
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Spam detection on Twitter using a support vector machine and users’ features by identifying their interactions
Saleh Beyt Sheikh Ahmad, Mahnaz Rafie, Seyed Mojtaba Ghorabie
Multimedia Tools and Applications (2021) Vol. 80, Iss. 8, pp. 11583-11605
Closed Access | Times Cited: 30
Saleh Beyt Sheikh Ahmad, Mahnaz Rafie, Seyed Mojtaba Ghorabie
Multimedia Tools and Applications (2021) Vol. 80, Iss. 8, pp. 11583-11605
Closed Access | Times Cited: 30
Showing 1-25 of 30 citing articles:
A systematic literature review on spam content detection and classification
Sanaa Kaddoura, Ganesh Chandrasekaran, Daniela Elena Popescu, et al.
PeerJ Computer Science (2022) Vol. 8, pp. e830-e830
Open Access | Times Cited: 66
Sanaa Kaddoura, Ganesh Chandrasekaran, Daniela Elena Popescu, et al.
PeerJ Computer Science (2022) Vol. 8, pp. e830-e830
Open Access | Times Cited: 66
Botshape: A Novel Social Bots Detection Approach via Behavioral Patterns
Jun Wu, Xuesong Ye, Chengjie Mou
(2023), pp. 45-60
Open Access | Times Cited: 18
Jun Wu, Xuesong Ye, Chengjie Mou
(2023), pp. 45-60
Open Access | Times Cited: 18
BERT- and CNN-based TOBEAT approach for unwelcome tweets detection
Sarra Ouni, Fethi Fkih, Mohamed Nazih Omri
Social Network Analysis and Mining (2022) Vol. 12, Iss. 1
Closed Access | Times Cited: 25
Sarra Ouni, Fethi Fkih, Mohamed Nazih Omri
Social Network Analysis and Mining (2022) Vol. 12, Iss. 1
Closed Access | Times Cited: 25
Learning textual features for Twitter spam detection: A systematic literature review
Sepideh Bazzaz Abkenar, Mostafa Haghi Kashani, Mohammad Akbari, et al.
Expert Systems with Applications (2023) Vol. 228, pp. 120366-120366
Closed Access | Times Cited: 15
Sepideh Bazzaz Abkenar, Mostafa Haghi Kashani, Mohammad Akbari, et al.
Expert Systems with Applications (2023) Vol. 228, pp. 120366-120366
Closed Access | Times Cited: 15
Detection of Twitter Spam Using GLoVe Vocabulary Features, Bidirectional LSTM and Convolution Neural Network
Pinnapureddy Manasa, Arun Malik, Isha Batra
SN Computer Science (2024) Vol. 5, Iss. 2
Closed Access | Times Cited: 4
Pinnapureddy Manasa, Arun Malik, Isha Batra
SN Computer Science (2024) Vol. 5, Iss. 2
Closed Access | Times Cited: 4
Quantum behaved Binary Gravitational Search Algorithm with Random Forest for Twitter Spammer Detection
S. Prasad, Girdhari Lal, Madhu Shukla, et al.
Results in Engineering (2025), pp. 103993-103993
Open Access
S. Prasad, Girdhari Lal, Madhu Shukla, et al.
Results in Engineering (2025), pp. 103993-103993
Open Access
İNTERNETTE YER ALAN TÜKETİCİ YORUMLARININ SATIN ALMA NİYETİNE ETKİSİ
Ali Can Yılmaz, Celal Demirkol
Öneri Dergisi (2025) Vol. 20, Iss. 63, pp. 1-30
Open Access
Ali Can Yılmaz, Celal Demirkol
Öneri Dergisi (2025) Vol. 20, Iss. 63, pp. 1-30
Open Access
StopSpamX: A Multi Modal Fusion Approach for Spam Detection in Social Networking.
Dasari Siva Krishna, Gorla Srinivas
MethodsX (2025) Vol. 14, pp. 103227-103227
Open Access
Dasari Siva Krishna, Gorla Srinivas
MethodsX (2025) Vol. 14, pp. 103227-103227
Open Access
Arabic spam tweets classification using deep learning
Sanaa Kaddoura, Suja A. Alex, Maher Itani, et al.
Neural Computing and Applications (2023) Vol. 35, Iss. 23, pp. 17233-17246
Closed Access | Times Cited: 11
Sanaa Kaddoura, Suja A. Alex, Maher Itani, et al.
Neural Computing and Applications (2023) Vol. 35, Iss. 23, pp. 17233-17246
Closed Access | Times Cited: 11
A novel deep learning model-based optimization algorithm for text message spam detection
Lipsa Das, Laxmi Ahuja, Adesh Pandey
The Journal of Supercomputing (2024) Vol. 80, Iss. 12, pp. 17823-17848
Closed Access | Times Cited: 4
Lipsa Das, Laxmi Ahuja, Adesh Pandey
The Journal of Supercomputing (2024) Vol. 80, Iss. 12, pp. 17823-17848
Closed Access | Times Cited: 4
Automatic Twitter Crime Prediction Using Hybrid Wavelet Convolutional Neural Network with World Cup Optimization
Monika Saini, Aruna Bhat
International Journal of Pattern Recognition and Artificial Intelligence (2022) Vol. 36, Iss. 05
Closed Access | Times Cited: 9
Monika Saini, Aruna Bhat
International Journal of Pattern Recognition and Artificial Intelligence (2022) Vol. 36, Iss. 05
Closed Access | Times Cited: 9
“Do not deceive me anymore!” interpretation through model design and visualization for instagram counterfeit seller account detection
Jeongeun Park, Jinmo Gu, Ha Young Kim
Computers in Human Behavior (2022) Vol. 137, pp. 107418-107418
Closed Access | Times Cited: 7
Jeongeun Park, Jinmo Gu, Ha Young Kim
Computers in Human Behavior (2022) Vol. 137, pp. 107418-107418
Closed Access | Times Cited: 7
ChSO-DNFNet: Spam detection in Twitter using feature fusion and optimized Deep Neuro Fuzzy Network
Merly Thomas, B.B. Meshram
Advances in Engineering Software (2022) Vol. 175, pp. 103333-103333
Closed Access | Times Cited: 7
Merly Thomas, B.B. Meshram
Advances in Engineering Software (2022) Vol. 175, pp. 103333-103333
Closed Access | Times Cited: 7
Tweet Spam Detection Using Machine Learning and Swarm Optimization Techniques
Pinnapureddy Manasa, Arun Malik, Khaled N. Alqahtani, et al.
