
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Survey on Differential Privacy for Unstructured Data Content
Ying Zhao, Jinjun Chen
ACM Computing Surveys (2022) Vol. 54, Iss. 10s, pp. 1-28
Closed Access | Times Cited: 183
Ying Zhao, Jinjun Chen
ACM Computing Surveys (2022) Vol. 54, Iss. 10s, pp. 1-28
Closed Access | Times Cited: 183
Showing 1-25 of 183 citing articles:
A Correlation Graph based Approach for Personalized and Compatible Web APIs Recommendation in Mobile APP Development
Lianyong Qi, Wenmin Lin, Xuyun Zhang, et al.
IEEE Transactions on Knowledge and Data Engineering (2022), pp. 1-1
Closed Access | Times Cited: 134
Lianyong Qi, Wenmin Lin, Xuyun Zhang, et al.
IEEE Transactions on Knowledge and Data Engineering (2022), pp. 1-1
Closed Access | Times Cited: 134
A Comprehensive Review of Current Trends, Challenges, and Opportunities in Text Data Privacy
Sakib Shahriar, Rozita Dara, Rajen Akalu
Computers & Security (2025), pp. 104358-104358
Open Access | Times Cited: 1
Sakib Shahriar, Rozita Dara, Rajen Akalu
Computers & Security (2025), pp. 104358-104358
Open Access | Times Cited: 1
Zhiwen Wang, Junjian Huang, Junlin Huang, et al.
Concurrency and Computation Practice and Experience (2025) Vol. 37, Iss. 4-5
Closed Access | Times Cited: 1
A comprehensive review on deep learning algorithms: Security and privacy issues
Muhammad Tayyab, Mohsen Marjani, N. Z. Jhanjhi, et al.
Computers & Security (2023) Vol. 131, pp. 103297-103297
Closed Access | Times Cited: 29
Muhammad Tayyab, Mohsen Marjani, N. Z. Jhanjhi, et al.
Computers & Security (2023) Vol. 131, pp. 103297-103297
Closed Access | Times Cited: 29
Ubiquitous intelligent federated learning privacy-preserving scheme under edge computing
Dongfen Li, Jinshan Lai, Ruijin Wang, et al.
Future Generation Computer Systems (2023) Vol. 144, pp. 205-218
Closed Access | Times Cited: 24
Dongfen Li, Jinshan Lai, Ruijin Wang, et al.
Future Generation Computer Systems (2023) Vol. 144, pp. 205-218
Closed Access | Times Cited: 24
Distributed Cooperative Coevolution of Data Publishing Privacy and Transparency
Yong-Feng Ge, Elisa Bertino, Hua Wang, et al.
ACM Transactions on Knowledge Discovery from Data (2023) Vol. 18, Iss. 1, pp. 1-23
Closed Access | Times Cited: 24
Yong-Feng Ge, Elisa Bertino, Hua Wang, et al.
ACM Transactions on Knowledge Discovery from Data (2023) Vol. 18, Iss. 1, pp. 1-23
Closed Access | Times Cited: 24
A Survey on Intelligent Internet of Things: Applications, Security, Privacy, and Future Directions
Ons Aouedi, Thai-Hoc Vu, Alessio Sacco, et al.
IEEE Communications Surveys & Tutorials (2024), pp. 1-1
Open Access | Times Cited: 11
Ons Aouedi, Thai-Hoc Vu, Alessio Sacco, et al.
IEEE Communications Surveys & Tutorials (2024), pp. 1-1
Open Access | Times Cited: 11
RPIFL: Reliable and Privacy-Preserving Federated Learning for the Internet of Things
Ruijin Wang, Jinshan Lai, Xiong Li, et al.
Journal of Network and Computer Applications (2023) Vol. 221, pp. 103768-103768
Open Access | Times Cited: 16
Ruijin Wang, Jinshan Lai, Xiong Li, et al.
Journal of Network and Computer Applications (2023) Vol. 221, pp. 103768-103768
Open Access | Times Cited: 16
Privacy and Integrity Protection for IoT Multimodal Data Using Machine Learning and Blockchain
Qingzhi Liu, Yuchen Huang, Chenglu Jin, et al.
ACM Transactions on Multimedia Computing Communications and Applications (2024) Vol. 20, Iss. 6, pp. 1-18
Closed Access | Times Cited: 6
Qingzhi Liu, Yuchen Huang, Chenglu Jin, et al.
ACM Transactions on Multimedia Computing Communications and Applications (2024) Vol. 20, Iss. 6, pp. 1-18
Closed Access | Times Cited: 6
Security, privacy, and robustness for trustworthy AI systems: A review
Mozamel M. Saeed, Mohammed Alsharidah
Computers & Electrical Engineering (2024) Vol. 119, pp. 109643-109643
Closed Access | Times Cited: 5
Mozamel M. Saeed, Mohammed Alsharidah
Computers & Electrical Engineering (2024) Vol. 119, pp. 109643-109643
Closed Access | Times Cited: 5
Improved Co‐DETR With Dropkey and Its Application to Hot Work Detection
Yuting Zhang, Yangfeng Wu, Xu Huang, et al.
Concurrency and Computation Practice and Experience (2025) Vol. 37, Iss. 4-5
Closed Access
Yuting Zhang, Yangfeng Wu, Xu Huang, et al.
