
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
MBeacon: Privacy-Preserving Beacons for DNA Methylation Data
Inken Hagestedt, Yang Zhang, Mathias Humbert, et al.
(2019)
Open Access | Times Cited: 44
Inken Hagestedt, Yang Zhang, Mathias Humbert, et al.
(2019)
Open Access | Times Cited: 44
Showing 1-25 of 44 citing articles:
MemGuard
Jinyuan Jia, Ahmed Salem, Michael Backes, et al.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2019)
Open Access | Times Cited: 262
Jinyuan Jia, Ahmed Salem, Michael Backes, et al.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2019)
Open Access | Times Cited: 262
Dynamic Backdoor Attacks Against Machine Learning Models
Ahmed Salem, Rui Wen, Michael Backes, et al.
(2022), pp. 703-718
Open Access | Times Cited: 140
Ahmed Salem, Rui Wen, Michael Backes, et al.
(2022), pp. 703-718
Open Access | Times Cited: 140
GAN-Leaks: A Taxonomy of Membership Inference Attacks against Generative Models
Dingfan Chen, Ning Yu, Yang Zhang, et al.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2020), pp. 343-362
Open Access | Times Cited: 88
Dingfan Chen, Ning Yu, Yang Zhang, et al.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2020), pp. 343-362
Open Access | Times Cited: 88
Towards Security Threats of Deep Learning Systems: A Survey
Yingzhe He, Guozhu Meng, Kai Chen, et al.
IEEE Transactions on Software Engineering (2020) Vol. 48, Iss. 5, pp. 1743-1770
Open Access | Times Cited: 65
Yingzhe He, Guozhu Meng, Kai Chen, et al.
IEEE Transactions on Software Engineering (2020) Vol. 48, Iss. 5, pp. 1743-1770
Open Access | Times Cited: 65
EncoderMI: Membership Inference against Pre-trained Encoders in Contrastive Learning
Hongbin Liu, Jinyuan Jia, Wenjie Qu, et al.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2021)
Open Access | Times Cited: 45
Hongbin Liu, Jinyuan Jia, Wenjie Qu, et al.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2021)
Open Access | Times Cited: 45
Defending Model Inversion and Membership Inference Attacks via Prediction Purification
Ziqi Yang, Bin Shao, Bohan Xuan, et al.
arXiv (Cornell University) (2020)
Open Access | Times Cited: 47
Ziqi Yang, Bin Shao, Bohan Xuan, et al.
arXiv (Cornell University) (2020)
Open Access | Times Cited: 47
Functional genomics data: privacy risk assessment and technological mitigation
Gamze Gürsoy, Tianxiao Li, Susanna Liu, et al.
Nature Reviews Genetics (2021) Vol. 23, Iss. 4, pp. 245-258
Closed Access | Times Cited: 40
Gamze Gürsoy, Tianxiao Li, Susanna Liu, et al.
Nature Reviews Genetics (2021) Vol. 23, Iss. 4, pp. 245-258
Closed Access | Times Cited: 40
Property Inference Attacks Against GANs
Junhao Zhou, Yufei Chen, Chao Shen, et al.
(2022)
Open Access | Times Cited: 27
Junhao Zhou, Yufei Chen, Chao Shen, et al.
(2022)
Open Access | Times Cited: 27
Stealing Links from Graph Neural Networks
Xinlei He, Jinyuan Jia, Michael Backes, et al.
arXiv (Cornell University) (2020)
Open Access | Times Cited: 36
Xinlei He, Jinyuan Jia, Michael Backes, et al.
arXiv (Cornell University) (2020)
Open Access | Times Cited: 36
DatingSec: Detecting Malicious Accounts in Dating Apps Using a Content-Based Attention Network
Xinlei He, Qingyuan Gong, Yang Chen, et al.
IEEE Transactions on Dependable and Secure Computing (2021), pp. 1-1
Open Access | Times Cited: 32
Xinlei He, Qingyuan Gong, Yang Chen, et al.
IEEE Transactions on Dependable and Secure Computing (2021), pp. 1-1
Open Access | Times Cited: 32
Genome Reconstruction Attacks Against Genomic Data-Sharing Beacons
Kerem Ayöz, Erman Ayday, A. Ercüment Çiçek
Proceedings on Privacy Enhancing Technologies (2021) Vol. 2021, Iss. 3, pp. 28-48
Open Access | Times Cited: 31
Kerem Ayöz, Erman Ayday, A. Ercüment Çiçek
Proceedings on Privacy Enhancing Technologies (2021) Vol. 2021, Iss. 3, pp. 28-48
Open Access | Times Cited: 31
When Machine Unlearning Jeopardizes Privacy
Min Chen, Zhikun Zhang, Tianhao Wang, et al.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2021), pp. 896-911
Open Access | Times Cited: 28
Min Chen, Zhikun Zhang, Tianhao Wang, et al.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2021), pp. 896-911
Open Access | Times Cited: 28
A survey on membership inference attacks and defenses in machine learning
Jun Niu, Peng Liu, Xiaoyan Zhu, et al.
