
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Combating misinformation in the age of LLMs: Opportunities and challenges
Canyu Chen, Kai Shu
AI Magazine (2024) Vol. 45, Iss. 3, pp. 354-368
Open Access | Times Cited: 23
Canyu Chen, Kai Shu
AI Magazine (2024) Vol. 45, Iss. 3, pp. 354-368
Open Access | Times Cited: 23
Showing 23 citing articles:
A survey on large language model (LLM) security and privacy: The Good, The Bad, and The Ugly
Yifan Yao, Jinhao Duan, Kaidi Xu, et al.
High-Confidence Computing (2024) Vol. 4, Iss. 2, pp. 100211-100211
Open Access | Times Cited: 205
Yifan Yao, Jinhao Duan, Kaidi Xu, et al.
High-Confidence Computing (2024) Vol. 4, Iss. 2, pp. 100211-100211
Open Access | Times Cited: 205
A Survey on Large Language Model (LLM) Security and Privacy: The Good, the Bad, and the Ugly
Yifan Yao, Jinhao Duan, Kaidi Xu, et al.
arXiv (Cornell University) (2023)
Open Access | Times Cited: 17
Yifan Yao, Jinhao Duan, Kaidi Xu, et al.
arXiv (Cornell University) (2023)
Open Access | Times Cited: 17
Beyond transparency and explainability: on the need for adequate and contextualized user guidelines for LLM use
Kristian González Barman, Nathan Gabriel Wood, Pawel Pawlowski
Ethics and Information Technology (2024) Vol. 26, Iss. 3
Closed Access | Times Cited: 7
Kristian González Barman, Nathan Gabriel Wood, Pawel Pawlowski
Ethics and Information Technology (2024) Vol. 26, Iss. 3
Closed Access | Times Cited: 7
Jatmo: Prompt Injection Defense by Task-Specific Finetuning
Julien Piet, Maha Al-Rashed, Chawin Sitawarin, et al.
Lecture notes in computer science (2024), pp. 105-124
Closed Access | Times Cited: 7
Julien Piet, Maha Al-Rashed, Chawin Sitawarin, et al.
Lecture notes in computer science (2024), pp. 105-124
Closed Access | Times Cited: 7
Weaponizing the Wall: The Role of Sponsored News in Spreading Propaganda on Facebook
Daman Deep Singh, Gaurav Chauhan, Minh-Kha Nguyen, et al.
Lecture notes in computer science (2025), pp. 438-454
Closed Access
Daman Deep Singh, Gaurav Chauhan, Minh-Kha Nguyen, et al.
Lecture notes in computer science (2025), pp. 438-454
Closed Access
The impact of presentation modalities on perceived accuracy and sharing of fake news: the role of perceived diagnosticity and involvement
Anat Toder Alon, Ilan Daniels Rahimi, Hila Tahar
Online Information Review (2025)
Closed Access
Anat Toder Alon, Ilan Daniels Rahimi, Hila Tahar
Online Information Review (2025)
Closed Access
The Performance of Large Language Models in Cognitive Analysis of Misinformation. (Preprint)
Dominika Nadia Wojtczak, Ryan McConville, Cheryl McQuire, et al.
(2025)
Closed Access
Dominika Nadia Wojtczak, Ryan McConville, Cheryl McQuire, et al.
(2025)
Closed Access
User Intent to Use DeepSeek for Healthcare Purposes and their Trust in the Large Language Model: Multinational Survey Study (Preprint)
Avishek Choudhury, Yeganeh Shahsavar, Hamid Shamszare
(2025)
Closed Access
Avishek Choudhury, Yeganeh Shahsavar, Hamid Shamszare
(2025)
Closed Access
Enhancing text-centric fake news detection via external knowledge distillation from LLMs
Xueqin Chen, Xiaoyu Huang, Qiang Gao, et al.
Neural Networks (2025), pp. 107377-107377
Closed Access
Xueqin Chen, Xiaoyu Huang, Qiang Gao, et al.
Neural Networks (2025), pp. 107377-107377
Closed Access
Enabling Autonomous and Adaptive Social Robots in Education: A Vision for the Application of Generative AI
Eva Verhelst, Ruben Janssens, Tony Belpaeme
Studies in computational intelligence (2025), pp. 17-42
Closed Access
Eva Verhelst, Ruben Janssens, Tony Belpaeme
Studies in computational intelligence (2025), pp. 17-42
Closed Access
User Intent to Use DeepSeek for Healthcare Purposes and their Trust in the Large Language Model: Multinational Survey Study (Preprint)
Avishek Choudhury, Yeganeh Shahsavar, Hamid Shamszare
JMIR Human Factors (2025)
Open Access
Avishek Choudhury, Yeganeh Shahsavar, Hamid Shamszare
JMIR Human Factors (2025)
Open Access
Striking the Balance in Using LLMs for Fact-Checking: A Narrative Literature Review
Laurence Dierickx, Arjen van Dalen, Andreas L. Opdahl, et al.
