
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
User trustworthiness in online social networks: A systematic review
Majed A Alkhamees, Saleh M. Al-Saleem, Muhammad Al‐Qurishi, et al.
Applied Soft Computing (2021) Vol. 103, pp. 107159-107159
Closed Access | Times Cited: 35
Majed A Alkhamees, Saleh M. Al-Saleem, Muhammad Al‐Qurishi, et al.
Applied Soft Computing (2021) Vol. 103, pp. 107159-107159
Closed Access | Times Cited: 35
Showing 1-25 of 35 citing articles:
SYNTHESIZING AI'S IMPACT ON CYBERSECURITY IN TELECOMMUNICATIONS: A CONCEPTUAL FRAMEWORK
Philip Olaseni Shoetan, Olukunle Oladipupo Amoo, Enyinaya Stefano Okafor, et al.
Computer Science & IT Research Journal (2024) Vol. 5, Iss. 3, pp. 594-605
Open Access | Times Cited: 22
Philip Olaseni Shoetan, Olukunle Oladipupo Amoo, Enyinaya Stefano Okafor, et al.
Computer Science & IT Research Journal (2024) Vol. 5, Iss. 3, pp. 594-605
Open Access | Times Cited: 22
Blockchain solutions for trustworthy decentralization in social networks
Fatma Mlika, Wafa Karoui, Lotfi Romdhane
Computer Networks (2024) Vol. 244, pp. 110336-110336
Closed Access | Times Cited: 9
Fatma Mlika, Wafa Karoui, Lotfi Romdhane
Computer Networks (2024) Vol. 244, pp. 110336-110336
Closed Access | Times Cited: 9
Beyond administrative reports: a deep learning framework for classifying and monitoring crime and accidents leveraging large-scale online news
Suppawong Tuarob, Phonarnun Tatiyamaneekul, Siripen Pongpaichet, et al.
Neural Computing and Applications (2025)
Open Access
Suppawong Tuarob, Phonarnun Tatiyamaneekul, Siripen Pongpaichet, et al.
Neural Computing and Applications (2025)
Open Access
Towards fake profiles identification in social networks: a proposal with energy-based PageRank algorithm involving entropy and domain authority
K Varshitha, Siri Varsha Talada, Arnab Mitra
Risk sciences. (2025) Vol. 1, pp. 100013-100013
Open Access
K Varshitha, Siri Varsha Talada, Arnab Mitra
Risk sciences. (2025) Vol. 1, pp. 100013-100013
Open Access
Trait Based Trustworthiness Assessment in Human-Agent Collaboration Using Multi-Layer Fuzzy Inference Approach
Sadaf Hussain, Rizwan Ali Naqvi, Sagheer Abbas, et al.
IEEE Access (2021) Vol. 9, pp. 73561-73574
Open Access | Times Cited: 27
Sadaf Hussain, Rizwan Ali Naqvi, Sagheer Abbas, et al.
IEEE Access (2021) Vol. 9, pp. 73561-73574
Open Access | Times Cited: 27
An intelligent system for multi-topic social spam detection in microblogging
Bilal Abu-Salih, Dana Al Qudah, Malak Al-Hassan, et al.
Journal of Information Science (2022) Vol. 50, Iss. 6, pp. 1471-1498
Open Access | Times Cited: 14
Bilal Abu-Salih, Dana Al Qudah, Malak Al-Hassan, et al.
Journal of Information Science (2022) Vol. 50, Iss. 6, pp. 1471-1498
Open Access | Times Cited: 14
A Multifaceted Role of Biometrics in Online Security, Privacy, and Trustworthy Decision Making
Marina L. Gavrilova, Fahim Anzum, A. S. M. Hossain Bari, et al.
Springer eBooks (2022), pp. 303-324
Closed Access | Times Cited: 13
Marina L. Gavrilova, Fahim Anzum, A. S. M. Hossain Bari, et al.