Journal of Information and Intelligence (2024) Vol. 2, Iss. 5, pp. 404-454
Open Access | Times Cited: 4
Jun Niu, Peng Liu, Xiaoyan Zhu, et al.
Journal of Information and Intelligence (2024) Vol. 2, Iss. 5, pp. 404-454
Open Access | Times Cited: 4
PrivColl: Practical Privacy-Preserving Collaborative Machine Learning
Yanjun Zhang, Guangdong Bai, Xue Li, et al.
Lecture notes in computer science (2020), pp. 399-418
Closed Access | Times Cited: 29
Yanjun Zhang, Guangdong Bai, Xue Li, et al.
Lecture notes in computer science (2020), pp. 399-418
Closed Access | Times Cited: 29
Toward a Framework for Assessing Privacy Risks in Multi-Omic Research and Databases
Charles Dupras, Eline M. Bunnik
The American Journal of Bioethics (2021) Vol. 21, Iss. 12, pp. 46-64
Closed Access | Times Cited: 26
Charles Dupras, Eline M. Bunnik
The American Journal of Bioethics (2021) Vol. 21, Iss. 12, pp. 46-64
Closed Access | Times Cited: 26
Synthetic Dataset Generation for Fairer Unfairness Research
Lan Jiang, Clara Belitz, Nigel Bosch
(2024), pp. 200-209
Open Access | Times Cited: 3
Lan Jiang, Clara Belitz, Nigel Bosch
(2024), pp. 200-209
Open Access | Times Cited: 3
Language in Our Time: An Empirical Analysis of Hashtags
Yang Zhang
(2019)
Open Access | Times Cited: 25
Yang Zhang
(2019)
Open Access | Times Cited: 25
Don't Trigger Me! A Triggerless Backdoor Attack Against Deep Neural Networks
Ahmed Salem, Michael Backes, Yang Zhang
arXiv (Cornell University) (2020)
Open Access | Times Cited: 18
Ahmed Salem, Michael Backes, Yang Zhang
arXiv (Cornell University) (2020)
Open Access | Times Cited: 18
Label‐only membership inference attacks on machine unlearning without dependence of posteriors
Zhaobo Lu, Hai Liang, Minghao Zhao, et al.
International Journal of Intelligent Systems (2022) Vol. 37, Iss. 11, pp. 9424-9441
Open Access | Times Cited: 12
Zhaobo Lu, Hai Liang, Minghao Zhao, et al.
International Journal of Intelligent Systems (2022) Vol. 37, Iss. 11, pp. 9424-9441
Open Access | Times Cited: 12
Privacy Analysis of Deep Learning in the Wild: Membership Inference Attacks against Transfer Learning
Yang Zou, Zhikun Zhang, Michael Backes, et al.
arXiv (Cornell University) (2020)
Open Access | Times Cited: 17
Yang Zou, Zhikun Zhang, Michael Backes, et al.
arXiv (Cornell University) (2020)
Open Access | Times Cited: 17
Selling direct-to-consumer epigenetic tests: are we ready?
Charles Dupras, Elisabeth Beauchamp, Yann Joly
Nature Reviews Genetics (2020) Vol. 21, Iss. 6, pp. 335-336
Closed Access | Times Cited: 16
Charles Dupras, Elisabeth Beauchamp, Yann Joly
Nature Reviews Genetics (2020) Vol. 21, Iss. 6, pp. 335-336
Closed Access | Times Cited: 16
Towards Plausible Graph Anonymization
Yang Zhang, Mathias Humbert, Bartlomiej Surma, et al.
(2020)
Open Access | Times Cited: 15
Yang Zhang, Mathias Humbert, Bartlomiej Surma, et al.
(2020)
Open Access | Times Cited: 15
Knowledge Cross-Distillation for Membership Privacy
Rishav Chourasia, Batnyam Enkhtaivan, Kunihiro Ito, et al.
Proceedings on Privacy Enhancing Technologies (2022) Vol. 2022, Iss. 2, pp. 362-377
Open Access | Times Cited: 9
Rishav Chourasia, Batnyam Enkhtaivan, Kunihiro Ito, et al.
Proceedings on Privacy Enhancing Technologies (2022) Vol. 2022, Iss. 2, pp. 362-377
Open Access | Times Cited: 9
Assessing Privacy Vulnerabilities in Genetic Data Sets: Scoping Review
Mara Thomas, Nuria Mackes, Asad Preuss-Dodhy, et al.
JMIR Bioinformatics and Biotechnology (2024) Vol. 5, pp. e54332-e54332
Open Access | Times Cited: 1
Mara Thomas, Nuria Mackes, Asad Preuss-Dodhy, et al.
JMIR Bioinformatics and Biotechnology (2024) Vol. 5, pp. e54332-e54332
Open Access | Times Cited: 1
Debiasing Learning for Membership Inference Attacks Against Recommender Systems
Zihan Wang, Na Huang, Fei Sun, et al.
Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (2022), pp. 1959-1968
Open Access | Times Cited: 7
Zihan Wang, Na Huang, Fei Sun, et al.
Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (2022), pp. 1959-1968
Open Access | Times Cited: 7