
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Grooming Detection using Fuzzy-Rough Feature Selection and Text Classification
Zheming Zuo, Jie Li, Philip Anderson, et al.
2022 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) (2018) Vol. 59, pp. 1-8
Open Access | Times Cited: 35
Zheming Zuo, Jie Li, Philip Anderson, et al.
2022 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) (2018) Vol. 59, pp. 1-8
Open Access | Times Cited: 35
Showing 1-25 of 35 citing articles:
A framework of blockchain-based secure and privacy-preserving E-government system
Noe Elisa, Longzhi Yang, Fei Chao, et al.
Wireless Networks (2018) Vol. 29, Iss. 3, pp. 1005-1015
Open Access | Times Cited: 130
Noe Elisa, Longzhi Yang, Fei Chao, et al.
Wireless Networks (2018) Vol. 29, Iss. 3, pp. 1005-1015
Open Access | Times Cited: 130
Feature selection methods for text classification: a systematic literature review
Julliano Trindade Pintas, Leandro A. F. Fernandes, Ana Cristina Bicharra García
Artificial Intelligence Review (2021) Vol. 54, Iss. 8, pp. 6149-6200
Closed Access | Times Cited: 95
Julliano Trindade Pintas, Leandro A. F. Fernandes, Ana Cristina Bicharra García
Artificial Intelligence Review (2021) Vol. 54, Iss. 8, pp. 6149-6200
Closed Access | Times Cited: 95
A Human-Centered Systematic Literature Review of the Computational Approaches for Online Sexual Risk Detection
Afsaneh Razi, Seung-Hyun Kim, Ashwaq Alsoubai, et al.
Proceedings of the ACM on Human-Computer Interaction (2021) Vol. 5, Iss. CSCW2, pp. 1-38
Open Access | Times Cited: 68
Afsaneh Razi, Seung-Hyun Kim, Ashwaq Alsoubai, et al.
Proceedings of the ACM on Human-Computer Interaction (2021) Vol. 5, Iss. CSCW2, pp. 1-38
Open Access | Times Cited: 68
Cyber-aggression, Cyberbullying, and Cyber-grooming
Miljana Mladenović, Vera Ošmjanski, Staša Vujičić Stanković
ACM Computing Surveys (2021) Vol. 54, Iss. 1, pp. 1-42
Closed Access | Times Cited: 50
Miljana Mladenović, Vera Ošmjanski, Staša Vujičić Stanković
ACM Computing Surveys (2021) Vol. 54, Iss. 1, pp. 1-42
Closed Access | Times Cited: 50
Effectiveness of machine learning methods in detecting grooming: a systematic meta-analytic review
Marcelo Leiva‐Bianchi, Nicolás Castillo, César A. Astudillo, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Marcelo Leiva‐Bianchi, Nicolás Castillo, César A. Astudillo, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Machine Learning Algorithms for Network Intrusion Detection
Jie Li, Yanpeng Qu, Fei Chao, et al.
Intelligent systems reference library (2018), pp. 151-179
Closed Access | Times Cited: 49
Jie Li, Yanpeng Qu, Fei Chao, et al.
Intelligent systems reference library (2018), pp. 151-179
Closed Access | Times Cited: 49
Blockchain Based Chameleon Hashing Technique for Privacy Preservation in E-Governance System
M. V. Ranjith Kumar, N. Bhalaji
Wireless Personal Communications (2020) Vol. 117, Iss. 2, pp. 987-1006
Closed Access | Times Cited: 36
M. V. Ranjith Kumar, N. Bhalaji
Wireless Personal Communications (2020) Vol. 117, Iss. 2, pp. 987-1006
Closed Access | Times Cited: 36
Data Anonymization for Pervasive Health Care: Systematic Literature Mapping Study
Zheming Zuo, Matthew Watson, David Budgen, et al.
JMIR Medical Informatics (2021) Vol. 9, Iss. 10, pp. e29871-e29871
Open Access | Times Cited: 31
Zheming Zuo, Matthew Watson, David Budgen, et al.
JMIR Medical Informatics (2021) Vol. 9, Iss. 10, pp. e29871-e29871
Open Access | Times Cited: 31
Review of Survey Research in Fuzzy Approach for Text Mining
Yi-Wei Lai, Mu‐Yen Chen
IEEE Access (2023) Vol. 11, pp. 39635-39649
Open Access | Times Cited: 10
Yi-Wei Lai, Mu‐Yen Chen
IEEE Access (2023) Vol. 11, pp. 39635-39649
Open Access | Times Cited: 10
Feature Extraction with TF-IDF and Game-Theoretic Shadowed Sets
Zhang Yan, Yue Zhou, JingTao Yao
Communications in computer and information science (2020), pp. 722-733
Open Access | Times Cited: 24
Zhang Yan, Yue Zhou, JingTao Yao
Communications in computer and information science (2020), pp. 722-733
Open Access | Times Cited: 24
Curvature-based feature selection with application in classifying electronic health records
Zheming Zuo, Jie Li, Han Xu, et al.
Technological Forecasting and Social Change (2021) Vol. 173, pp. 121127-121127
Open Access | Times Cited: 20
Zheming Zuo, Jie Li, Han Xu, et al.
Technological Forecasting and Social Change (2021) Vol. 173, pp. 121127-121127
Open Access | Times Cited: 20
How to take advantage of behavioral features for the early detection of grooming in online conversations
Daniela Fernanda Milon Flores
(2022)
Open Access | Times Cited: 12
Daniela Fernanda Milon Flores
(2022)
Open Access | Times Cited: 12
Dendritic Cell Algorithm with Fuzzy Inference System for Input Signal Generation
Noe Elisa, Jie Li, Zheming Zuo, et al.
