Comprehensive Review
Shaobo Zhang, Yizhen Pan, Qin Liu, et al.
ACM Computing Surveys (2024) Vol. 57, Iss. 4, pp. 1-35
Open Access | Times Cited: 5
Shaobo Zhang, Yizhen Pan, Qin Liu, et al.
ACM Computing Surveys (2024) Vol. 57, Iss. 4, pp. 1-35
Open Access | Times Cited: 5
Semantic-Aware Privacy-Preserving Online Location Trajectory Data Sharing
Zhirun Zheng, Zhetao Li, Hongbo Jiang, et al.
IEEE Transactions on Information Forensics and Security (2022) Vol. 17, pp. 2256-2271
Closed Access | Times Cited: 18
Zhirun Zheng, Zhetao Li, Hongbo Jiang, et al.
IEEE Transactions on Information Forensics and Security (2022) Vol. 17, pp. 2256-2271
Closed Access | Times Cited: 18
Defending Against Data Poisoning Attack in Federated Learning With Non-IID Data
Chunyong Yin, Qingkui Zeng
IEEE Transactions on Computational Social Systems (2023) Vol. 11, Iss. 2, pp. 2313-2325
Closed Access | Times Cited: 9
Chunyong Yin, Qingkui Zeng
IEEE Transactions on Computational Social Systems (2023) Vol. 11, Iss. 2, pp. 2313-2325
Closed Access | Times Cited: 9
Data Poisoning Attacks and Defenses to LDP-Based Privacy-Preserving Crowdsensing
Zhirun Zheng, Zhetao Li, Cheng Huang, et al.
IEEE Transactions on Dependable and Secure Computing (2024) Vol. 21, Iss. 5, pp. 4861-4878
Closed Access | Times Cited: 3
Zhirun Zheng, Zhetao Li, Cheng Huang, et al.
IEEE Transactions on Dependable and Secure Computing (2024) Vol. 21, Iss. 5, pp. 4861-4878
Closed Access | Times Cited: 3
Personalized and Differential Privacy-Aware Video Stream Offloading in Mobile Edge Computing
Ping Zhao, Ziyi Yang, Guanglin Zhang
IEEE Transactions on Cloud Computing (2024) Vol. 12, Iss. 1, pp. 347-358
Closed Access | Times Cited: 3
Ping Zhao, Ziyi Yang, Guanglin Zhang
IEEE Transactions on Cloud Computing (2024) Vol. 12, Iss. 1, pp. 347-358
Closed Access | Times Cited: 3
PPRP: Preserving Location Privacy for Range-based Positioning in Mobile Networks
Cheng Huang, Dongxiao Liu, Anjia Yang, et al.
IEEE Transactions on Mobile Computing (2024) Vol. 23, Iss. 10, pp. 9451-9468
Closed Access | Times Cited: 1
Cheng Huang, Dongxiao Liu, Anjia Yang, et al.
IEEE Transactions on Mobile Computing (2024) Vol. 23, Iss. 10, pp. 9451-9468
Closed Access | Times Cited: 1
LDP-Purifier: Defending against Poisoning Attacks in Local Differential Privacy
Leixia Wang, Qingqing Ye, Haibo Hu, et al.
Lecture notes in computer science (2024), pp. 221-231
Closed Access | Times Cited: 1
Leixia Wang, Qingqing Ye, Haibo Hu, et al.
Lecture notes in computer science (2024), pp. 221-231
Closed Access | Times Cited: 1
Privacy-Preserving Truth Discovery for Collaborative-Cloud Encryption in Mobile Crowdsensing
Xingting Liu, Siwang Zhou, Wei Zhang, et al.
IEEE Systems Journal (2023) Vol. 17, Iss. 3, pp. 4990-5001
Closed Access | Times Cited: 4
Xingting Liu, Siwang Zhou, Wei Zhang, et al.
IEEE Systems Journal (2023) Vol. 17, Iss. 3, pp. 4990-5001
Closed Access | Times Cited: 4
A crowd cooperative defense model for mitigating DDoS attacks in Mobile Crowdsensing networks
Guosheng Zhao, Ming Gao, Jian Wang
Computer Communications (2023) Vol. 207, pp. 150-163
Closed Access | Times Cited: 4
Guosheng Zhao, Ming Gao, Jian Wang
Computer Communications (2023) Vol. 207, pp. 150-163
Closed Access | Times Cited: 4
A Collusion Attack Resistance Data Aggregation Scheme in Internet of Things
Wenshuo Ma, Xiaowu Liu, Jiguo Yu, et al.
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 11, pp. 13352-13362
Closed Access | Times Cited: 1
Wenshuo Ma, Xiaowu Liu, Jiguo Yu, et al.