Springer eBooks (2022), pp. 303-324
Closed Access | Times Cited: 13
Product online multidimensional ratings aggregation decision-making model based on group division and attribute interaction
Yi Yang, Feifan Yang, Guodong Yi, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 126, pp. 106835-106835
Closed Access | Times Cited: 4
Yi Yang, Feifan Yang, Guodong Yi, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 126, pp. 106835-106835
Closed Access | Times Cited: 4
Towards design principles for an online learning platform providing reflective practices for developing employability competences
Perry Heymann, Marloes Hukema, Peter van Rosmalen, et al.
Education and Information Technologies (2024) Vol. 29, Iss. 13, pp. 17211-17234
Open Access | Times Cited: 1
Perry Heymann, Marloes Hukema, Peter van Rosmalen, et al.
Education and Information Technologies (2024) Vol. 29, Iss. 13, pp. 17211-17234
Open Access | Times Cited: 1
Multi-criteria assessment of user trust in Social Reviewing Systems with subjective logic fusion
Christian Esposito, Antonio Galli, Vincenzo Moscato, et al.
Information Fusion (2021) Vol. 77, pp. 1-18
Closed Access | Times Cited: 10
Christian Esposito, Antonio Galli, Vincenzo Moscato, et al.
Information Fusion (2021) Vol. 77, pp. 1-18
Closed Access | Times Cited: 10
Soft computing for recommender systems and sentiment analysis
Lorenzo Malandri, Carlos Porcel, Frank Xing, et al.
Applied Soft Computing (2022) Vol. 118, pp. 108246-108246
Closed Access | Times Cited: 7
Lorenzo Malandri, Carlos Porcel, Frank Xing, et al.
Applied Soft Computing (2022) Vol. 118, pp. 108246-108246
Closed Access | Times Cited: 7
A cognitive behaviour data analysis on the use of social media in global south context focusing on Bangladesh
Shashwata Sourav Roy Samya, MD. Shaleh Islam Tonmoy, Md. Forhad Rabbi
Scientific Reports (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 3
Shashwata Sourav Roy Samya, MD. Shaleh Islam Tonmoy, Md. Forhad Rabbi
Scientific Reports (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 3
Detecting malicious reviews and users affecting social reviewing systems: A survey
Christian Esposito, Vincenzo Moscato, Giancarlo Sperlì
Computers & Security (2023) Vol. 133, pp. 103407-103407
Closed Access | Times Cited: 3
Christian Esposito, Vincenzo Moscato, Giancarlo Sperlì
Computers & Security (2023) Vol. 133, pp. 103407-103407
Closed Access | Times Cited: 3
A Seed-Guided Latent Dirichlet Allocation Approach to Predict the Personality of Online Users Using the PEN Model
Saravanan Sagadevan, Nurul Hashimah Ahamed Hassain Malim, Mohd Heikal Husin
Algorithms (2022) Vol. 15, Iss. 3, pp. 87-87
Open Access | Times Cited: 5
Saravanan Sagadevan, Nurul Hashimah Ahamed Hassain Malim, Mohd Heikal Husin
Algorithms (2022) Vol. 15, Iss. 3, pp. 87-87
Open Access | Times Cited: 5
The Impact of Credibility Attributes on Consumer Intention to Adopt Information on Social Networking Sites
Yasmeen Elsantil, Riyad Eid, Khaled Bedair
International Journal of Online Marketing (2022) Vol. 12, Iss. 1, pp. 1-22
Open Access | Times Cited: 5
Yasmeen Elsantil, Riyad Eid, Khaled Bedair
International Journal of Online Marketing (2022) Vol. 12, Iss. 1, pp. 1-22
Open Access | Times Cited: 5
An attention‐based deep learning model for credibility assessment of online health information
Swarup Padhy, Santosh Singh Rathore
Computational Intelligence (2023) Vol. 39, Iss. 5, pp. 832-859
Closed Access | Times Cited: 2
Swarup Padhy, Santosh Singh Rathore
Computational Intelligence (2023) Vol. 39, Iss. 5, pp. 832-859
Closed Access | Times Cited: 2
The longer the better? The impact of online review length on tourist trust and visit intention
Molly Chien-Jung Huang, Shih‐Chieh Chuang, Yin‐Hui Cheng, et al.
