OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Sybil Defense Techniques in Online Social Networks: A Survey
Muhammad Al‐Qurishi, Mabrook Al‐Rakhami, Atif Alamri, et al.
IEEE Access (2017) Vol. 5, pp. 1200-1219
Open Access | Times Cited: 106

Showing 1-25 of 106 citing articles:

The shift to 6G communications: vision and requirements
Muhammad Waseem Akhtar, Syed Ali Hassan, Rizwan Ghaffar, et al.
Human-centric Computing and Information Sciences (2020) Vol. 10, Iss. 1
Open Access | Times Cited: 249

Detection of Bots in Social Media: A Systematic Review
Mariam Orabi, Djedjiga Mouheb, Zaher Al Aghbari, et al.
Information Processing & Management (2020) Vol. 57, Iss. 4, pp. 102250-102250
Closed Access | Times Cited: 175

A review on social spam detection: Challenges, open issues, and future directions
Sanjeev Rao, Anil Kumar Verma, Tarunpreet Bhatia
Expert Systems with Applications (2021) Vol. 186, pp. 115742-115742
Closed Access | Times Cited: 140

Credibility in Online Social Networks: A Survey
Majed Alrubaian, Muhammad Al‐Qurishi, Atif Alamri, et al.
IEEE Access (2018) Vol. 7, pp. 2828-2855
Open Access | Times Cited: 90

Twitter spam account detection based on clustering and classification methods
Kayode S. Adewole, Tao Han, Wanqing Wu, et al.
The Journal of Supercomputing (2018) Vol. 76, Iss. 7, pp. 4802-4837
Closed Access | Times Cited: 84

A Survey on Privacy in Social Media
Ghazaleh Beigi, Huan Liu
ACM/IMS Transactions on Data Science (2020) Vol. 1, Iss. 1, pp. 1-38
Open Access | Times Cited: 76

Black Hole and Sink Hole Attack Detection in Wireless Body Area Networks
Rajesh Kumar Dhanaraj, K. Lalitha, Oana Geman, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2021) Vol. 68, Iss. 2, pp. 1949-1965
Open Access | Times Cited: 56

DeepProfile: Finding fake profile in online social network using dynamic CNN
Putra Wanda, Jie Huang
Journal of Information Security and Applications (2020) Vol. 52, pp. 102465-102465
Closed Access | Times Cited: 68

Fake Profile Detection on Social Networking Websites: A Comprehensive Review
Pradeep Kumar Roy, Shivam Chahar
IEEE Transactions on Artificial Intelligence (2020) Vol. 1, Iss. 3, pp. 271-285
Closed Access | Times Cited: 67

Decentralized privacy preserving services for Online Social Networks
Leila Bahri, Barbara Carminati, Elena Ferrari
Online Social Networks and Media (2018) Vol. 6, pp. 18-25
Closed Access | Times Cited: 62

A prediction system of Sybil attack in social network using deep-regression model
Muhammad Al‐Qurishi, Majed Alrubaian, Sk. Md. Mizanur Rahman, et al.
Future Generation Computer Systems (2017) Vol. 87, pp. 743-753
Closed Access | Times Cited: 59

Deep Learning-Enabled Threat Intelligence Scheme in the Internet of Things Networks
Muna Al-Hawawreh, Nour Moustafa, Sahil Garg, et al.
IEEE Transactions on Network Science and Engineering (2020) Vol. 8, Iss. 4, pp. 2968-2981
Closed Access | Times Cited: 45

Crowdsourcing Under Data Poisoning Attacks: A Comparative Study
Farnaz Tahmasebian, Li Xiong, Mani Sotoodeh, et al.
Lecture notes in computer science (2020), pp. 310-332
Open Access | Times Cited: 39

Decentralizing science: Towards an interoperable open peer review ecosystem using blockchain
Antonio Tenorio-Fornés, Elena Pérez Tirador, Antonio A. Sánchez‐Ruiz, et al.
Information Processing & Management (2021) Vol. 58, Iss. 6, pp. 102724-102724
Open Access | Times Cited: 36

User trustworthiness in online social networks: A systematic review
Majed A Alkhamees, Saleh M. Al-Saleem, Muhammad Al‐Qurishi, et al.
Applied Soft Computing (2021) Vol. 103, pp. 107159-107159
Closed Access | Times Cited: 35

Cybersecurity and Forensics in Connected Autonomous Vehicles: A Review of the State-of-the-Art
Prinkle Sharma, James H. Gillanders
IEEE Access (2022) Vol. 10, pp. 108979-108996
Open Access | Times Cited: 27

Social Networks a Machinery to Commit Suicide: Cyber Bullying and Virtual Games Leading to Cruelty—A Case on Indian Youth
Soumya Jose
Advances in Science, Technology & Innovation/Advances in science, technology & innovation (2025), pp. 23-30
Closed Access

Future IoT‐enabled threats and vulnerabilities: State of the art, challenges, and future prospects
Astha Srivastava, Shashank Gupta, Megha Quamara, et al.
International Journal of Communication Systems (2020) Vol. 33, Iss. 12
Closed Access | Times Cited: 36

DeepFriend: finding abnormal nodes in online social networks using dynamic deep learning
Putra Wanda, Huang J. Jie
Social Network Analysis and Mining (2021) Vol. 11, Iss. 1
Closed Access | Times Cited: 32

A survey of Sybil attack countermeasures in IoT-based wireless sensor networks
Akashah Arshad, Zurina Mohd Hanapi, Shamala Subramaniam, et al.
PeerJ Computer Science (2021) Vol. 7, pp. e673-e673
Open Access | Times Cited: 29

A social network of crime: A review of the use of social networks for crime and the detection of crime
Brett Drury, Samuel Morais Drury, Md. Arafatur Rahman, et al.
Online Social Networks and Media (2022) Vol. 30, pp. 100211-100211
Open Access | Times Cited: 19

Models for information propagation on graphs
Oliver R. A. Dunbar, Charles M. Elliott, Lisa Maria Kreußer
European Journal of Applied Mathematics (2025), pp. 1-22
Open Access

A survey of social cybersecurity: Techniques for attack detection, evaluations, challenges, and future prospects
Aos Mulahuwaish, Basheer Qolomany, Kevin Gyorick, et al.
Computers in Human Behavior Reports (2025), pp. 100668-100668
Open Access

Peer-to-Peer-Based Social Networks: A Comprehensive Survey
Newton Masinde, Kálmán Graffi
SN Computer Science (2020) Vol. 1, Iss. 5
Open Access | Times Cited: 32

Page 1 - Next Page

Scroll to top