IEEE Transactions on Computational Social Systems (2022) Vol. 11, Iss. 4, pp. 4870-4877
Closed Access | Times Cited: 6
Pinnapureddy Manasa, Arun Malik, Khaled N. Alqahtani, et al.
IEEE Transactions on Computational Social Systems (2022) Vol. 11, Iss. 4, pp. 4870-4877
Closed Access | Times Cited: 6
Legitimate and spam SMS classification employing novel Ensemble feature selection algorithm
Shailender Kumar, Shweta Gupta
Multimedia Tools and Applications (2023) Vol. 83, Iss. 7, pp. 19897-19927
Closed Access | Times Cited: 3
Shailender Kumar, Shweta Gupta
Multimedia Tools and Applications (2023) Vol. 83, Iss. 7, pp. 19897-19927
Closed Access | Times Cited: 3
Detecting malicious reviews and users affecting social reviewing systems: A survey
Christian Esposito, Vincenzo Moscato, Giancarlo Sperlì
Computers & Security (2023) Vol. 133, pp. 103407-103407
Closed Access | Times Cited: 3
Christian Esposito, Vincenzo Moscato, Giancarlo Sperlì
Computers & Security (2023) Vol. 133, pp. 103407-103407
Closed Access | Times Cited: 3
Stratified hyperparameters optimization of feed-forward neural network for social network spam detection (SON2S)
E. Elakkiya, S. Selvakumar
Soft Computing (2022) Vol. 26, Iss. 21, pp. 11915-11934
Closed Access | Times Cited: 5
E. Elakkiya, S. Selvakumar
Soft Computing (2022) Vol. 26, Iss. 21, pp. 11915-11934
Closed Access | Times Cited: 5
A Collaborative Abstraction Based Email Spam Filtering with Fingerprints
P. Rajendran, A. Tamilarasi, R. Mynavathi
Wireless Personal Communications (2021) Vol. 123, Iss. 2, pp. 1913-1923
Closed Access | Times Cited: 6
P. Rajendran, A. Tamilarasi, R. Mynavathi
Wireless Personal Communications (2021) Vol. 123, Iss. 2, pp. 1913-1923
Closed Access | Times Cited: 6
Category-learning attention mechanism for short text filtering
Tian Xia, Xuemin Chen
Neurocomputing (2022) Vol. 510, pp. 15-23
Closed Access | Times Cited: 4
Tian Xia, Xuemin Chen
Neurocomputing (2022) Vol. 510, pp. 15-23
Closed Access | Times Cited: 4
Combatting Cybercrimes: Leveraging Natural Language Processing for Detection in Social Media
D Srinivas, Premendra J. Bansod, Manvendra K. Singh, et al.
Smart innovation, systems and technologies (2024), pp. 265-277
Closed Access
D Srinivas, Premendra J. Bansod, Manvendra K. Singh, et al.
Smart innovation, systems and technologies (2024), pp. 265-277
Closed Access
Intelligent analysis to detect phishing websites using machine learning ensemble techniques
Mithilesh Kumar Pandey, Rekha Pal, Saurabh Pal, et al.
Human-Intelligent Systems Integration (2024)
Closed Access
Mithilesh Kumar Pandey, Rekha Pal, Saurabh Pal, et al.
Human-Intelligent Systems Integration (2024)
Closed Access
A Review
S. Raja Ratna, Sujatha Krishnamoorthy, J. Jospin Jeya, et al.
Advances in information security, privacy, and ethics book series (2023), pp. 37-51
Closed Access | Times Cited: 1
S. Raja Ratna, Sujatha Krishnamoorthy, J. Jospin Jeya, et al.
Advances in information security, privacy, and ethics book series (2023), pp. 37-51
Closed Access | Times Cited: 1
Content Based Email Spam Classifier as a Web Application Using Naïve Bayes Classifier
Arpita Chakraborty, Utpol Kanti Das, Juel Sikder, et al.
Lecture notes in networks and systems (2022), pp. 389-398
Closed Access | Times Cited: 2
Arpita Chakraborty, Utpol Kanti Das, Juel Sikder, et al.
Lecture notes in networks and systems (2022), pp. 389-398
Closed Access | Times Cited: 2
Content-based Spam Email Detection Using N-gram Machine Learning Approach
Syed Md. Minhaz Hossain, Iqbal H. Sarker
(2021)
Open Access | Times Cited: 2
Syed Md. Minhaz Hossain, Iqbal H. Sarker
(2021)
Open Access | Times Cited: 2
Measure the Performance by Analysis of Different Boosting algorithms on Various Patterns of Phishing datasets
Mithilesh Kumar Pandey, Munindra Kumar Singh, Saurabh Pal, et al.
Research Square (Research Square) (2022)
Open Access | Times Cited: 1
Mithilesh Kumar Pandey, Munindra Kumar Singh, Saurabh Pal, et al.
Research Square (Research Square) (2022)
Open Access | Times Cited: 1