OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A comparative analysis of structural graph metrics to identify anomalies in online social networks
Ravneet Kaur, Sarbjeet Singh
Computers & Electrical Engineering (2016) Vol. 57, pp. 294-310
Closed Access | Times Cited: 30

Showing 1-25 of 30 citing articles:

A new direction in social network analysis: Online social network analysis problems and applications
Ümit Can, Bilal Alataş
Physica A Statistical Mechanics and its Applications (2019) Vol. 535, pp. 122372-122372
Closed Access | Times Cited: 168

Recognizing human behaviours in online social networks
Flora Amato, Aniello Castiglione, Aniello De Santo, et al.
Computers & Security (2017) Vol. 74, pp. 355-370
Closed Access | Times Cited: 70

QLLog: A log anomaly detection method based on Q-learning algorithm
Xiaoyu Duan, Shi Ying, Wanli Yuan, et al.
Information Processing & Management (2021) Vol. 58, Iss. 3, pp. 102540-102540
Closed Access | Times Cited: 29

A graph spatial-temporal model for predicting population density of key areas
Zhihao Xu, Jianbo Li, Zhiqiang Lv, et al.
Computers & Electrical Engineering (2021) Vol. 93, pp. 107235-107235
Open Access | Times Cited: 24

Comparing international contractors' CSR communication patterns: A semantic analysis
Pin‐Chao Liao, Jing-Qiu Liao, Guangdong Wu, et al.
Journal of Cleaner Production (2018) Vol. 203, pp. 353-366
Closed Access | Times Cited: 26

A Generative Adversarial Networks for Log Anomaly Detection
Xiaoyu Duan, Ying Shi, Wanli Yuan, et al.
Computer Systems Science and Engineering (2021) Vol. 37, Iss. 1, pp. 135-148
Open Access | Times Cited: 16

An Approach to Estimating of Criticality of Social Engineering Attacks Traces
Anastasiia Khlobystova, Maxim V. Abramov, Alexander Lvovich Tulupyev
Studies in systems, decision and control (2019), pp. 446-456
Closed Access | Times Cited: 15

Anomaly Discover: A New Community-based Approach for Detecting Anomalies in Social Networks
Hédia Zardi, Hajar Alrajhi
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 4
Open Access | Times Cited: 4

An approach to foster agribusiness marketing applying data analysis of social network
Nedson D. Soares, Regina Braga, José David, et al.
Computers and Electronics in Agriculture (2024) Vol. 222, pp. 109044-109044
Closed Access | Times Cited: 1

A Community-Aware Approach for Identifying Node Anomalies in Complex Networks
Thomas J. Helling, Johannes C. Scholtes, Frank W. Takes
Studies in computational intelligence (2018), pp. 244-255
Closed Access | Times Cited: 11

Improved Model for Detecting Fake Profiles in Online Social Network: A Case Study of Twitter
Adebola K. Ojo
Journal of Advances in Mathematics and Computer Science (2019), pp. 1-17
Open Access | Times Cited: 8

Improved detection of Facebook anomalies and abnormalities using graph-based and machine learning techniques
Ramzi Hamid Elghanuni, Rabab Alayham Abbas Helmi, Muhammad Irsyad Abdullah
AIP conference proceedings (2022)
Open Access | Times Cited: 5

An optimized deep belief network to detect anomalous behavior in social media
M. Swarna Sudha, K. Valarmathi
Journal of Ambient Intelligence and Humanized Computing (2021)
Closed Access | Times Cited: 5

Anomaly Detection in Social Networks
Vivek Kumar Giri, Shelly Sachdeva
2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence) (2019), pp. 698-703
Closed Access | Times Cited: 4

Detecting Anomalies in Network Communities Based on Structural and Attribute Deviation
Hédia Zardi, Hanen Karamti, Walid Karamti, et al.
Applied Sciences (2022) Vol. 12, Iss. 22, pp. 11791-11791
Open Access | Times Cited: 3

Intelligent English resource recommendation and teaching effect based on symmetric SDAE collaborative filtering algorithm
Dan Wu
Journal of Ambient Intelligence and Humanized Computing (2021)
Closed Access | Times Cited: 4

Effect the Graph Metric to Detect Anomalies and Non-Anomalies on Facebook Using Machine Learning Models
Rabab Alayham Abbas Helmi, Ramzi Hamid Elghanuni, Muhammad Irsyad Abdullah
(2021)
Closed Access | Times Cited: 4

A Review of Research on Social Network Event Detection Methods
Tianqi Chen
International Journal of Computer Science and Information Technology (2024) Vol. 3, Iss. 1, pp. 82-92
Open Access

Feature-Based Anomaly Detection in Static Social Networks
Law Kumar, Rajeev Kumar
Lecture notes in electrical engineering (2024), pp. 317-327
Closed Access

Subtle Anomaly Detection in Dynamic Networks using Graph Spectra
Xiaoyu Wang, Yongwang Zhou, Dongbiao Li, et al.
2022 IEEE/CIC International Conference on Communications in China (ICCC) (2024), pp. 108-113
Closed Access

A Systematic Review: Detection of Anomalies in Social Networks
Kanishka Sharma, Ankita Singh
2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS) (2023), pp. 1470-1476
Closed Access | Times Cited: 1

Deep Learning Based IDS to Detect Anomaly Over Social Networking Site: Comprehensive Review
Safdar Sardar Khan, Arpit Deo, Kailash Kumar Baraskar, et al.
(2023), pp. 1-7
Closed Access | Times Cited: 1

REDIC: Recommendation of Digital Influencers of Brazilian Artisanal Cheese
Nedson D. Soares, Regina Braga, José David, et al.
(2021), pp. 1-8
Closed Access | Times Cited: 3

Top-$k$ Subgraph Query Based on Frequent Structure in Large-Scale Dynamic Graphs
Xiaohuan Shan, Guangxiang Wang, Linlin Ding, et al.
IEEE Access (2018) Vol. 6, pp. 78471-78482
Open Access | Times Cited: 2

A Subgraph Query Method Based on Adjacent Node Features on Large-Scale Label Graphs
Xiaohuan Shan, Jingjiao Ma, Jianye Gao, et al.
Lecture notes in computer science (2019), pp. 226-238
Closed Access | Times Cited: 2

Page 1 - Next Page

Scroll to top