
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Detection of spam-posting accounts on Twitter
Isa Inuwa-Dutse, Mark Liptrott, Ioannis Korkontzelos
Neurocomputing (2018) Vol. 315, pp. 496-511
Open Access | Times Cited: 141
Isa Inuwa-Dutse, Mark Liptrott, Ioannis Korkontzelos
Neurocomputing (2018) Vol. 315, pp. 496-511
Open Access | Times Cited: 141
Showing 1-25 of 141 citing articles:
Design and analysis of a large-scale COVID-19 tweets dataset
Rabindra Lamsal
Applied Intelligence (2020) Vol. 51, Iss. 5, pp. 2790-2804
Open Access | Times Cited: 173
Rabindra Lamsal
Applied Intelligence (2020) Vol. 51, Iss. 5, pp. 2790-2804
Open Access | Times Cited: 173
Real-Time Twitter Spam Detection and Sentiment Analysis using Machine Learning and Deep Learning Techniques
Anisha P Rodrigues, Roshan Fernandes, A Aakash, et al.
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-14
Open Access | Times Cited: 130
Anisha P Rodrigues, Roshan Fernandes, A Aakash, et al.
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-14
Open Access | Times Cited: 130
Machine learning-based social media bot detection: a comprehensive literature review
Malak Aljabri, Rachid Zagrouba, Afrah Shaahid, et al.
Social Network Analysis and Mining (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 52
Malak Aljabri, Rachid Zagrouba, Afrah Shaahid, et al.
Social Network Analysis and Mining (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 52
InfGCN: Identifying influential nodes in complex networks with graph convolutional networks
Gouheng Zhao, Peng Jia, Anmin Zhou, et al.
Neurocomputing (2020) Vol. 414, pp. 18-26
Closed Access | Times Cited: 91
Gouheng Zhao, Peng Jia, Anmin Zhou, et al.
Neurocomputing (2020) Vol. 414, pp. 18-26
Closed Access | Times Cited: 91
A systematic literature review on spam content detection and classification
Sanaa Kaddoura, Ganesh Chandrasekaran, Daniela Elena Popescu, et al.
PeerJ Computer Science (2022) Vol. 8, pp. e830-e830
Open Access | Times Cited: 65
Sanaa Kaddoura, Ganesh Chandrasekaran, Daniela Elena Popescu, et al.
PeerJ Computer Science (2022) Vol. 8, pp. e830-e830
Open Access | Times Cited: 65
DeeProBot: a hybrid deep neural network model for social bot detection based on user profile data
Kadhim Hayawi, Sujith Samuel Mathew, Neethu Venugopal, et al.
Social Network Analysis and Mining (2022) Vol. 12, Iss. 1
Open Access | Times Cited: 50
Kadhim Hayawi, Sujith Samuel Mathew, Neethu Venugopal, et al.
Social Network Analysis and Mining (2022) Vol. 12, Iss. 1
Open Access | Times Cited: 50
Contents-Based Spam Detection on Social Networks Using RoBERTa Embedding and Stacked BLSTM
Razan Ghanem, Hasan Erbay, Khaled Bakour
SN Computer Science (2023) Vol. 4, Iss. 4
Closed Access | Times Cited: 25
Razan Ghanem, Hasan Erbay, Khaled Bakour
SN Computer Science (2023) Vol. 4, Iss. 4
Closed Access | Times Cited: 25
The relationship between the online social anxiety, perceived information overload and fatigue, and job engagement of civil servant LINE users
Ming-Yueh Hwang, Jon‐Chao Hong, Kai‐Hsin Tai, et al.
Government Information Quarterly (2019) Vol. 37, Iss. 1, pp. 101423-101423
Closed Access | Times Cited: 66
Ming-Yueh Hwang, Jon‐Chao Hong, Kai‐Hsin Tai, et al.