Lecture notes in computer science (2024), pp. 1-15
Closed Access | Times Cited: 3
Laurence Dierickx, Arjen van Dalen, Andreas L. Opdahl, et al.
Lecture notes in computer science (2024), pp. 1-15
Closed Access | Times Cited: 3
A Survey of Text Watermarking in the Era of Large Language Models
Aiwei Liu, Leyi Pan, Yijian Lu, et al.
ACM Computing Surveys (2024) Vol. 57, Iss. 2, pp. 1-36
Open Access | Times Cited: 3
Aiwei Liu, Leyi Pan, Yijian Lu, et al.
ACM Computing Surveys (2024) Vol. 57, Iss. 2, pp. 1-36
Open Access | Times Cited: 3
Outsourcing, Augmenting, or Complicating: The Dynamics of AI in Fact-Checking Practices in the Nordics
Laurence Dierickx, Stefanie Sirén‐Heikel, Carl‐Gustav Lindén
Emerging Media (2024) Vol. 2, Iss. 3, pp. 449-473
Open Access | Times Cited: 2
Laurence Dierickx, Stefanie Sirén‐Heikel, Carl‐Gustav Lindén
Emerging Media (2024) Vol. 2, Iss. 3, pp. 449-473
Open Access | Times Cited: 2
Silent Guardian: Protecting Text from Malicious Exploitation by Large Language Models
Jiawei Zhao, Kejiang Chen, Xiaojian Yuan, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 8600-8615
Closed Access | Times Cited: 1
Jiawei Zhao, Kejiang Chen, Xiaojian Yuan, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 8600-8615
Closed Access | Times Cited: 1
Large Language Models and Security
Michele Bezzi
IEEE Security & Privacy (2024) Vol. 22, Iss. 2, pp. 60-68
Closed Access
Michele Bezzi
IEEE Security & Privacy (2024) Vol. 22, Iss. 2, pp. 60-68
Closed Access
Studying the Knowledge and Behavior of ChatGPT via Journey to the West
Zihan Zhou
(2024), pp. 24-29
Closed Access
Zihan Zhou
(2024), pp. 24-29
Closed Access
Modality deep-learning frameworks for fake news detection on social networks: a systematic literature review
Mohamed A. Mostafa, Ahmad Almogren, Muhammad Al‐Qurishi, et al.
ACM Computing Surveys (2024) Vol. 57, Iss. 3, pp. 1-50
Open Access
Mohamed A. Mostafa, Ahmad Almogren, Muhammad Al‐Qurishi, et al.
ACM Computing Surveys (2024) Vol. 57, Iss. 3, pp. 1-50
Open Access
"Let’s ask what AI thinks then!": Using LLMs for Collaborative Problem-Solving in Virtual Environments
Esen Küçüktütüncü, Lisa Izzouzi
2022 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct) (2024), pp. 193-198
Closed Access
Esen Küçüktütüncü, Lisa Izzouzi
2022 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct) (2024), pp. 193-198
Closed Access
Large Vision-Language Model Security: A Survey
Taowen Wang, Fang Zheng, Haochen Xue, et al.
Communications in computer and information science (2024), pp. 3-22
Closed Access
Taowen Wang, Fang Zheng, Haochen Xue, et al.
Communications in computer and information science (2024), pp. 3-22
Closed Access
Catching Chameleons: Detecting Evolving Disinformation Generated using Large Language Models
Bohan Jiang, Chengshuai Zhao, Zhen Tan, et al.
(2024), pp. 197-206
Closed Access
Bohan Jiang, Chengshuai Zhao, Zhen Tan, et al.
(2024), pp. 197-206
Closed Access
An Efficient Approach for Enhancing GenAI Trustworthiness
Aviv Yehezkel
(2024), pp. 1900-1905
Closed Access
Aviv Yehezkel
(2024), pp. 1900-1905
Closed Access
Alimentando el ego. La banalización de los contenidos de los influencers y su impacto en la identidad de los jóvenes. Estudios de caso en España y Chile
Núria Roca Trenchs, Ana María Castillo, Pedro Sigaud Sellos
Revista Latina de Comunicación Social (2024), Iss. 83, pp. 1-25
Open Access
Núria Roca Trenchs, Ana María Castillo, Pedro Sigaud Sellos
Revista Latina de Comunicación Social (2024), Iss. 83, pp. 1-25
Open Access
Ethics and Regulation in Metaverse: Risks, Current Approaches, and Way Forward
Aliya Tabassum, Ezieddin Elmahjub, Junaid Qadir
Blockchain technologies (2024), pp. 265-290
Closed Access
Aliya Tabassum, Ezieddin Elmahjub, Junaid Qadir
Blockchain technologies (2024), pp. 265-290
Closed Access
Do not wait: Preemptive rumor detection with cooperative LLMs and accessible social context
Junyi Chen, Leyuan Liu, Fan Zhou
Information Processing & Management (2024) Vol. 62, Iss. 3, pp. 103995-103995
Closed Access
Junyi Chen, Leyuan Liu, Fan Zhou
Information Processing & Management (2024) Vol. 62, Iss. 3, pp. 103995-103995
Closed Access