OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Charting the Landscape of Online Cryptocurrency Manipulation
Leonardo Nizzoli, Serena Tardelli, Marco Avvenuti, et al.
IEEE Access (2020) Vol. 8, pp. 113230-113245
Open Access | Times Cited: 101

Showing 1-25 of 101 citing articles:

A decade of social bot detection
Stefano Cresci
Communications of the ACM (2020) Vol. 63, Iss. 10, pp. 72-83
Open Access | Times Cited: 224

A Novel Cryptocurrency Price Prediction Model Using GRU, LSTM and bi-LSTM Machine Learning Algorithms
Mohammad J. Hamayel, Amani Yousef Owda
AI (2021) Vol. 2, Iss. 4, pp. 477-496
Open Access | Times Cited: 191

Botometer 101: social bot practicum for computational social scientists
Kai‐Cheng Yang, Emilio Ferrara, Filippo Menczer
Journal of Computational Social Science (2022) Vol. 5, Iss. 2, pp. 1511-1528
Open Access | Times Cited: 90

Cryptocurrencies: A Brief Thematic Review
Usman W. Chohan
SSRN Electronic Journal (2017)
Closed Access | Times Cited: 152

Coordinated Behavior on Social Media in 2019 UK General Election
Leonardo Nizzoli, Serena Tardelli, Marco Avvenuti, et al.
Proceedings of the International AAAI Conference on Web and Social Media (2021) Vol. 15, pp. 443-454
Open Access | Times Cited: 66

Detecting cryptocurrency pump-and-dump frauds using market and social signals
Huy Nghiem, Goran Murić, Fred Morstatter, et al.
Expert Systems with Applications (2021) Vol. 182, pp. 115284-115284
Closed Access | Times Cited: 57

A systematic review of the use of topic models for short text social media analysis
Caitlin Doogan, Wray Buntine, Henry Linger
Artificial Intelligence Review (2023) Vol. 56, Iss. 12, pp. 14223-14255
Open Access | Times Cited: 38

Tracking Fringe and Coordinated Activity on Twitter Leading Up to the US Capitol Attack
Padinjaredath Suresh Vishnuprasad, Gianluca Nogara, Felipe Maciel Cardoso, et al.
Proceedings of the International AAAI Conference on Web and Social Media (2024) Vol. 18, pp. 1557-1570
Open Access | Times Cited: 10

The COVID‐19 scamdemic: A survey of phishing attacks and their countermeasures during COVID‐19
Ali Fahad Al-Qahtani, Stefano Cresci
IET Information Security (2022) Vol. 16, Iss. 5, pp. 324-345
Open Access | Times Cited: 33

The Doge of Wall Street: Analysis and Detection of Pump and Dump Cryptocurrency Manipulations
Massimo La Morgia, Alessandro Mei, Francesco Sassi, et al.
ACM Transactions on Internet Technology (2022) Vol. 23, Iss. 1, pp. 1-28
Open Access | Times Cited: 31

Rethinking "Risk" in Algorithmic Systems Through A Computational Narrative Analysis of Casenotes in Child-Welfare
Devansh Saxena, Erina Seh-Young Moon, Aryan Chaurasia, et al.
(2023), pp. 1-19
Open Access | Times Cited: 16

Simplistic Collection and Labeling Practices Limit the Utility of Benchmark Datasets for Twitter Bot Detection
Chris Hays, Zachary Schutzman, Manish Raghavan, et al.
Proceedings of the ACM Web Conference 2022 (2023), pp. 3660-3669
Open Access | Times Cited: 16

How does Twitter account moderation work? Dynamics of account creation and suspension on Twitter during major geopolitical events
Francesco Pierri, Luca Luceri, Emily Chen, et al.
EPJ Data Science (2023) Vol. 12, Iss. 1
Open Access | Times Cited: 16

Influencers and Consumer Financial Decision‐Making
Dirk Gerritsen, Anouk de Regt
International Journal of Consumer Studies (2025) Vol. 49, Iss. 2
Open Access

Tracing Cryptocurrency Scams: Clustering Replicated Advance-Fee and Phishing Websites
Ross C. Phillips, Heidi Wilder
2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) (2020), pp. 1-8
Open Access | Times Cited: 48

A Survey on the Use of Graph Convolutional Networks for Combating Fake News
Iraklis Varlamis, Dimitrios Michail, Foteini Glykou, et al.
Future Internet (2022) Vol. 14, Iss. 3, pp. 70-70
Open Access | Times Cited: 26

The shift of DarkNet illegal drug trade preferences in cryptocurrency: The question of traceability and deterrence
Katsiaryna Bahamazava, Rohan Nanda
Forensic Science International Digital Investigation (2022) Vol. 40, pp. 301377-301377
Closed Access | Times Cited: 22

Public Opinion Manipulation on Social Media: Social Network Analysis of Twitter Bots during the COVID-19 Pandemic
Zixuan Weng, Aijun Lin
International Journal of Environmental Research and Public Health (2022) Vol. 19, Iss. 24, pp. 16376-16376
Open Access | Times Cited: 22

Unraveling the Italian and English Telegram Conspiracy Spheres Through Message Forwarding
Lorenzo Alvisi, Serena Tardelli, Maurizio Tesconi
Lecture notes in computer science (2025), pp. 204-213
Closed Access

Development of a cryptocurrency price prediction model: leveraging GRU and LSTM for Bitcoin, Litecoin and Ethereum
Ramneet Kaur, Mudita Uppal, Deepali Gupta, et al.
PeerJ Computer Science (2025) Vol. 11, pp. e2675-e2675
Open Access

Blockchain and crypto forensics: Investigating crypto frauds
Udit Agarwal, Vinay Rishiwal, Sudeep Tanwar, et al.
International Journal of Network Management (2023) Vol. 34, Iss. 2
Closed Access | Times Cited: 12

Scams and Solutions in Cryptocurrencies—A Survey Analyzing Existing Machine Learning Models
Lakshmi P. Krishnan, Iman Vakilinia, Sandeep Reddivari, et al.
Information (2023) Vol. 14, Iss. 3, pp. 171-171
Open Access | Times Cited: 11

Sequence-Based Target Coin Prediction for Cryptocurrency Pump-and-Dump
Sihao Hu, Zhen Zhang, Shengliang Lu, et al.
Proceedings of the ACM on Management of Data (2023) Vol. 1, Iss. 1, pp. 1-19
Open Access | Times Cited: 10

Bots in Social and Interaction Networks
Marcelo Mendoza, Maurizio Tesconi, Stefano Cresci
ACM transactions on office information systems (2020) Vol. 39, Iss. 1, pp. 1-32
Closed Access | Times Cited: 28

Detection of fake news campaigns using graph convolutional networks
Dimitrios Michail, Nikos Kanakaris, Iraklis Varlamis
International Journal of Information Management Data Insights (2022) Vol. 2, Iss. 2, pp. 100104-100104
Open Access | Times Cited: 18

Page 1 - Next Page

Scroll to top