
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Towards Comprehensive Support for Privacy Preservation Cross-Organization Business Process Mining
Cong Liu, Hua Duan, Qingtian Zeng, et al.
IEEE Transactions on Services Computing (2016) Vol. 12, Iss. 4, pp. 639-653
Closed Access | Times Cited: 99
Cong Liu, Hua Duan, Qingtian Zeng, et al.
IEEE Transactions on Services Computing (2016) Vol. 12, Iss. 4, pp. 639-653
Closed Access | Times Cited: 99
Showing 1-25 of 99 citing articles:
Privacy-Preserving Process Mining in Healthcare
Anastasiia Pika, Moe Thandar Wynn, Stephanus Budiono, et al.
International Journal of Environmental Research and Public Health (2020) Vol. 17, Iss. 5, pp. 1612-1612
Open Access | Times Cited: 79
Anastasiia Pika, Moe Thandar Wynn, Stephanus Budiono, et al.
International Journal of Environmental Research and Public Health (2020) Vol. 17, Iss. 5, pp. 1612-1612
Open Access | Times Cited: 79
Adoption, use and management of process mining in practice
Thomas Grisold, Jan Mendling, Markus Otto, et al.
Business Process Management Journal (2020) Vol. 27, Iss. 2, pp. 369-387
Closed Access | Times Cited: 61
Thomas Grisold, Jan Mendling, Markus Otto, et al.
Business Process Management Journal (2020) Vol. 27, Iss. 2, pp. 369-387
Closed Access | Times Cited: 61
Explainable and Effective Process Remaining Time Prediction Using Feature-Informed Cascade Prediction Model
Na Guo, Cong Liu, Caihong Li, et al.
IEEE Transactions on Services Computing (2024) Vol. 17, Iss. 3, pp. 949-962
Closed Access | Times Cited: 5
Na Guo, Cong Liu, Caihong Li, et al.
IEEE Transactions on Services Computing (2024) Vol. 17, Iss. 3, pp. 949-962
Closed Access | Times Cited: 5
Privacy Challenges for Process Mining in Human-Centered Industrial Environments
Felix Mannhardt, Sobah Abbas Petersen, Manuel Fradinho Oliveira
(2018), pp. 64-71
Open Access | Times Cited: 56
Felix Mannhardt, Sobah Abbas Petersen, Manuel Fradinho Oliveira
(2018), pp. 64-71
Open Access | Times Cited: 56
Group-based privacy preservation techniques for process mining
Majid Rafiei, Wil M. P. van der Aalst
Data & Knowledge Engineering (2021) Vol. 134, pp. 101908-101908
Open Access | Times Cited: 39
Majid Rafiei, Wil M. P. van der Aalst
Data & Knowledge Engineering (2021) Vol. 134, pp. 101908-101908
Open Access | Times Cited: 39
Federated conformance checking
Majid Rafiei, Mahsa Pourbafrani, Wil M. P. van der Aalst
Information Systems (2025), pp. 102525-102525
Open Access
Majid Rafiei, Mahsa Pourbafrani, Wil M. P. van der Aalst
Information Systems (2025), pp. 102525-102525
Open Access
Refinement-Based Hierarchical Modeling and Correctness Verification of Cross-Organization Collaborative Emergency Response Processes
Hua Duan, Cong Liu, Qingtian Zeng, et al.
IEEE Transactions on Systems Man and Cybernetics Systems (2018) Vol. 50, Iss. 8, pp. 2845-2859
Closed Access | Times Cited: 41
Hua Duan, Cong Liu, Qingtian Zeng, et al.
IEEE Transactions on Systems Man and Cybernetics Systems (2018) Vol. 50, Iss. 8, pp. 2845-2859
Closed Access | Times Cited: 41
Secure Multi-party Computation for Inter-organizational Process Mining
Gamal Elkoumy, Stephan A. Fahrenkrog-Petersen, Marlon Dumas, et al.
Lecture notes in business information processing (2020), pp. 166-181
Open Access | Times Cited: 36
Gamal Elkoumy, Stephan A. Fahrenkrog-Petersen, Marlon Dumas, et al.
