OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

It's who you know
Keith Henderson, Brian Gallagher, Lei Li, et al.
(2011)
Open Access | Times Cited: 219

Showing 51-75 of 219 citing articles:

MOOMIN: Deep Molecular Omics Network for Anti-Cancer Drug Combination Therapy
Benedek Rózemberczki, Anna Gogleva, Sebastian Nilsson, et al.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management (2022)
Open Access | Times Cited: 15

A link prediction-based recommendation system using transactional data
Emir Alaattin Yilmaz, Selim Balcısoy, Burçin Bozkaya
Scientific Reports (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 8

RolX: Role Extraction and Mining in Large Networks
Keith Henderson, Brian Gallagher, Tina Eliassi‐Rad, et al.
(2011)
Open Access | Times Cited: 29

LRBM: A Restricted Boltzmann Machine Based Approach for Representation Learning on Linked Data
Kang Li, Jing Gao, Suxin Guo, et al.
(2014), pp. 300-309
Closed Access | Times Cited: 28

Controllable Information Sharing for User Accounts Linkage across Multiple Online Social Networks
Yilin Shen, Hongxia Jin
(2014), pp. 381-390
Closed Access | Times Cited: 28

Individual and Collective Graph Mining: Principles, Algorithms, and Applications
Danai Koutra, Christos Faloutsos
Synthesis lectures on data mining and knowledge discovery (2017) Vol. 9, Iss. 2, pp. 1-206
Closed Access | Times Cited: 25

Spatio-temporal modeling of connectome-scale brain network interactions via time-evolving graphs
Jing Yuan, Xiang Li, Jinhe Zhang, et al.
NeuroImage (2017) Vol. 180, pp. 350-369
Open Access | Times Cited: 25

De-anonymizing Clustered Social Networks by Percolation Graph Matching
Carla Fabiana Chiasserini, Michel Garetto, Emili Leonardi
ACM Transactions on Knowledge Discovery from Data (2018) Vol. 12, Iss. 2, pp. 1-39
Open Access | Times Cited: 24

RWR-GAE: Random Walk Regularization for Graph Auto Encoders
Vaibhav, Po-Yao Huang, Robert Frederking
arXiv (Cornell University) (2019)
Open Access | Times Cited: 24

A Novel Graph-Based Descriptor for the Detection of Billing-Related Anomalies in Cellular Mobile Networks
Stavros Papadopoulos, Anastasios Drosou, Dimitrios Tzovaras
IEEE Transactions on Mobile Computing (2016) Vol. 15, Iss. 11, pp. 2655-2668
Closed Access | Times Cited: 23

Efficient Representation Learning Using Random Walks for Dynamic Graphs
Hooman Peiro Sajjad, Andrew Docherty, Yuriy Tyshetskiy
arXiv (Cornell University) (2019)
Open Access | Times Cited: 23

struc2gauss: Structural role preserving network embedding via Gaussian embedding
Yulong Pei, Xin Du, Jianpeng Zhang, et al.
Data Mining and Knowledge Discovery (2020) Vol. 34, Iss. 4, pp. 1072-1103
Open Access | Times Cited: 23

Combining Label Propagation and Simple Models out-performs Graph Neural Networks
Qian Huang, Horace He, Abhay Pratap Singh, et al.
arXiv (Cornell University) (2021)
Closed Access | Times Cited: 20

BinarizedAttack: Structural Poisoning Attacks to Graph-based Anomaly Detection
Yulin Zhu, Yuni Lai, Kaifa Zhao, et al.
2022 IEEE 38th International Conference on Data Engineering (ICDE) (2022), pp. 14-26
Open Access | Times Cited: 13

Panther: Fast Top-k Similarity Search in Large Networks
Jing Zhang, Jie Tang, Cong Ma, et al.
arXiv (Cornell University) (2015)
Open Access | Times Cited: 24

Spatial compactness meets topical consistency
Mrinmaya Sachan, Avinava Dubey, S. Srivastava, et al.
(2014), pp. 503-512
Closed Access | Times Cited: 23

Fast and Flexible Top- k Similarity Search on Large Networks
Jing Zhang, Jie Tang, Cong Ma, et al.
ACM transactions on office information systems (2017) Vol. 36, Iss. 2, pp. 1-30
Closed Access | Times Cited: 22

Change point detection in social networks—Critical review with experiments
Lucy Kendrick, Katarzyna Musiał, Bogdan Gabryś
Computer Science Review (2018) Vol. 29, pp. 1-13
Open Access | Times Cited: 21

Simultaneous detection of communities and roles from large networks
Yiye Ruan, Srinivasan Parthasarathy
(2014), pp. 203-214
Closed Access | Times Cited: 20

Multi-Net: A Scalable Multiplex Network Embedding Framework
Arunkumar Bagavathi, Siddharth Krishnan
Studies in computational intelligence (2018), pp. 119-131
Open Access | Times Cited: 20

Predicting User Roles in Social Networks Using Transfer Learning with Feature Transformation
Jun Sun, Jérôme Kunegis, Steffen Staab
(2016), pp. 128-135
Open Access | Times Cited: 19

Role Discovery in Graphs Using Global Features: Algorithms, Applications and a Novel Evaluation Strategy
Pratik Vinay Gupte, Balaraman Ravindran, Srinivasan Parthasarathy
(2017), pp. 771-782
Closed Access | Times Cited: 19

Role-Oriented Graph Auto-encoder Guided by Structural Information
Xuan Guo, Wang Zhang, Wenjun Wang, et al.
Lecture notes in computer science (2020), pp. 466-481
Closed Access | Times Cited: 17

AP2Vec: An Unsupervised Approach for BGP Hijacking Detection
Tal Shapira, Yuval Shavitt
IEEE Transactions on Network and Service Management (2022) Vol. 19, Iss. 3, pp. 2255-2268
Closed Access | Times Cited: 10

Connecting personal-scale sensing and networked community behavior to infer human activities
Nicholas D. Lane, Peng‐Yu Li, Lin Zhou, et al.
(2014), pp. 595-606
Closed Access | Times Cited: 18

Scroll to top