OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Online social networks security and privacy: comprehensive review and analysis
Ankit Kumar Jain, Somya Ranjan Sahoo, Jyoti Kaubiyal
Complex & Intelligent Systems (2021) Vol. 7, Iss. 5, pp. 2157-2177
Open Access | Times Cited: 165

Showing 26-50 of 165 citing articles:

Survey on Security Models Employed in Blockchain Based Applications
Lochana Mahajan, Sridaran Rajagopal, Rujuta Shah
Communications in computer and information science (2025), pp. 3-25
Closed Access

Privacy preservation of Internet of Things–integrated social networks: a survey and future challenges
Sara Salim, Nour Moustafa, Benjamin Turnbull
International Journal of Web Information Systems (2025)
Closed Access

Awareness of the Right to Be Forgotten Among Users of Professional Social Media Platforms: A Sample from the Arab Region
Laroussi Chemlali, Leila Benseddik
Studies in systems, decision and control (2025), pp. 575-585
Closed Access

Critical Review of Different Approaches of Multiparty Privacy Protection Methods and Effectiveness on Social Media
P. Jayaprabha, K. Paulose Jacob
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 4
Closed Access

Raising Awareness of Location Information Vulnerabilities in Social Media Photos using LLMs
Y.Q. Ma, Shiquan Zhang, Dongju Yang, et al.
(2025), pp. 1-14
Closed Access

Economic espionage via fake social media profiles in the UK: professional workers awareness and resilience
Mark Button, David Shepherd, Jeyong Jung
Security Journal (2025) Vol. 38, Iss. 1
Open Access

Managing Privacy and Security in Research
Andi Asrifan, Supaprawat Siripipatthanakul, Mohammed H. Al Aqad, et al.
IGI Global eBooks (2025), pp. 151-182
Closed Access

A comprehensive survey on online social networks security and privacy issues: Threats, machine learning‐based solutions, and open challenges
Munmun Bhattacharya, Sandip Roy, Samiran Chattopadhyay, et al.
Security and Privacy (2022) Vol. 6, Iss. 1
Closed Access | Times Cited: 16

Social media-based interventions for adults with obesity and overweight: a meta-analysis and meta-regression
Yue Lun Loh, Qin Ping Yaw, Ying Lau
International Journal of Obesity (2023) Vol. 47, Iss. 7, pp. 606-621
Open Access | Times Cited: 10

Validation of cyber security behaviour among adolescents at Malaysia university: Revisiting gender as a role
Ting Tin Tin, Kar Man Cheah, Jie Xin Khiew, et al.
International Journal of Innovative Research and Scientific Studies (2024) Vol. 7, Iss. 1, pp. 127-137
Open Access | Times Cited: 3

Comparative Analysis of Blockchain Platforms for Security Enhancement in Online Social Networks
Susan Mohammed, Nabeel H. Al-A’araji, Ahmed A. Al-Saleh
Ingénierie des systèmes d information (2024) Vol. 29, Iss. 1, pp. 19-25
Open Access | Times Cited: 3

Artificial intelligence-based approach to detect malicious users using deep learning and optimization techniques
Sailaja Terumalasetti, S R Reeja
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 3

CNFRD: A Few-Shot Rumor Detection Framework via Capsule Network for COVID-19
Danroujing Chen, Xiaoliang Chen, Peng Lu, et al.
International Journal of Intelligent Systems (2023) Vol. 2023, pp. 1-21
Open Access | Times Cited: 8

A Comprehensive Analysis of Privacy-Preserving Solutions Developed for Online Social Networks
Abdul Majeed, Safiullah Khan, Seong Oun Hwang
Electronics (2022) Vol. 11, Iss. 13, pp. 1931-1931
Open Access | Times Cited: 13

Enhanced Clustering Based OSN Privacy Preservation to Ensure k-Anonymity, t-Closeness, l-Diversity, and Balanced Privacy Utility
Rupali Gangarde, Amit Sharma, Ambika Pawar
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 75, Iss. 1, pp. 2171-2190
Open Access | Times Cited: 7

Text Sentiment Analysis Based on Multi-Layer Bi-Directional LSTM with a Trapezoidal Structure
Zhengfang He
Intelligent Automation & Soft Computing (2023) Vol. 37, Iss. 1, pp. 639-654
Open Access | Times Cited: 7

Comprehensive review on Parenting and Technology: Opportunities and Challenges in the 21st Century
Ibrahim Kurt
European Journal of Social Sciences Education and Research (2023) Vol. 10, Iss. 2, pp. 1-14
Open Access | Times Cited: 7

Privacy protection scheme for mobile social network
Seyyed Mohammad Safi, Ali Movaghar, Ghorbani Mohammad
Journal of King Saud University - Computer and Information Sciences (2022) Vol. 34, Iss. 7, pp. 4062-4074
Open Access | Times Cited: 11

A Systematic Mapping Study on Social Network Privacy: Threats and Solutions
Andrey Rodrigues, Maria Lúcia Bento Villela, Eduardo Feitosa
ACM Computing Surveys (2024) Vol. 56, Iss. 7, pp. 1-29
Closed Access | Times Cited: 2

Distributed privacy preservation for online social network using flexible clustering and whale optimization algorithm
Nilesh Uke, Sharayu Lokhande, Preeti Kale, et al.
Cluster Computing (2024) Vol. 27, Iss. 5, pp. 5995-6012
Closed Access | Times Cited: 2

Social Media Forensics: An Adaptive Cyberbullying-Related Hate Speech Detection Approach Based on Neural Networks With Uncertainty
Yasmine M. Ibrahim, Reem Essameldin, Saad M. Saad
IEEE Access (2024) Vol. 12, pp. 59474-59484
Open Access | Times Cited: 2

Proactive Threat Hunting in Critical Infrastructure Protection through Hybrid Machine Learning Algorithm Application
Shan Ali, Seunghwan Myeong
Sensors (2024) Vol. 24, Iss. 15, pp. 4888-4888
Open Access | Times Cited: 2

Scroll to top