Journal Of Vacation Marketing (2023)
Closed Access | Times Cited: 2
Molly Chien-Jung Huang, Shih‐Chieh Chuang, Yin‐Hui Cheng, et al.
Journal Of Vacation Marketing (2023)
Closed Access | Times Cited: 2
Measuring Electronically Shared Rape Myths: Scale Creation and Correlates
Elyse J. Thulin, Autumn Rae Florimbio, Meredith L. Philyaw-Kotov, et al.
Journal of Interpersonal Violence (2023) Vol. 39, Iss. 1-2, pp. 369-392
Closed Access | Times Cited: 2
Elyse J. Thulin, Autumn Rae Florimbio, Meredith L. Philyaw-Kotov, et al.
Journal of Interpersonal Violence (2023) Vol. 39, Iss. 1-2, pp. 369-392
Closed Access | Times Cited: 2
A survey on dynamic graph processing on GPUs: concepts, terminologies and systems
Hongru Gao, Xiaofei Liao, Zhiyuan Shao, et al.
Frontiers of Computer Science (2023) Vol. 18, Iss. 4
Closed Access | Times Cited: 2
Hongru Gao, Xiaofei Liao, Zhiyuan Shao, et al.
Frontiers of Computer Science (2023) Vol. 18, Iss. 4
Closed Access | Times Cited: 2
An Approach to Detect Fake Profiles in Social Networks Using Cellular Automata-Based PageRank Validation Model Involving Energy Transfer
Arnab Mitra, Anirban Kundu, Matangini Chattopadhyay, et al.
SN Computer Science (2022) Vol. 3, Iss. 6
Closed Access | Times Cited: 3
Arnab Mitra, Anirban Kundu, Matangini Chattopadhyay, et al.
SN Computer Science (2022) Vol. 3, Iss. 6
Closed Access | Times Cited: 3
A Reputation Ranking Method based on Rating Patterns and Rating Deviation
Jian Zhou, Yufeng Liu, Hongliang Sun
2022 5th International Conference on Data Science and Information Technology (DSIT) (2022), pp. 1-6
Closed Access | Times Cited: 3
Jian Zhou, Yufeng Liu, Hongliang Sun
2022 5th International Conference on Data Science and Information Technology (DSIT) (2022), pp. 1-6
Closed Access | Times Cited: 3
The credibility assessment of Twitter/X users based organization objectives by heterogeneous resources in big data life cycle
Sogand Dehghan, Rojiar Pir Mohammadiani, Shahriar Mohammadi
Computers in Human Behavior (2024) Vol. 162, pp. 108428-108428
Closed Access
Sogand Dehghan, Rojiar Pir Mohammadiani, Shahriar Mohammadi
Computers in Human Behavior (2024) Vol. 162, pp. 108428-108428
Closed Access
Detecção de Fake News via Sinais Implícitos de Crowds: Uma Abordagem para Mitigar o Cold-Start no Cálculo da Reputação
Viviane Antonia Corrêa Thomé, Paulo Márcio Souza Freire, Ronaldo Ribeiro Goldschmidt
(2024), pp. 375-379
Open Access
Viviane Antonia Corrêa Thomé, Paulo Márcio Souza Freire, Ronaldo Ribeiro Goldschmidt
(2024), pp. 375-379
Open Access
Echo chamber formation sharpened by priority users
Henrique Ferraz de Arruda, Kleber A. Oliveira, Yamir Moreno
iScience (2024) Vol. 27, Iss. 11, pp. 111098-111098
Open Access
Henrique Ferraz de Arruda, Kleber A. Oliveira, Yamir Moreno
iScience (2024) Vol. 27, Iss. 11, pp. 111098-111098
Open Access
Enhancing Rating-Based Recommender Systems: A Comprehensive Analysis of User Textual Reviews
Mohd Danish, Mohammad Amjad, Syed Immamul Ansarullah, et al.
(2024)
Closed Access
Mohd Danish, Mohammad Amjad, Syed Immamul Ansarullah, et al.
(2024)
Closed Access