
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A machine learning-based approach for vital node identification in complex networks
Ahmad Asgharian Rezaei, Justin Munoz, Mahdi Jalili, et al.
Expert Systems with Applications (2022) Vol. 214, pp. 119086-119086
Closed Access | Times Cited: 48
Ahmad Asgharian Rezaei, Justin Munoz, Mahdi Jalili, et al.
Expert Systems with Applications (2022) Vol. 214, pp. 119086-119086
Closed Access | Times Cited: 48
Showing 1-25 of 48 citing articles:
A survey on influence maximization models
Myriam Jaouadi, Lotfi Ben Romdhane
Expert Systems with Applications (2024) Vol. 248, pp. 123429-123429
Closed Access | Times Cited: 10
Myriam Jaouadi, Lotfi Ben Romdhane
Expert Systems with Applications (2024) Vol. 248, pp. 123429-123429
Closed Access | Times Cited: 10
Locating influential nodes in hypergraphs via fuzzy collective influence
S. F. Zhang, Xiaoyan Yu, Gui‐Quan Sun, et al.
Communications in Nonlinear Science and Numerical Simulation (2025), pp. 108574-108574
Open Access | Times Cited: 1
S. F. Zhang, Xiaoyan Yu, Gui‐Quan Sun, et al.
Communications in Nonlinear Science and Numerical Simulation (2025), pp. 108574-108574
Open Access | Times Cited: 1
Design and Implementation of Node Degree Centrality Computing of Network Security Database Based on Knowledge Graph
Chao Wu, Feng Wu
Security and Privacy (2025) Vol. 8, Iss. 1
Closed Access | Times Cited: 1
Chao Wu, Feng Wu
Security and Privacy (2025) Vol. 8, Iss. 1
Closed Access | Times Cited: 1
Resilience assessment of High-speed railway networks from the spatio-temporal perspective: A case study in Jiangsu Province, China
Yunjiang Xiao, Li Yang, Weidong Liu, et al.
Reliability Engineering & System Safety (2025), pp. 110900-110900
Closed Access | Times Cited: 1
Yunjiang Xiao, Li Yang, Weidong Liu, et al.
Reliability Engineering & System Safety (2025), pp. 110900-110900
Closed Access | Times Cited: 1
Learning to rank influential nodes in complex networks via convolutional neural networks
Waseem Ahmad, Bang Wang, Si Chen
Applied Intelligence (2024) Vol. 54, Iss. 4, pp. 3260-3278
Closed Access | Times Cited: 6
Waseem Ahmad, Bang Wang, Si Chen
Applied Intelligence (2024) Vol. 54, Iss. 4, pp. 3260-3278
Closed Access | Times Cited: 6
Towards investigating influencers in complex social networks using electric potential concept from a centrality perspective
Aman Ullah, Salah Ud Din, Nasrullah Khan, et al.
Information Fusion (2024) Vol. 109, pp. 102439-102439
Closed Access | Times Cited: 6
Aman Ullah, Salah Ud Din, Nasrullah Khan, et al.
Information Fusion (2024) Vol. 109, pp. 102439-102439
Closed Access | Times Cited: 6
Identifying critical nodes in interdependent networks by GA-XGBoost
Xingju Zhong, Renjing Liu
Reliability Engineering & System Safety (2024) Vol. 251, pp. 110384-110384
Closed Access | Times Cited: 6
Xingju Zhong, Renjing Liu
Reliability Engineering & System Safety (2024) Vol. 251, pp. 110384-110384
Closed Access | Times Cited: 6
Towards identifying influential nodes in complex networks using semi-local centrality metrics
Kun Zhang, Yu Zhou, Haixia Long, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 10, pp. 101798-101798
Open Access | Times Cited: 15
Kun Zhang, Yu Zhou, Haixia Long, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 10, pp. 101798-101798
Open Access | Times Cited: 15
Node importance evaluation method of complex network based on the fusion gravity model
Haoming Guo, Shuangling Wang, Xuefeng Yan, et al.
Chaos Solitons & Fractals (2024) Vol. 183, pp. 114924-114924
Closed Access | Times Cited: 5
Haoming Guo, Shuangling Wang, Xuefeng Yan, et al.
Chaos Solitons & Fractals (2024) Vol. 183, pp. 114924-114924
Closed Access | Times Cited: 5
IC-SNI: measuring nodes’ influential capability in complex networks through structural and neighboring information
Suman Nandi, Mariana Curado Malta, Giridhar Maji, et al.
Knowledge and Information Systems (2024) Vol. 67, Iss. 2, pp. 1309-1350
Closed Access | Times Cited: 5
Suman Nandi, Mariana Curado Malta, Giridhar Maji, et al.
Knowledge and Information Systems (2024) Vol. 67, Iss. 2, pp. 1309-1350
Closed Access | Times Cited: 5
High-quality community detection in complex networks based on node influence analysis
Zhiyong Wang, Cuiping Zhang, Rebaz Othman Yahya
Chaos Solitons & Fractals (2024) Vol. 182, pp. 114849-114849
Closed Access | Times Cited: 4
Zhiyong Wang, Cuiping Zhang, Rebaz Othman Yahya
Chaos Solitons & Fractals (2024) Vol. 182, pp. 114849-114849
Closed Access | Times Cited: 4
Vital node identification in complex networks based on autoencoder and graph neural network
You Xiong, Zheng Hu, Chang Su, et al.