Advances in intelligent systems and computing (2018), pp. 203-214
Closed Access | Times Cited: 17
Noe Elisa, Jie Li, Zheming Zuo, et al.
Advances in intelligent systems and computing (2018), pp. 203-214
Closed Access | Times Cited: 17
Child Safety and Protection in the Online Gaming Ecosystem
Anum Faraz, Jinane Mounsef, Ali Raza, et al.
IEEE Access (2022) Vol. 10, pp. 115895-115913
Open Access | Times Cited: 9
Anum Faraz, Jinane Mounsef, Ali Raza, et al.
IEEE Access (2022) Vol. 10, pp. 115895-115913
Open Access | Times Cited: 9
Enhancing Child Safety in Online Gaming: The Development and Application of Protectbot, an AI-Powered Chatbot Framework
Anum Faraz, Fardin Ahsan, Jinane Mounsef, et al.
Information (2024) Vol. 15, Iss. 4, pp. 233-233
Open Access | Times Cited: 1
Anum Faraz, Fardin Ahsan, Jinane Mounsef, et al.
Information (2024) Vol. 15, Iss. 4, pp. 233-233
Open Access | Times Cited: 1
Adaptive Activation Function Generation for Artificial Neural Networks through Fuzzy Inference with Application in Grooming Text Categorisation
Zheming Zuo, Jie Li, Bo Wei, et al.
2022 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) (2019) Vol. 30, pp. 1-6
Open Access | Times Cited: 13
Zheming Zuo, Jie Li, Bo Wei, et al.
2022 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) (2019) Vol. 30, pp. 1-6
Open Access | Times Cited: 13
An Intelligent Online Grooming Detection System Using AI Technologies
Philip Anderson, Zheming Zuo, Longzhi Yang, et al.
2022 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) (2019), pp. 1-6
Open Access | Times Cited: 13
Philip Anderson, Zheming Zuo, Longzhi Yang, et al.
2022 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) (2019), pp. 1-6
Open Access | Times Cited: 13
A multi-subpopulation bacterial foraging optimisation algorithm with deletion and immigration strategies for unmanned surface vehicle path planning
Yang Long, Yixin Su, Binghua Shi, et al.
Intelligent Service Robotics (2021) Vol. 14, Iss. 2, pp. 303-312
Closed Access | Times Cited: 10
Yang Long, Yixin Su, Binghua Shi, et al.
Intelligent Service Robotics (2021) Vol. 14, Iss. 2, pp. 303-312
Closed Access | Times Cited: 10
A Revised Dendritic Cell Algorithm Using K-Means Clustering
Noe Elisa, Longzhi Yang, Yanpeng Qu, et al.
(2018), pp. 1547-1554
Open Access | Times Cited: 9
Noe Elisa, Longzhi Yang, Yanpeng Qu, et al.
(2018), pp. 1547-1554
Open Access | Times Cited: 9
Enhanced Gradient-Based Local Feature Descriptors by Saliency Map for Egocentric Action Recognition
Zheming Zuo, Bo Wei, Fei Chao, et al.
Applied System Innovation (2019) Vol. 2, Iss. 1, pp. 7-7
Open Access | Times Cited: 7
Zheming Zuo, Bo Wei, Fei Chao, et al.
Applied System Innovation (2019) Vol. 2, Iss. 1, pp. 7-7
Open Access | Times Cited: 7
Cybercrime and Video Games: Exploring children's safety in the gaming environment.
Matteo Curcio
(2023) Vol. 17, pp. 144-148
Closed Access | Times Cited: 2
Matteo Curcio
(2023) Vol. 17, pp. 144-148
Closed Access | Times Cited: 2
Fuzzy Rough Set Theory‐Based Feature Selection
Tanmoy Som, Shivam Shreevastava, Anoop Kumar Tiwari, et al.
(2020), pp. 145-166
Closed Access | Times Cited: 6
Tanmoy Som, Shivam Shreevastava, Anoop Kumar Tiwari, et al.
(2020), pp. 145-166
Closed Access | Times Cited: 6
Using Natural Language Processing and Machine Learning to Detect Online Grooming Attacks
Jake Street, Funminiyi Olajide
Advances in intelligent systems and computing (2024), pp. 261-270
Closed Access
Jake Street, Funminiyi Olajide
Advances in intelligent systems and computing (2024), pp. 261-270
Closed Access
Classification of Online Grooming on Chat Logs Using Two Term Weighting Schemes
Nur Rafeeqkha Sulaiman, Maheyzah Md Siraj
International Journal of Innovative Computing (2019) Vol. 9, Iss. 2
Open Access | Times Cited: 4
Nur Rafeeqkha Sulaiman, Maheyzah Md Siraj
International Journal of Innovative Computing (2019) Vol. 9, Iss. 2
Open Access | Times Cited: 4
Curvature-Based Sparse Rule Base Generation for Fuzzy Interpolation Using Menger Curvature
Zheming Zuo, Jie Li, Longzhi Yang
Advances in intelligent systems and computing (2019), pp. 53-65
Closed Access | Times Cited: 3
Zheming Zuo, Jie Li, Longzhi Yang
Advances in intelligent systems and computing (2019), pp. 53-65
Closed Access | Times Cited: 3