Lecture notes in business information processing (2020), pp. 166-181
Open Access | Times Cited: 36
Scalable Discovery of Hybrid Process Models in a Cloud Computing Environment
Long Cheng, Boudewijn F. van Dongen, Wil M. P. van der Aalst
IEEE Transactions on Services Computing (2019) Vol. 13, Iss. 2, pp. 368-380
Open Access | Times Cited: 35
Long Cheng, Boudewijn F. van Dongen, Wil M. P. van der Aalst
IEEE Transactions on Services Computing (2019) Vol. 13, Iss. 2, pp. 368-380
Open Access | Times Cited: 35
Resource Conflict Checking and Resolution Controller Design for Cross-Organization Emergency Response Processes
Qingtian Zeng, Cong Liu, Hua Duan, et al.
IEEE Transactions on Systems Man and Cybernetics Systems (2019) Vol. 50, Iss. 10, pp. 3685-3700
Closed Access | Times Cited: 35
Qingtian Zeng, Cong Liu, Hua Duan, et al.
IEEE Transactions on Systems Man and Cybernetics Systems (2019) Vol. 50, Iss. 10, pp. 3685-3700
Closed Access | Times Cited: 35
Privacy-Preserving Behavioral Correctness Verification of Cross-Organizational Workflow With Task Synchronization Patterns
Cong Liu, Qingtian Zeng, Long Cheng, et al.
IEEE Transactions on Automation Science and Engineering (2020) Vol. 18, Iss. 3, pp. 1037-1048
Open Access | Times Cited: 35
Cong Liu, Qingtian Zeng, Long Cheng, et al.
IEEE Transactions on Automation Science and Engineering (2020) Vol. 18, Iss. 3, pp. 1037-1048
Open Access | Times Cited: 35
Measuring Similarity for Data-Aware Business Processes
Cong Liu, Qingtian Zeng, Long Cheng, et al.
IEEE Transactions on Automation Science and Engineering (2021) Vol. 19, Iss. 2, pp. 1070-1082
Closed Access | Times Cited: 28
Cong Liu, Qingtian Zeng, Long Cheng, et al.
IEEE Transactions on Automation Science and Engineering (2021) Vol. 19, Iss. 2, pp. 1070-1082
Closed Access | Times Cited: 28
Towards Privacy-Preserving Process Mining in Healthcare
Anastasiia Pika, Moe Thandar Wynn, Stephanus Budiono, et al.
Lecture notes in business information processing (2019), pp. 483-495
Closed Access | Times Cited: 30
Anastasiia Pika, Moe Thandar Wynn, Stephanus Budiono, et al.
Lecture notes in business information processing (2019), pp. 483-495
Closed Access | Times Cited: 30
PRIPEL: Privacy-Preserving Event Log Publishing Including Contextual Information
Stephan A. Fahrenkrog-Petersen, Han van der Aa, Matthias Weidlich
Lecture notes in computer science (2020), pp. 111-128
Closed Access | Times Cited: 28
Stephan A. Fahrenkrog-Petersen, Han van der Aa, Matthias Weidlich
Lecture notes in computer science (2020), pp. 111-128
Closed Access | Times Cited: 28
A uniformization-based approach to preserve individuals’ privacy during process mining analyses
Edgar Batista, Agustí Solanas
Peer-to-Peer Networking and Applications (2021) Vol. 14, Iss. 3, pp. 1500-1519
Closed Access | Times Cited: 23
Edgar Batista, Agustí Solanas
Peer-to-Peer Networking and Applications (2021) Vol. 14, Iss. 3, pp. 1500-1519
Closed Access | Times Cited: 23
A Framework for Risk Management in Small Medium Enterprises in Developing Countries
Zodwa Z. F. Mthiyane, Huibrecht Margaretha van der Poll, Makgopa Tshehla
Risks (2022) Vol. 10, Iss. 9, pp. 173-173
Open Access | Times Cited: 16
Zodwa Z. F. Mthiyane, Huibrecht Margaretha van der Poll, Makgopa Tshehla
Risks (2022) Vol. 10, Iss. 9, pp. 173-173
Open Access | Times Cited: 16
Automated trusted collaborative processes through blockchain & IoT integration: The fraud detection case
Ángel Jesús Varela‐Vaca, Rafael M. Gasca, David Iglesias, et al.
