OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions
Marwan Omar, Soohyeon Choi, DaeHun Nyang, et al.
IEEE Access (2022) Vol. 10, pp. 86038-86056
Open Access | Times Cited: 61

Showing 26-50 of 61 citing articles:

Integrating Syntactic and Semantic Knowledge in AMR Parsing with Heterogeneous Graph Attention Network
Yikemaiti Sataer, Chuanqi Shi, Miao Gao, et al.
ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2023), pp. 1-5
Closed Access | Times Cited: 6

A Systematic Survey of Multilingual Speech Transcription and Translation
Vaibhav Ravindra, K N Dheeraj, Prof. Vinay Raj
International Journal of Advanced Research in Science Communication and Technology (2024), pp. 517-523
Open Access | Times Cited: 1

Beyond Traditional Learning
Rebet Jones
Advances in medical technologies and clinical practice book series (2024), pp. 208-228
Closed Access | Times Cited: 1

Harnessing AI for Next-Generation Service Marketing
S. C. Vetrivel, V. P. Arun, T. P. Saravanan, et al.
Advances in marketing, customer relationship management, and e-services book series (2024), pp. 265-298
Closed Access | Times Cited: 1

Strongly Concealed Adversarial Attack against Text Classification Models with Limited Queries
Yao Cheng, Senlin Luo, Yunwei Wan, et al.
Neural Networks (2024) Vol. 183, pp. 106971-106971
Closed Access | Times Cited: 1

Digital Forensic Data Mining and Pattern Recognition
Luay Albtosh
Advances in information security, privacy, and ethics book series (2024), pp. 245-294
Closed Access | Times Cited: 1

Attention Mechanism-Based Bidirectional Long Short-Term Memory for Cycling Activity Recognition Using Smartphones
Van Sy Nguyen, Hyun-Seok Kim, Dongjun Suh
IEEE Access (2023) Vol. 11, pp. 136206-136218
Open Access | Times Cited: 4

Advancing Medical Assistance: Developing an Effective Hungarian-Language Medical Chatbot with Artificial Intelligence
Barbara Simón, Ádám Hartvég, Lehel Dénes-Fazakas, et al.
Information (2024) Vol. 15, Iss. 6, pp. 297-297
Open Access | Times Cited: 1

Enhancing IoT Security
Rebet Jones
Advances in information security, privacy, and ethics book series (2024), pp. 56-71
Closed Access | Times Cited: 1

Combatting Deepfakes
Ngozi Tracy Aleke
Advances in information security, privacy, and ethics book series (2024), pp. 375-412
Closed Access | Times Cited: 1

Measuring the Impact of Global Health Emergencies on Self-Disclosure Using Language Models
Bianca Montes Jones, Marwan Omar
(2023), pp. 1806-1810
Closed Access | Times Cited: 3

Studying the Effects of Social Media Content on Kids' Safety and Well-being
Bianca Montes Jones, Marwan Omar
(2023), pp. 1876-1879
Closed Access | Times Cited: 3

Detection of Twitter Spam with Language Models: A Case Study on How to Use BERT to Protect Children from Spam on Twitter
Bianca Montes Jones, Marwan Omar
(2023), pp. 511-516
Closed Access | Times Cited: 3

Semantic Positioning Model Incorporating BERT/RoBERTa and Fuzzy Theory Achieves More Nuanced Japanese Adverb Clustering
Eric Odle, Yun-Ju Hsueh, Pei‐Chun Lin
Electronics (2023) Vol. 12, Iss. 19, pp. 4185-4185
Open Access | Times Cited: 2

Advances in Cybersecurity and AI: Integrating Machine Learning, IoT, and Smart Systems for Resilience and Innovation Across Domains
Yara Shamoo
World Journal of Advanced Research and Reviews (2024) Vol. 23, Iss. 2, pp. 2450-2461
Open Access

Improving mobile security: A study on android malware detection using LOF
Luay Albtosh, Marwan Omar
International Journal of Mathematics and Computer in Engineering (2024)
Closed Access

Comparative Analysis of LLMs vs. Traditional Methods in Vulnerability Detection
Yara Shamoo
Advances in information security, privacy, and ethics book series (2024), pp. 335-374
Closed Access

Performance Evaluation of LLM-Based Security Systems
Yara Shamoo
Advances in information security, privacy, and ethics book series (2024), pp. 131-166
Closed Access

Ethical Considerations in the Use of LLMs for Vulnerability Detection
Luay Albtosh
Advances in information security, privacy, and ethics book series (2024), pp. 263-294
Closed Access

Challenges and Limitations of Using LLMs in Software Security
Luay Albtosh
Advances in information security, privacy, and ethics book series (2024), pp. 439-464
Closed Access

Techniques and Approaches for Leveraging LLMs in Security Analysis
Rebet Jones
Advances in information security, privacy, and ethics book series (2024), pp. 75-104
Closed Access

Robustness of models addressing Information Disorder: A comprehensive review and benchmarking study
Giuseppe Fenza, Vincenzo Loia, Claudio Stanzione, et al.
Neurocomputing (2024) Vol. 596, pp. 127951-127951
Closed Access

Multilingual Speech Transcription and Translation System
K N Dheeraj, Vaibhav Ravindra, P. Ananth Raj
International Journal of Advanced Research in Science Communication and Technology (2024), pp. 378-394
Open Access

Innovative Approaches to Market Segmentation Using AI in Emerging Economies
S. C. Vetrivel, T. P. Saravanan, V. P. Arun, et al.
Advances in marketing, customer relationship management, and e-services book series (2024), pp. 343-374
Closed Access

Source Code Analysis With Deep Neural Networks
Rebet Jones
Advances in information security, privacy, and ethics book series (2024), pp. 355-378
Closed Access

Scroll to top