
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Privacy-Preserving Data Publishing
Bee-Chung Chen, Daniel Kifer, Kristen LeFevre, et al.
(2009)
Closed Access | Times Cited: 137
Bee-Chung Chen, Daniel Kifer, Kristen LeFevre, et al.
(2009)
Closed Access | Times Cited: 137
Showing 1-25 of 137 citing articles:
Differentially Private Spatial Decompositions
Graham Cormode, Cecilia M. Procopiuc, Divesh Srivastava, et al.
(2012)
Open Access | Times Cited: 397
Graham Cormode, Cecilia M. Procopiuc, Divesh Srivastava, et al.
(2012)
Open Access | Times Cited: 397
A rigorous and customizable framework for privacy
Daniel Kifer, Ashwin Machanavajjhala
(2012)
Open Access | Times Cited: 159
Daniel Kifer, Ashwin Machanavajjhala
(2012)
Open Access | Times Cited: 159
Human-centric sensing
Mani Srivastava, Tarek Abdelzaher, Bolesław K. Szymański
Philosophical Transactions of the Royal Society A Mathematical Physical and Engineering Sciences (2011) Vol. 370, Iss. 1958, pp. 176-197
Open Access | Times Cited: 155
Mani Srivastava, Tarek Abdelzaher, Bolesław K. Szymański
Philosophical Transactions of the Royal Society A Mathematical Physical and Engineering Sciences (2011) Vol. 370, Iss. 1958, pp. 176-197
Open Access | Times Cited: 155
Context-Aware Generative Adversarial Privacy
Chong Huang, Peter Kairouz, Xiao Chen, et al.
Entropy (2017) Vol. 19, Iss. 12, pp. 656-656
Open Access | Times Cited: 149
Chong Huang, Peter Kairouz, Xiao Chen, et al.
Entropy (2017) Vol. 19, Iss. 12, pp. 656-656
Open Access | Times Cited: 149
Blowfish privacy: tuning privacy-utility trade-offs using policies
Xi He, Ashwin Machanavajjhala, Bolin Ding
arXiv (Cornell University) (2014), pp. 1447-1458
Open Access | Times Cited: 109
Xi He, Ashwin Machanavajjhala, Bolin Ding
arXiv (Cornell University) (2014), pp. 1447-1458
Open Access | Times Cited: 109
Privacy in Social Networks: A Survey
Elena Zheleva, Lise Getoor
Springer eBooks (2011), pp. 277-306
Closed Access | Times Cited: 108
Elena Zheleva, Lise Getoor
Springer eBooks (2011), pp. 277-306
Closed Access | Times Cited: 108
Towards an axiomatization of statistical privacy and utility
Daniel Kifer, Bing-Rong Lin
(2010)
Closed Access | Times Cited: 104
Daniel Kifer, Bing-Rong Lin
(2010)
Closed Access | Times Cited: 104
Differentially private summaries for sparse data
Graham Cormode, Cecilia M. Procopiuc, Divesh Srivastava, et al.
(2012)
Closed Access | Times Cited: 104
Graham Cormode, Cecilia M. Procopiuc, Divesh Srivastava, et al.
(2012)
Closed Access | Times Cited: 104
Towards Privacy for Social Networks: A Zero-Knowledge Based Definition of Privacy
Johannes Gehrke, Edward Lui, Rafael Pass
Lecture notes in computer science (2011), pp. 432-449
Open Access | Times Cited: 102
Johannes Gehrke, Edward Lui, Rafael Pass
Lecture notes in computer science (2011), pp. 432-449
Open Access | Times Cited: 102
From social data mining to forecasting socio-economic crises
Dirk Helbing, Stefano Balietti
The European Physical Journal Special Topics (2011) Vol. 195, Iss. 1
Open Access | Times Cited: 93
Dirk Helbing, Stefano Balietti
The European Physical Journal Special Topics (2011) Vol. 195, Iss. 1
Open Access | Times Cited: 93
New order preserving encryption model for outsourced databases in cloud environments
Zheli Liu, Xiaofeng Chen, Jun Yang, et al.
Journal of Network and Computer Applications (2014) Vol. 59, pp. 198-207
Closed Access | Times Cited: 90
Zheli Liu, Xiaofeng Chen, Jun Yang, et al.
Journal of Network and Computer Applications (2014) Vol. 59, pp. 198-207
Closed Access | Times Cited: 90
Privacy-aware personalization for mobile advertising
Michaela Hardt, Suman Nath
Proceedings of the ACM Conference on Computer and Communications Security (2012), pp. 662-673
Closed Access | Times Cited: 85
Michaela Hardt, Suman Nath
Proceedings of the ACM Conference on Computer and Communications Security (2012), pp. 662-673
Closed Access | Times Cited: 85
Crowd-Blending Privacy
Johannes Gehrke, Michael Hay, Edward Lui, et al.
Lecture notes in computer science (2012), pp. 479-496
Open Access | Times Cited: 75
Johannes Gehrke, Michael Hay, Edward Lui, et al.