Government Information Quarterly (2019) Vol. 37, Iss. 1, pp. 101423-101423
Closed Access | Times Cited: 66
Spam review detection using spiral cuckoo search clustering method
Avinash Chandra Pandey, Dharmveer Singh Rajpoot
Evolutionary Intelligence (2019) Vol. 12, Iss. 2, pp. 147-164
Closed Access | Times Cited: 64
Avinash Chandra Pandey, Dharmveer Singh Rajpoot
Evolutionary Intelligence (2019) Vol. 12, Iss. 2, pp. 147-164
Closed Access | Times Cited: 64
No Rumours Please! A Multi-Indic-Lingual Approach for COVID Fake-Tweet Detection
Debanjana Kar, Mohit Bhardwaj, Suranjana Samanta, et al.
(2021)
Open Access | Times Cited: 55
Debanjana Kar, Mohit Bhardwaj, Suranjana Samanta, et al.
(2021)
Open Access | Times Cited: 55
A comprehensive study of spam detection in e-mails using bio-inspired optimization techniques
Jai Batra, Rupali S. Jain, Vinay Anand Tikkiwal, et al.
International Journal of Information Management Data Insights (2021) Vol. 1, Iss. 1, pp. 100006-100006
Open Access | Times Cited: 42
Jai Batra, Rupali S. Jain, Vinay Anand Tikkiwal, et al.
International Journal of Information Management Data Insights (2021) Vol. 1, Iss. 1, pp. 100006-100006
Open Access | Times Cited: 42
A Combined Text-Based and Metadata-Based Deep-Learning Framework for the Detection of Spam Accounts on the Social Media Platform Twitter
Atheer S. Alhassun, Murad A. Rassam
Processes (2022) Vol. 10, Iss. 3, pp. 439-439
Open Access | Times Cited: 30
Atheer S. Alhassun, Murad A. Rassam
Processes (2022) Vol. 10, Iss. 3, pp. 439-439
Open Access | Times Cited: 30
Systematic Literature Review of Social Media Bots Detection Systems
Zineb Ellaky, Faouzia Benabbou, Sara Ouahabi
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 5, pp. 101551-101551
Open Access | Times Cited: 18
Zineb Ellaky, Faouzia Benabbou, Sara Ouahabi
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 5, pp. 101551-101551
Open Access | Times Cited: 18
Detecting influential nodes with topological structure via Graph Neural Network approach in social networks
Riju Bhattacharya, Naresh Kumar Nagwani, Sarsij Tripathi
International Journal of Information Technology (2023) Vol. 15, Iss. 4, pp. 2233-2246
Open Access | Times Cited: 16
Riju Bhattacharya, Naresh Kumar Nagwani, Sarsij Tripathi
International Journal of Information Technology (2023) Vol. 15, Iss. 4, pp. 2233-2246
Open Access | Times Cited: 16
A Novel Stream Clustering Framework for Spam Detection in Twitter
Hadi Tajalizadeh, Reza Boostani
IEEE Transactions on Computational Social Systems (2019) Vol. 6, Iss. 3, pp. 525-534
Closed Access | Times Cited: 51
Hadi Tajalizadeh, Reza Boostani
IEEE Transactions on Computational Social Systems (2019) Vol. 6, Iss. 3, pp. 525-534
Closed Access | Times Cited: 51
SimilCatch: Enhanced social spammers detection on Twitter using Markov Random Fields
Nour El-Mawass, Paul Honeiné, Laurent Vercouter
Information Processing & Management (2020) Vol. 57, Iss. 6, pp. 102317-102317
Open Access | Times Cited: 48
Nour El-Mawass, Paul Honeiné, Laurent Vercouter
Information Processing & Management (2020) Vol. 57, Iss. 6, pp. 102317-102317
Open Access | Times Cited: 48
Ransomware Triage Using Deep Learning: Twitter as a Case Study
R. Vinayakumar, Mamoun Alazab, Alireza Jolfaei, et al.
(2019) Vol. 521, pp. 67-73
Closed Access | Times Cited: 44
R. Vinayakumar, Mamoun Alazab, Alireza Jolfaei, et al.
(2019) Vol. 521, pp. 67-73
Closed Access | Times Cited: 44
User trustworthiness in online social networks: A systematic review
Majed A Alkhamees, Saleh M. Al-Saleem, Muhammad Al‐Qurishi, et al.
