OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Measuring and Analyzing Search Engine Poisoning of Linguistic Collisions
Matthew Joslin, Neng Li, Shuang Hao, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2019), pp. 1311-1325
Open Access | Times Cited: 8

Showing 8 citing articles:

Unravelling Ariadne’s Thread: Exploring the Threats of Decentralised DNS
Constantinos Patsakis, Fran Casino, Nikolaos Lykousas, et al.
IEEE Access (2020) Vol. 8, pp. 118559-118571
Open Access | Times Cited: 24

Secure IoT Search Engine: Survey, Challenges Issues, Case Study, and Future Research Direction
William G. Hatcher, Cheng Qian, Fan Liang, et al.
IEEE Internet of Things Journal (2022) Vol. 9, Iss. 18, pp. 16807-16823
Closed Access | Times Cited: 9

"Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences
Daniel Olszewski, A. Lu, Carson Stillman, et al.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2023), pp. 3433-3459
Closed Access | Times Cited: 5

On the social and technical challenges of Web search autosuggestion moderation
Timothy J. Hazen, Alexandra Olteanu, Gabriella Kazai, et al.
First Monday (2022)
Open Access | Times Cited: 5

Search & Catch: Detecting Promotion Infection in the Underground through Search Engines
Ronghai Yang, Jia Liu, Liang Gu, et al.
2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (2020), pp. 1566-1571
Closed Access | Times Cited: 5

Scalable Detection of Promotional Website Defacements in Black Hat SEO Campaigns.
Ronghai Yang, Xianbo Wang, Cheng Chi, et al.
(2021), pp. 3703-3720
Closed Access | Times Cited: 4

Algorithms, Users
Betsy Van der Veer Martens
Synthesis lectures on information concepts, retrieval, and services (2023), pp. 141-154
Closed Access

Measurement of Illegal Android Gambling App Ecosystem From Joint Promotion Perspective
Yadi Han, Shanshan Wang, Yiwen Li, et al.
2022 IEEE 9th International Conference on Data Science and Advanced Analytics (DSAA) (2023), pp. 1-11
Closed Access

Page 1

Scroll to top