OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Effective Social Graph Deanonymization Based on Graph Structure and Descriptive Information
Hao Fu, Aston Zhang, Xing Xie
ACM Transactions on Intelligent Systems and Technology (2015) Vol. 6, Iss. 4, pp. 1-29
Closed Access | Times Cited: 40

Showing 1-25 of 40 citing articles:

Structure Based User Identification across Social Networks
Xiaoping Zhou, Xun Liang, Xiaoyong Du, et al.
IEEE Transactions on Knowledge and Data Engineering (2017) Vol. 30, Iss. 6, pp. 1178-1191
Closed Access | Times Cited: 127

A Survey on Privacy in Social Media
Ghazaleh Beigi, Huan Liu
ACM/IMS Transactions on Data Science (2020) Vol. 1, Iss. 1, pp. 1-38
Open Access | Times Cited: 76

Privacy Leakage via De-Anonymization and Aggregation in Heterogeneous Social Networks
Huaxin Li, Qingrong Chen, Haojin Zhu, et al.
IEEE Transactions on Dependable and Secure Computing (2017) Vol. 17, Iss. 2, pp. 350-362
Closed Access | Times Cited: 69

A Survey of Mobile Social Networks: Applications, Social Characteristics, and Challenges
Tie Qiu, Baochao Chen, Arun Kumar Sangaiah, et al.
IEEE Systems Journal (2017) Vol. 12, Iss. 4, pp. 3932-3947
Closed Access | Times Cited: 36

Fast De-anonymization of Social Networks with Structural Information
Yingxia Shao, Jialin Liu, Shuyang Shi, et al.
Data Science and Engineering (2019) Vol. 4, Iss. 1, pp. 76-92
Open Access | Times Cited: 35

Discontinued Privacy: Personal Data Leaks in Apple Bluetooth-Low-Energy Continuity Protocols
Guillaume Celosia, Mathieu Cunche
Proceedings on Privacy Enhancing Technologies (2020) Vol. 2020, Iss. 1, pp. 26-46
Open Access | Times Cited: 28

SoK: Managing risks of linkage attacks on data privacy
Jovan Powar, Alastair R. Beresford
Proceedings on Privacy Enhancing Technologies (2023) Vol. 2023, Iss. 2, pp. 97-116
Open Access | Times Cited: 10

Network alignment
Rui Tang, Ziyun Yong, Shuyu Jiang, et al.
Physics Reports (2024) Vol. 1107, pp. 1-45
Closed Access | Times Cited: 3

Securing Social Media User Data
Ghazaleh Beigi, Kai Shu, Yanchao Zhang, et al.
(2018), pp. 165-173
Closed Access | Times Cited: 28

Privacy in Social Media: Identification, Mitigation and Applications
Ghazaleh Beigi, Huan Liu
arXiv (Cornell University) (2018)
Open Access | Times Cited: 23

Network Alignment by Discrete Ollivier-Ricci Flow
Chien-Chun Ni, Yu-Yao Lin, Jie Gao, et al.
Lecture notes in computer science (2018), pp. 447-462
Open Access | Times Cited: 23

DeepEC: Adversarial attacks against graph structure prediction models
Xingping Xian, Tao Wu, Shaojie Qiao, et al.
Neurocomputing (2020) Vol. 437, pp. 168-185
Closed Access | Times Cited: 20

Towards link inference attack against network structure perturbation
Xingping Xian, Tao Wu, Yanbing Liu, et al.
Knowledge-Based Systems (2021) Vol. 218, pp. 106674-106674
Closed Access | Times Cited: 17

Security and Privacy in Social Networks: Data and Structural Anonymity
Rachna Jain, Nikita Jain, Ashish Nayyar
Springer eBooks (2019), pp. 265-293
Closed Access | Times Cited: 18

A Literature Survey and Classifications on Data Deanonymisation
Dalal Al-Azizy, David E. Millard, Iraklis Symeonidis, et al.
Lecture notes in computer science (2016), pp. 36-51
Closed Access | Times Cited: 16

Dscaler
J. W. Zhang, Y. C. Tay
Proceedings of the VLDB Endowment (2016) Vol. 9, Iss. 14, pp. 1671-1682
Closed Access | Times Cited: 16

FEUI: Fusion Embedding for User Identification across social networks
Lidong Wang, Yin Zhang⋆, Keyong Hu
Applied Intelligence (2021) Vol. 52, Iss. 7, pp. 8209-8225
Closed Access | Times Cited: 14

Factor Graph Model Based User Profile Matching Across Social Networks
Lidong Wang, Keyong Hu, Yun Zhang, et al.
IEEE Access (2019) Vol. 7, pp. 152429-152442
Open Access | Times Cited: 13

Privacy protection of medical data in social network
Jie Su, Yi Cao, Yuehui Chen, et al.
BMC Medical Informatics and Decision Making (2021) Vol. 21, Iss. S1
Open Access | Times Cited: 11

Inferring Anchor Links Based on Social Network Structure
Shuo Feng, Derong Shen, Tiezheng Nie, et al.
IEEE Access (2018) Vol. 6, pp. 17340-17353
Open Access | Times Cited: 11

Multi-View Low-Rank Coding-Based Network Data De-Anonymization
Xingping Xian, Tao Wu, Shaojie Qiao, et al.
IEEE Access (2020) Vol. 8, pp. 94575-94593
Open Access | Times Cited: 8

An unsupervised user identification algorithm using network embedding and scalable nearest neighbour
Xiaoping Zhou, Xun Liang, Jichao Zhao, et al.
Cluster Computing (2018) Vol. 22, Iss. S4, pp. 8677-8687
Closed Access | Times Cited: 7

Isomorphic Graph Embedding for Progressive Maximal Frequent Subgraph Mining
Thanh Toan Nguyen, Thành Tâm Nguyên, Thanh Hung Nguyen, et al.
ACM Transactions on Intelligent Systems and Technology (2023) Vol. 15, Iss. 1, pp. 1-26
Open Access | Times Cited: 2

P$$^2$$CG: a privacy preserving collaborative graph neural network training framework
Xupeng Miao, Wentao Zhang, Yuezihan Jiang, et al.
The VLDB Journal (2022) Vol. 32, Iss. 4, pp. 717-736
Closed Access | Times Cited: 4

ID-CONNECT: Combining Network and Call Features to Link Different Identities of a User
Muhammad Ajmal Azad, Ricardo Morla
(2015), pp. 160-167
Closed Access | Times Cited: 4

Page 1 - Next Page

Scroll to top