Applied Soft Computing (2021) Vol. 103, pp. 107159-107159
Closed Access | Times Cited: 35
Majed A Alkhamees, Saleh M. Al-Saleem, Muhammad Al‐Qurishi, et al.
Applied Soft Computing (2021) Vol. 103, pp. 107159-107159
Closed Access | Times Cited: 35
BERT- and CNN-based TOBEAT approach for unwelcome tweets detection
Sarra Ouni, Fethi Fkih, Mohamed Nazih Omri
Social Network Analysis and Mining (2022) Vol. 12, Iss. 1
Closed Access | Times Cited: 25
Sarra Ouni, Fethi Fkih, Mohamed Nazih Omri
Social Network Analysis and Mining (2022) Vol. 12, Iss. 1
Closed Access | Times Cited: 25
Learning textual features for Twitter spam detection: A systematic literature review
Sepideh Bazzaz Abkenar, Mostafa Haghi Kashani, Mohammad Akbari, et al.
Expert Systems with Applications (2023) Vol. 228, pp. 120366-120366
Closed Access | Times Cited: 15
Sepideh Bazzaz Abkenar, Mostafa Haghi Kashani, Mohammad Akbari, et al.
Expert Systems with Applications (2023) Vol. 228, pp. 120366-120366
Closed Access | Times Cited: 15
Identify influential nodes in social networks with graph multi-head attention regression model
Jiangheng Kou, Peng Jia, Jiayong Liu, et al.
Neurocomputing (2023) Vol. 530, pp. 23-36
Closed Access | Times Cited: 13
Jiangheng Kou, Peng Jia, Jiayong Liu, et al.
Neurocomputing (2023) Vol. 530, pp. 23-36
Closed Access | Times Cited: 13
TL‐PBot: Twitter bot profile detection using transfer learning based on DNN model
Maryam Bibi, Zahid Hussain Qaisar, Naeem Aslam, et al.
Engineering Reports (2024) Vol. 6, Iss. 9
Open Access | Times Cited: 5
Maryam Bibi, Zahid Hussain Qaisar, Naeem Aslam, et al.
Engineering Reports (2024) Vol. 6, Iss. 9
Open Access | Times Cited: 5
Enhancing misinformation countermeasures: a multimodal approach to twitter bot detection
Olmar Arranz-Escudero, Lara Quijano-Sánchez, Federico Liberatore
Social Network Analysis and Mining (2025) Vol. 15, Iss. 1
Open Access
Olmar Arranz-Escudero, Lara Quijano-Sánchez, Federico Liberatore
Social Network Analysis and Mining (2025) Vol. 15, Iss. 1
Open Access
A Privacy-Enhancing Mechanism for Federated Graph Neural Networks
Xuebin Tang, Feng Hu
Symmetry (2025) Vol. 17, Iss. 4, pp. 565-565
Open Access
Xuebin Tang, Feng Hu
Symmetry (2025) Vol. 17, Iss. 4, pp. 565-565
Open Access
Discussing conflict in social media: The use of Twitter in the Jammu and Kashmir conflict
Sabrina Gabel, Lilian Reichert, Christian Reuter
Media War & Conflict (2020) Vol. 15, Iss. 4, pp. 504-529
Open Access | Times Cited: 38
Sabrina Gabel, Lilian Reichert, Christian Reuter
Media War & Conflict (2020) Vol. 15, Iss. 4, pp. 504-529
Open Access | Times Cited: 38