Concurrency and Computation Practice and Experience (2025) Vol. 37, Iss. 4-5
Closed Access
A Customised Privacy Preservation Mechanism for Cyber‐Physical Systems
Manas Kumar Yogi, A.S.N. Chakravarthy
(2025), pp. 59-90
Closed Access
Manas Kumar Yogi, A.S.N. Chakravarthy
(2025), pp. 59-90
Closed Access
Machine Learning‐Based Modeling of Clinical Diagnosis and Treatment of Patients With Hemorrhagic Stroke
Qing Wu, Tinghong Gao
Concurrency and Computation Practice and Experience (2025) Vol. 37, Iss. 6-8
Closed Access
Qing Wu, Tinghong Gao
Concurrency and Computation Practice and Experience (2025) Vol. 37, Iss. 6-8
Closed Access
Socially beneficial metaverse: Framework, technologies, applications, and challenges
Xiaolong Xu, Xuanhong Zhou, Muhammad Bilal, et al.
Computer Networks (2025), pp. 111198-111198
Closed Access
Xiaolong Xu, Xuanhong Zhou, Muhammad Bilal, et al.
Computer Networks (2025), pp. 111198-111198
Closed Access
Privacy-preserving data integration and sharing in multi-party IoT environments: An entity embedding perspective
Junyu Lu, Henry Leung, Nan Xie
Information Fusion (2024) Vol. 108, pp. 102380-102380
Closed Access | Times Cited: 4
Junyu Lu, Henry Leung, Nan Xie
Information Fusion (2024) Vol. 108, pp. 102380-102380
Closed Access | Times Cited: 4
A Framework for User Biometric Privacy Protection in UAV Delivery Systems with Edge Computing
Aiting Yao, Shantanu Pal, Chengzu Dong, et al.
2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops) (2024), pp. 631-636
Closed Access | Times Cited: 4
Aiting Yao, Shantanu Pal, Chengzu Dong, et al.
2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops) (2024), pp. 631-636
Closed Access | Times Cited: 4
An Efficient Lattice‐Based Heterogeneous Signcryption Scheme for VANETs
Jintao Jiao, Lei Guo, Wensen Yu, et al.
Concurrency and Computation Practice and Experience (2025) Vol. 37, Iss. 3
Closed Access
Jintao Jiao, Lei Guo, Wensen Yu, et al.
Concurrency and Computation Practice and Experience (2025) Vol. 37, Iss. 3
Closed Access
Recent Advances of Differential Privacy in Centralized Deep Learning: A Systematic Survey
Lea Demelius, Roman Kern, Andreas Trügler
ACM Computing Surveys (2025)
Open Access
Lea Demelius, Roman Kern, Andreas Trügler
ACM Computing Surveys (2025)
Open Access
Cascade Ownership Verification Framework Based on Invisible Watermark for Model Copyright Protection
Ruoxi Wang, Yujia Zhu, Daoxun Xia
Concurrency and Computation Practice and Experience (2025) Vol. 37, Iss. 4-5
Closed Access
Ruoxi Wang, Yujia Zhu, Daoxun Xia
Concurrency and Computation Practice and Experience (2025) Vol. 37, Iss. 4-5
Closed Access
Low‐Light Image Enhancement Algorithm Based on Improved MSRCP With Chromaticity Preservation
Weijiang Feng, Zhijin Wang, Chunmiao Wei, et al.
Concurrency and Computation Practice and Experience (2025) Vol. 37, Iss. 4-5
Closed Access
Weijiang Feng, Zhijin Wang, Chunmiao Wei, et al.
Concurrency and Computation Practice and Experience (2025) Vol. 37, Iss. 4-5
Closed Access
Advancing Continuous Sign Language Recognition Through Denoising Diffusion Transformer‐Based Spatial‐Temporal Enhancement
Suhail Muhammad Kamal, Yidong Chen, Shaozi Li
Concurrency and Computation Practice and Experience (2025) Vol. 37, Iss. 4-5
Closed Access
Suhail Muhammad Kamal, Yidong Chen, Shaozi Li
Concurrency and Computation Practice and Experience (2025) Vol. 37, Iss. 4-5
Closed Access
DBFIA: Diffusion-Based Face Image Anonymization
Hanyu Xue, Xin Yuan, Bo Liu, et al.
Lecture notes in computer science (2025), pp. 40-59
Closed Access
Hanyu Xue, Xin Yuan, Bo Liu, et al.
Lecture notes in computer science (2025), pp. 40-59
Closed Access
The DeepLabV3 + Algorithm Combined With the ResNeXt Network for Medical Image Segmentation
Yanyan Wu, Yajun Xie, Yintao Hong
Concurrency and Computation Practice and Experience (2025) Vol. 37, Iss. 4-5
Closed Access
Yanyan Wu, Yajun Xie, Yintao Hong
Concurrency and Computation Practice and Experience (2025) Vol. 37, Iss. 4-5
Closed Access
ARTransformer: An Architecture of Resolution Representation Learning for Cross‐Resolution Person Re‐Identification
Xing Lü, Fuwen Lai, Zhixiang Cao, et al.
Concurrency and Computation Practice and Experience (2025) Vol. 37, Iss. 4-5
Closed Access
Xing Lü, Fuwen Lai, Zhixiang Cao, et al.
Concurrency and Computation Practice and Experience (2025) Vol. 37, Iss. 4-5
Closed Access
Deep Autoencoder Neural Networks: A Comprehensive Review and New Perspectives
Ibomoiye Domor Mienye, Theo G. Swart
Archives of Computational Methods in Engineering (2025)
Open Access
Ibomoiye Domor Mienye, Theo G. Swart
Archives of Computational Methods in Engineering (2025)
Open Access