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 11, pp. 13352-13362
Closed Access | Times Cited: 1
Efficient Congestion Control With Information Loss Minimization for Vehicular Ad Hoc Networks
Yuanming Fang, Xuxun Liu, Zhetao Li, et al.
IEEE Transactions on Vehicular Technology (2022) Vol. 72, Iss. 3, pp. 3879-3888
Closed Access | Times Cited: 6
Yuanming Fang, Xuxun Liu, Zhetao Li, et al.
IEEE Transactions on Vehicular Technology (2022) Vol. 72, Iss. 3, pp. 3879-3888
Closed Access | Times Cited: 6
Mobile Crowdsensing Ecosystem with Combinatorial Multi-Armed Bandit-Based Dynamic Truth Discovery
Jia Liu, Jianbo Shao, Min Sheng, et al.
IEEE Transactions on Mobile Computing (2024) Vol. 23, Iss. 12, pp. 13095-13113
Closed Access
Jia Liu, Jianbo Shao, Min Sheng, et al.
IEEE Transactions on Mobile Computing (2024) Vol. 23, Iss. 12, pp. 13095-13113
Closed Access
Bilateral Personalized Information Fusion in Mobile Crowdsensing
Zheqi Feng, Tao Peng, Guojun Wang, et al.
Communications in computer and information science (2024), pp. 3-16
Closed Access
Zheqi Feng, Tao Peng, Guojun Wang, et al.
Communications in computer and information science (2024), pp. 3-16
Closed Access
A condition-based distributed approach for secured privacy preservation of nodes in wireless sensor networks IoT
B.T.G.S. Kumara, S. Anantha Padmanabhan
International Journal of Reconfigurable and Embedded Systems (IJRES) (2024) Vol. 13, Iss. 2, pp. 441-441
Open Access
B.T.G.S. Kumara, S. Anantha Padmanabhan
International Journal of Reconfigurable and Embedded Systems (IJRES) (2024) Vol. 13, Iss. 2, pp. 441-441
Open Access
A differential privacy location protect approach with intelligence data collection paradigm for MCS
Yuan Tao, Taochun Wang, Yong Qiang, et al.
Computer Networks (2024) Vol. 247, pp. 110421-110421
Closed Access
Yuan Tao, Taochun Wang, Yong Qiang, et al.
Computer Networks (2024) Vol. 247, pp. 110421-110421
Closed Access
Adversarial Reinforcement Learning based Data Poisoning Attacks Defense for Task-Oriented Multi-User Semantic Communication
Jincheng Peng, Huanlai Xing, Lexi Xu, et al.
IEEE Transactions on Mobile Computing (2024) Vol. 23, Iss. 12, pp. 14834-14851
Closed Access
Jincheng Peng, Huanlai Xing, Lexi Xu, et al.
IEEE Transactions on Mobile Computing (2024) Vol. 23, Iss. 12, pp. 14834-14851
Closed Access
Learning from the History: Accurately and Efficiently Aggregating Geospatial Data Under Local Differential Privacy
Mengyuan Wang, Hongbo Jiang, Liang Hu, et al.
(2024), pp. 277-287
Closed Access
Mengyuan Wang, Hongbo Jiang, Liang Hu, et al.
(2024), pp. 277-287
Closed Access
A Secure federated learning framework based on autoencoder and Long Short-Term Memory with generalized robust loss function for detection and prevention of data poisoning attacks
Preeti Singh
Biomedical Signal Processing and Control (2024) Vol. 102, pp. 107320-107320
Closed Access
Preeti Singh
Biomedical Signal Processing and Control (2024) Vol. 102, pp. 107320-107320
Closed Access
Privacy-aware secured discrete framework in wireless sensor network
Nandini Sonnappa, Muniyegowda Kempanna
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2023) Vol. 14, Iss. 1, pp. 75-75
Open Access | Times Cited: 1
Nandini Sonnappa, Muniyegowda Kempanna
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2023) Vol. 14, Iss. 1, pp. 75-75
Open Access | Times Cited: 1
Generating Imperceptible Adversarial Patch Based on Vulnerable Targeted Attack
Cong He, Manqi Zhao, Yaqi Li, et al.
(2023), pp. 910-914
Closed Access
Cong He, Manqi Zhao, Yaqi Li, et al.
(2023), pp. 910-914
Closed Access
A Trust Evaluation Joint Active Detection Method in Video Sharing D2D Networks
Zhetao Li, Jianhui Wang, Saiqin Long, et al.
IEEE Transactions on Mobile Computing (2023) Vol. 23, Iss. 7, pp. 7739-7752
Closed Access
Zhetao Li, Jianhui Wang, Saiqin Long, et al.
IEEE Transactions on Mobile Computing (2023) Vol. 23, Iss. 7, pp. 7739-7752
Closed Access