Applied Soft Computing (2024) Vol. 163, pp. 111895-111895
Closed Access | Times Cited: 4
You Xiong, Zheng Hu, Chang Su, et al.
Applied Soft Computing (2024) Vol. 163, pp. 111895-111895
Closed Access | Times Cited: 4
MEGA: identifying influential nodes in heterogeneous networks based on meta-path and attention
Jiahao Xie, Jianyong Yu, Z. Chen
Journal of Statistical Mechanics Theory and Experiment (2025) Vol. 2025, Iss. 2, pp. 023401-023401
Closed Access
Jiahao Xie, Jianyong Yu, Z. Chen
Journal of Statistical Mechanics Theory and Experiment (2025) Vol. 2025, Iss. 2, pp. 023401-023401
Closed Access
Identifying influential nodes in complex networks by adjusted feature contributions and neighborhood impact
Shima Esfandiari, Seyed Mostafa Fakhrahmad
The Journal of Supercomputing (2025) Vol. 81, Iss. 3
Closed Access
Shima Esfandiari, Seyed Mostafa Fakhrahmad
The Journal of Supercomputing (2025) Vol. 81, Iss. 3
Closed Access
Multiplex network influence maximization based on representation learning method
Hegui Zhang, Dapeng Zhang, Yun Wan, et al.
Applied Soft Computing (2025), pp. 112956-112956
Closed Access
Hegui Zhang, Dapeng Zhang, Yun Wan, et al.
Applied Soft Computing (2025), pp. 112956-112956
Closed Access
Ip-GCN: a hybrid deep learning approach to predict influence in complex networks
Asmita Patel, Naveen Singh, Buddha Singh
Neural Computing and Applications (2025)
Closed Access
Asmita Patel, Naveen Singh, Buddha Singh
Neural Computing and Applications (2025)
Closed Access
CLDE: a competitive learning-driven differential evolution optimization for the influence maximization problem in social networks
Baoqiang Chai, Ruisheng Zhang, Xinyue Li, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 5
Closed Access
Baoqiang Chai, Ruisheng Zhang, Xinyue Li, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 5
Closed Access
Cascade Kronecker Neuro–Fuzzy Network Based Influential Node Identification
Koduru Hajarathaiah, Chandra Sekhar Kolli, Subba Reddy Tatireddy, et al.
Applied Soft Computing (2025), pp. 113015-113015
Closed Access
Koduru Hajarathaiah, Chandra Sekhar Kolli, Subba Reddy Tatireddy, et al.
Applied Soft Computing (2025), pp. 113015-113015
Closed Access
Privacy-Preserving Vital Node Identification in Complex Networks Using Machine Learning
Diaoulé Diallo, Tobias Hecking
Studies in computational intelligence (2025), pp. 49-61
Closed Access
Diaoulé Diallo, Tobias Hecking
Studies in computational intelligence (2025), pp. 49-61
Closed Access
Automated Construction and Mining of Text-Based Modern Chinese Character Databases: A Case Study of Fujian
Xueyan Jian, Wenmin Yuan, Wu Yuan, et al.
Information (2025) Vol. 16, Iss. 4, pp. 324-324
Open Access
Xueyan Jian, Wenmin Yuan, Wu Yuan, et al.
Information (2025) Vol. 16, Iss. 4, pp. 324-324
Open Access
Entropy-based weighted multi-channel convolutional neural network method for node importance assessment
JIANG Tingshuai, Yirun Ruan, Hai Li, et al.
Acta Physica Sinica (2025) Vol. 74, Iss. 12
Open Access
JIANG Tingshuai, Yirun Ruan, Hai Li, et al.
Acta Physica Sinica (2025) Vol. 74, Iss. 12
Open Access
Multi-factor information matrix: A directed weighted method to identify influential nodes in social networks
Yan Wang, Ling Zhang, Junwen Yang, et al.
Chaos Solitons & Fractals (2024) Vol. 180, pp. 114485-114485
Closed Access | Times Cited: 3
Yan Wang, Ling Zhang, Junwen Yang, et al.
Chaos Solitons & Fractals (2024) Vol. 180, pp. 114485-114485
Closed Access | Times Cited: 3
Identifying Key Nodes for the Influence Spread Using a Machine Learning Approach
Marek Stolarski, Adam Piróg, Piotr Bródka
Entropy (2024) Vol. 26, Iss. 11, pp. 955-955
Open Access | Times Cited: 3
Marek Stolarski, Adam Piróg, Piotr Bródka
Entropy (2024) Vol. 26, Iss. 11, pp. 955-955
Open Access | Times Cited: 3
OlapGN: A multi-layered graph convolution network-based model for locating influential nodes in graph networks
Yasir Rashid, Javaid Iqbal Bhat
Knowledge-Based Systems (2023) Vol. 283, pp. 111163-111163
Closed Access | Times Cited: 8
Yasir Rashid, Javaid Iqbal Bhat
Knowledge-Based Systems (2023) Vol. 283, pp. 111163-111163
Closed Access | Times Cited: 8
A Complex Network Important Node Identification Based on the KPDN Method
Liang Zhao, Peng Sun, Jieyong Zhang, et al.
Applied Sciences (2023) Vol. 13, Iss. 14, pp. 8303-8303
Open Access | Times Cited: 7
Liang Zhao, Peng Sun, Jieyong Zhang, et al.
Applied Sciences (2023) Vol. 13, Iss. 14, pp. 8303-8303
Open Access | Times Cited: 7