Lecture notes in computer science (2012), pp. 479-496
Open Access | Times Cited: 75
Privacy-aware regression modeling of participatory sensing data
Hossein Ahmadi, Nam Pham, Raghu Ganti, et al.
(2010), pp. 99-112
Closed Access | Times Cited: 68
Hossein Ahmadi, Nam Pham, Raghu Ganti, et al.
(2010), pp. 99-112
Closed Access | Times Cited: 68
A survey of privacy in multi-agent systems
José M. Such, Agustín Espinosa, Ana García‐Fornes
The Knowledge Engineering Review (2013) Vol. 29, Iss. 3, pp. 314-344
Open Access | Times Cited: 68
José M. Such, Agustín Espinosa, Ana García‐Fornes
The Knowledge Engineering Review (2013) Vol. 29, Iss. 3, pp. 314-344
Open Access | Times Cited: 68
Anonymization of Longitudinal Electronic Medical Records
Acar Tamersoy, Grigorios Loukides, Mehmet Ercan Nergiz, et al.
IEEE Transactions on Information Technology in Biomedicine (2012) Vol. 16, Iss. 3, pp. 413-423
Open Access | Times Cited: 67
Acar Tamersoy, Grigorios Loukides, Mehmet Ercan Nergiz, et al.
IEEE Transactions on Information Technology in Biomedicine (2012) Vol. 16, Iss. 3, pp. 413-423
Open Access | Times Cited: 67
An Axiomatic View of Statistical Privacy and Utility
Daniel Kifer, Bing-Rong Lin
Journal of Privacy and Confidentiality (2012) Vol. 4, Iss. 1
Open Access | Times Cited: 61
Daniel Kifer, Bing-Rong Lin
Journal of Privacy and Confidentiality (2012) Vol. 4, Iss. 1
Open Access | Times Cited: 61
A theory of pricing private data
Chao Li, Daniel Yang Li, Gerome Miklau, et al.
Communications of the ACM (2017) Vol. 60, Iss. 12, pp. 79-86
Closed Access | Times Cited: 51
Chao Li, Daniel Yang Li, Gerome Miklau, et al.
Communications of the ACM (2017) Vol. 60, Iss. 12, pp. 79-86
Closed Access | Times Cited: 51
SynTEG: a framework for temporal structured electronic health data simulation
Ziqi Zhang, Chao Yan, Thomas A. Lasko, et al.
Journal of the American Medical Informatics Association (2020) Vol. 28, Iss. 3, pp. 596-604
Open Access | Times Cited: 45
Ziqi Zhang, Chao Yan, Thomas A. Lasko, et al.
Journal of the American Medical Informatics Association (2020) Vol. 28, Iss. 3, pp. 596-604
Open Access | Times Cited: 45
Challenges and Open Problems of Legal Document Anonymization
Gergely Márk Csányi, Dániel Nagy, Renátó Vági, et al.
Symmetry (2021) Vol. 13, Iss. 8, pp. 1490-1490
Open Access | Times Cited: 33
Gergely Márk Csányi, Dániel Nagy, Renátó Vági, et al.
Symmetry (2021) Vol. 13, Iss. 8, pp. 1490-1490
Open Access | Times Cited: 33
Data Leak Prevention through Named Entity Recognition
Jose Maria Gomez-Hidalgo, Jose Miguel Martin-Abreu, Javier Nieves, et al.
(2010)
Closed Access | Times Cited: 56
Jose Maria Gomez-Hidalgo, Jose Miguel Martin-Abreu, Javier Nieves, et al.
(2010)
Closed Access | Times Cited: 56
Privacy-preserving heterogeneous health data sharing
Noman Mohammed, Xiaoqian Jiang, Rui Chen, et al.
Journal of the American Medical Informatics Association (2012) Vol. 20, Iss. 3, pp. 462-469
Open Access | Times Cited: 52
Noman Mohammed, Xiaoqian Jiang, Rui Chen, et al.
Journal of the American Medical Informatics Association (2012) Vol. 20, Iss. 3, pp. 462-469
Open Access | Times Cited: 52
Authenticating Aggregate Queries over Set-Valued Data with Confidentiality
Cheng Xu, Qian Chen, Haibo Hu, et al.
IEEE Transactions on Knowledge and Data Engineering (2017) Vol. 30, Iss. 4, pp. 630-644
Open Access | Times Cited: 46
Cheng Xu, Qian Chen, Haibo Hu, et al.
IEEE Transactions on Knowledge and Data Engineering (2017) Vol. 30, Iss. 4, pp. 630-644
Open Access | Times Cited: 46
An innovative privacy preserving technique for incremental datasets on cloud computing
Yousra Abdul Alsahib S. Aldeen, Mazleena Salleh, Yazan Aljeroudi
Journal of Biomedical Informatics (2016) Vol. 62, pp. 107-116
Open Access | Times Cited: 41
Yousra Abdul Alsahib S. Aldeen, Mazleena Salleh, Yazan Aljeroudi
Journal of Biomedical Informatics (2016) Vol. 62, pp. 107-116
Open Access | Times Cited: 41