Internet of Things (2024) Vol. 25, pp. 101106-101106
Open Access | Times Cited: 3
Ángel Jesús Varela‐Vaca, Rafael M. Gasca, David Iglesias, et al.
Internet of Things (2024) Vol. 25, pp. 101106-101106
Open Access | Times Cited: 3
User-Centered and Privacy-Driven Process Mining System Design for IoT
Judith Michael, Agnes Koschmider, Felix Mannhardt, et al.
Lecture notes in business information processing (2019), pp. 194-206
Closed Access | Times Cited: 26
Judith Michael, Agnes Koschmider, Felix Mannhardt, et al.
Lecture notes in business information processing (2019), pp. 194-206
Closed Access | Times Cited: 26
Petri Net Based Data-Flow Error Detection and Correction Strategy for Business Processes
Cong Liu, Qingtian Zeng, Hua Duan, et al.
IEEE Access (2020) Vol. 8, pp. 43265-43276
Open Access | Times Cited: 26
Cong Liu, Qingtian Zeng, Hua Duan, et al.
IEEE Access (2020) Vol. 8, pp. 43265-43276
Open Access | Times Cited: 26
Sampling business process event logs using graph‐based ranking model
Cong Liu, Yulong Pei, Long Cheng, et al.
Concurrency and Computation Practice and Experience (2020) Vol. 33, Iss. 5
Closed Access | Times Cited: 24
Cong Liu, Yulong Pei, Long Cheng, et al.
Concurrency and Computation Practice and Experience (2020) Vol. 33, Iss. 5
Closed Access | Times Cited: 24
Automatic Discovery of Behavioral Models From Software Execution Data
Cong Liu
IEEE Transactions on Automation Science and Engineering (2018) Vol. 15, Iss. 4, pp. 1897-1908
Closed Access | Times Cited: 26
Cong Liu
IEEE Transactions on Automation Science and Engineering (2018) Vol. 15, Iss. 4, pp. 1897-1908
Closed Access | Times Cited: 26
Privacy-Preserving Data Publishing in Process Mining
Majid Rafiei, Wil M. P. van der Aalst
Lecture notes in business information processing (2020), pp. 122-138
Open Access | Times Cited: 23
Majid Rafiei, Wil M. P. van der Aalst
Lecture notes in business information processing (2020), pp. 122-138
Open Access | Times Cited: 23
Strategies to Automatically Derive a Process Model from a Configurable Process Model Based on Event Data
Mauricio Arriagada-Benítez, Marcos Sepúlveda, Jorge Muñoz-Gama, et al.
Applied Sciences (2017) Vol. 7, Iss. 10, pp. 1023-1023
Open Access | Times Cited: 22
Mauricio Arriagada-Benítez, Marcos Sepúlveda, Jorge Muñoz-Gama, et al.
Applied Sciences (2017) Vol. 7, Iss. 10, pp. 1023-1023
Open Access | Times Cited: 22
Top-Down Process Mining From Multi-Source Running Logs Based on Refinement of Petri Nets
Qingtian Zeng, Hua Duan, Cong Liu
IEEE Access (2020) Vol. 8, pp. 61355-61369
Open Access | Times Cited: 20
Qingtian Zeng, Hua Duan, Cong Liu
IEEE Access (2020) Vol. 8, pp. 61355-61369
Open Access | Times Cited: 20
LogRank: An Approach to Sample Business Process Event Log for Efficient Discovery
Cong Liu, Yulong Pei, Qingtian Zeng, et al.
Lecture notes in computer science (2018), pp. 415-425
Closed Access | Times Cited: 19
Cong Liu, Yulong Pei, Qingtian Zeng, et al.
Lecture notes in computer science (2018), pp. 415-425
Closed Access | Times Cited: 19