OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions
Marwan Omar, Soohyeon Choi, DaeHun Nyang, et al.
IEEE Access (2022) Vol. 10, pp. 86038-86056
Open Access | Times Cited: 61

Showing 1-25 of 61 citing articles:

Foundations of Large Language Models in Software Vulnerability Detection
Hewa Majeed Zangana, Derek Mohammed
Advances in information security, privacy, and ethics book series (2024), pp. 41-74
Closed Access | Times Cited: 15

Harnessing the Speed and Accuracy of Machine Learning to Advance Cybersecurity
Rebet Jones, Marwan Omar, Derek Mohammed, et al.
(2023), pp. 418-421
Closed Access | Times Cited: 31

Large Language Models with Controllable Working Memory
Daliang Li, Ankit Singh Rawat, Manzil Zaheer, et al.
Findings of the Association for Computational Linguistics: ACL 2022 (2023), pp. 1774-1793
Open Access | Times Cited: 22

Harnessing the Power of Large Language Models for Cybersecurity
Hewa Majeed Zangana, Marwan Omar
Advances in information security, privacy, and ethics book series (2024), pp. 1-40
Closed Access | Times Cited: 14

Codesentry: Revolutionizing Real-Time Software Vulnerability Detection With Optimized GPT Framework
A. Jones, Marwan Omar
Revista Academiei Forţelor Terestre (2024) Vol. 29, Iss. 1, pp. 98-107
Open Access | Times Cited: 10

Codeguard: Utilizing Advanced Pattern Recognition in Language Models for Software Vulnerability Analysis
Rebet Jones, Marwan Omar
Revista Academiei Forţelor Terestre (2024) Vol. 29, Iss. 1, pp. 108-118
Open Access | Times Cited: 8

Harnessing GPT-2 for Feature Extraction in Malware Detection: A Novel Approach to Cybersecurity
Mahmoud Basharat, Marwan Omar
Revista Academiei Forţelor Terestre (2024) Vol. 29, Iss. 1, pp. 74-84
Open Access | Times Cited: 8

VulDetect: A novel technique for detecting software vulnerabilities using Language Models
Marwan Omar, Stavros Shiaeles
(2023), pp. 105-110
Closed Access | Times Cited: 19

VulDefend: A Novel Technique based on Pattern-exploiting Training for Detecting Software Vulnerabilities Using Language Models
Marwan Omar
2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT) (2023), pp. 287-293
Closed Access | Times Cited: 18

Decision Trees Unleashed
Derek Mohammed, Marwan Omar
Advances in medical technologies and clinical practice book series (2024), pp. 240-258
Closed Access | Times Cited: 6

Optimizing Chatbot Effectiveness through Advanced Syntactic Analysis: A Comprehensive Study in Natural Language Processing
Iván Ortiz-Garcés, Jaime Govea, Roberto Andrade, et al.
Applied Sciences (2024) Vol. 14, Iss. 5, pp. 1737-1737
Open Access | Times Cited: 6

SecuGuard: Leveraging pattern-exploiting training in language models for advanced software vulnerability detection
Mahmoud Basharat, Marwan Omar
International Journal of Mathematics and Computer in Engineering (2024) Vol. 3, Iss. 1, pp. 47-56
Open Access | Times Cited: 5

An Overview on Language Models: Recent Developments and Outlook
Chengwei Wei, Yun-Cheng Wang, Bin Wang, et al.
arXiv (Cornell University) (2023)
Open Access | Times Cited: 13

Adversarial attacks and defenses for large language models (LLMs): methods, frameworks & challenges
Pranjal Kumar
International Journal of Multimedia Information Retrieval (2024) Vol. 13, Iss. 3
Closed Access | Times Cited: 4

Navigating the Future of Educational Research: Leveraging Generative AI for Improved Insights
M. Poornesh
The Clearing House A Journal of Educational Strategies Issues and Ideas (2025), pp. 1-8
Closed Access

Dynamic Neural Network Models for Time-Varying Problem Solving: A Survey on Model Structures
Cheng Hua, Xinwei Cao, Qian Xu, et al.
IEEE Access (2023) Vol. 11, pp. 65991-66008
Open Access | Times Cited: 11

Data Sorting Influence on Short Text Manual Labeling Quality for Hierarchical Classification
Olga Narushynska, Vasyl Teslyuk, Anastasiya Doroshenko, et al.
Big Data and Cognitive Computing (2024) Vol. 8, Iss. 4, pp. 41-41
Open Access | Times Cited: 3

Integration of LLMs With Traditional Security Tools
Rebet Jones, A. Jones
Advances in information security, privacy, and ethics book series (2024), pp. 295-334
Closed Access | Times Cited: 3

Detecting IoT Malware with Knowledge Distillation Technique
Rebet Jones, Marwan Omar
(2023), pp. 131-135
Closed Access | Times Cited: 8

IoT Malware Detection with GPT Models
Rebet Jones, Marwan Omar, Derek Mohammed, et al.
(2023), pp. 1749-1752
Closed Access | Times Cited: 8

Harnessing the Power of the GPT Model to Generate Adversarial Examples
Rebet Jones, Marwan Omar, Derek Mohammed
(2023), pp. 1699-1702
Closed Access | Times Cited: 7

Automated Evidence Collection and Analysis Using AI
Luay Albtosh
Advances in information security, privacy, and ethics book series (2024), pp. 143-186
Closed Access | Times Cited: 2

Exploring robust architectures for deep artificial neural networks
Asim Waqas, Hamza Farooq, Nidhal Bouaynaya, et al.
Communications Engineering (2022) Vol. 1, Iss. 1
Open Access | Times Cited: 11

Integrating Syntactic and Semantic Knowledge in AMR Parsing with Heterogeneous Graph Attention Network
Yikemaiti Sataer, Chuanqi Shi, Miao Gao, et al.
ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2023), pp. 1-5
Closed Access | Times Cited: 6

Page 1 - Next Page

Scroll to top