OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Soft-Label for Multi-Domain Fake News Detection
Daokang Wang, Wubo Zhang, Wenhuan Wu, et al.
IEEE Access (2023) Vol. 11, pp. 98596-98606
Open Access | Times Cited: 29

Showing 1-25 of 29 citing articles:

Towards a semi-supervised ensemble clustering framework with flexible weighting mechanism and constraints information
Jing Tang, Decheng Xu, Qingwei Cai, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 136, pp. 108976-108976
Closed Access | Times Cited: 6

An Intelligent GUI Enhancements a Robust Model for Detecting Fake News
Raji Krishna, D. Jayanthi, Naveen Kumar Maurya, et al.
(2025), pp. 221-234
Closed Access

SmoothDectector: A Smoothed Dirichlet Multimodal Approach for Combating Fake News on Social Media
Akinlolu Oluwabusayo Ojo, Fatma Najar, Nuha Zamzami, et al.
IEEE Access (2025) Vol. 13, pp. 39289-39305
Open Access

Network anomaly detection and security defense technology based on machine learning: A review
Ruixiao Liu, Jing Shi, Xingyu Chen, et al.
Computers & Electrical Engineering (2024) Vol. 119, pp. 109581-109581
Closed Access | Times Cited: 4

A Two-branch Edge Guided Lightweight Network for infrared image saliency detection
Zhaoying Liu, Xiang Li, Ting Zhang, et al.
Computers & Electrical Engineering (2024) Vol. 118, pp. 109296-109296
Open Access | Times Cited: 3

Federated learning-guided intrusion detection and neural key exchange for safeguarding patient data on the internet of medical things
Chongzhou Zhong, Arindam Sarkar, Sarbajit Manna, et al.
International Journal of Machine Learning and Cybernetics (2024) Vol. 15, Iss. 12, pp. 5635-5665
Closed Access | Times Cited: 3

Towards intrusion detection in fog environments using generative adversarial network and long short-term memory network
Aiyan Qu, Qiuhui Shen, Gholamreza Ahmadi
Computers & Security (2024) Vol. 145, pp. 104004-104004
Closed Access | Times Cited: 3

Converging Technologies for Health Prediction and Intrusion Detection in Internet of Healthcare Things With Matrix- Valued Neural Coordinated Federated Intelligence
Sarah A. Alzakari, Arindam Sarkar, Mohammad Zubair Khan, et al.
IEEE Access (2024) Vol. 12, pp. 99469-99498
Open Access | Times Cited: 1

Support Vector Machine (SVM) to Predict Risk Factors in the 6G Cyber Digital Transformation Process of Enterprises
Yizhou Zhao, Caishuang Hu, Rukai Wang
Wireless Personal Communications (2024)
Closed Access | Times Cited: 1

Research on Data Fusion Method for 6G Wireless Sensor Networks Based on Group Intelligence Optimization
Lei Zhang, Nor Shahniza Binti Kamal Bashah
Wireless Personal Communications (2024)
Closed Access | Times Cited: 1

Elevating Fake News Detection Through Deep Neural Networks, Encoding Fused Multi-Modal Features
Ahmed Hashim Jawad Almarashy, Mohammad‐Reza Feizi‐Derakhshi, Pedram Salehpour
IEEE Access (2024) Vol. 12, pp. 82146-82155
Open Access | Times Cited: 1

Detecção de Fake News em Domínios Cruzados: Uma Revisão Sistemática
Rafael Rodrigues Braz, Luciano Antônio Digiampietri
(2024), pp. 75-88
Closed Access | Times Cited: 1

Target detection and classification via EfficientDet and CNN over unmanned aerial vehicles
Muhammad Ovais Yusuf, Muhammad Hanzla, Naif Al Mudawi, et al.
Frontiers in Neurorobotics (2024) Vol. 18
Open Access | Times Cited: 1

Optimizing ash content detection and prediction in flotation tailings using a new approach to enhance feature extraction and deep learning algorithms
Ge Xu, Hangtao Liu, Maiqiang Zhou, et al.
International Journal of Coal Preparation and Utilization (2024), pp. 1-34
Closed Access | Times Cited: 1

An efficient class-dependent learning label approach using feature selection to improve multi-label classification algorithms
Hao Zhao, Panpan Li
Cluster Computing (2024) Vol. 28, Iss. 1
Closed Access | Times Cited: 1

MSCMGTB: A Novel Approach for Multimodal Social Media Content Moderation Using Hybrid Graph Theory and Bio-Inspired Optimization
Premnarayan Arya, Amit Pandey, S. Gopal Krishna Patro, et al.
IEEE Access (2024) Vol. 12, pp. 73700-73718
Open Access

A revolutionary approach to use convolutional spiking neural networks for robust intrusion detection
Yongxing Lin, Xiaoyan Xu, Hongyun Xu
Cluster Computing (2024) Vol. 27, Iss. 9, pp. 13333-13352
Closed Access

Detection of adversarial phishing attack using machine learning techniques
K. Muthamil Sudar, M Rohan, K. Vignesh
Sadhana (2024) Vol. 49, Iss. 3
Closed Access

Multi-modal deep learning framework for damage detection in social media posts
Jiale Zhang, Manyu Liao, Yanping Wang, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e2262-e2262
Open Access

Detection of Hidden Dangers in 6G Power Grid Relay Protection Based on Support Vector Machine
Benyu Li, Pinhao Mo, Hao You, et al.
Wireless Personal Communications (2024)
Closed Access

Detecting the penetration of malicious behavior in big data using hybrid algorithms
Yue Wang, Yan Shi
Signal Image and Video Processing (2024) Vol. 18, Iss. S1, pp. 919-933
Closed Access

Efficient handling of ACL policy change in SDN using reactive and proactive flow rule installation
Mudassar Hussain, Rashid Amin, Rahma Gantassi, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access

Page 1 - Next Page

Scroll to top