
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Novel Stream Clustering Framework for Spam Detection in Twitter
Hadi Tajalizadeh, Reza Boostani
IEEE Transactions on Computational Social Systems (2019) Vol. 6, Iss. 3, pp. 525-534
Closed Access | Times Cited: 51
Hadi Tajalizadeh, Reza Boostani
IEEE Transactions on Computational Social Systems (2019) Vol. 6, Iss. 3, pp. 525-534
Closed Access | Times Cited: 51
Showing 1-25 of 51 citing articles:
A Survey of Sentiment Analysis from Social Media Data
Koyel Chakraborty, Siddhartha Bhattacharyya, Rajib Bag
IEEE Transactions on Computational Social Systems (2020) Vol. 7, Iss. 2, pp. 450-464
Closed Access | Times Cited: 149
Koyel Chakraborty, Siddhartha Bhattacharyya, Rajib Bag
IEEE Transactions on Computational Social Systems (2020) Vol. 7, Iss. 2, pp. 450-464
Closed Access | Times Cited: 149
A review on social spam detection: Challenges, open issues, and future directions
Sanjeev Rao, Anil Kumar Verma, Tarunpreet Bhatia
Expert Systems with Applications (2021) Vol. 186, pp. 115742-115742
Closed Access | Times Cited: 139
Sanjeev Rao, Anil Kumar Verma, Tarunpreet Bhatia
Expert Systems with Applications (2021) Vol. 186, pp. 115742-115742
Closed Access | Times Cited: 139
Competition-Driven Multimodal Multiobjective Optimization and Its Application to Feature Selection for Credit Card Fraud Detection
Shoufei Han, Kun Zhu, MengChu Zhou, et al.
IEEE Transactions on Systems Man and Cybernetics Systems (2022) Vol. 52, Iss. 12, pp. 7845-7857
Closed Access | Times Cited: 58
Shoufei Han, Kun Zhu, MengChu Zhou, et al.
IEEE Transactions on Systems Man and Cybernetics Systems (2022) Vol. 52, Iss. 12, pp. 7845-7857
Closed Access | Times Cited: 58
Contents-Based Spam Detection on Social Networks Using RoBERTa Embedding and Stacked BLSTM
Razan Ghanem, Hasan Erbay, Khaled Bakour
SN Computer Science (2023) Vol. 4, Iss. 4
Closed Access | Times Cited: 25
Razan Ghanem, Hasan Erbay, Khaled Bakour
SN Computer Science (2023) Vol. 4, Iss. 4
Closed Access | Times Cited: 25
A review on trust management in fog/edge computing: Techniques, trends, and challenges
Mohammad Nikravan, Mostafa Haghi Kashani
Journal of Network and Computer Applications (2022) Vol. 204, pp. 103402-103402
Closed Access | Times Cited: 30
Mohammad Nikravan, Mostafa Haghi Kashani
Journal of Network and Computer Applications (2022) Vol. 204, pp. 103402-103402
Closed Access | Times Cited: 30
A hybrid Data-Driven framework for Spam detection in Online Social Network
Chanchal Kumar, Taran Singh Bharti, Shiv Prakash
Procedia Computer Science (2023) Vol. 218, pp. 124-132
Open Access | Times Cited: 16
Chanchal Kumar, Taran Singh Bharti, Shiv Prakash
Procedia Computer Science (2023) Vol. 218, pp. 124-132
Open Access | Times Cited: 16
Classification of spammer and nonspammer content in online social network using genetic algorithm-based feature selection
Somya Ranjan Sahoo, Brij B. Gupta
Enterprise Information Systems (2020) Vol. 14, Iss. 5, pp. 710-736
Closed Access | Times Cited: 40
Somya Ranjan Sahoo, Brij B. Gupta
Enterprise Information Systems (2020) Vol. 14, Iss. 5, pp. 710-736
Closed Access | Times Cited: 40
Learning textual features for Twitter spam detection: A systematic literature review
Sepideh Bazzaz Abkenar, Mostafa Haghi Kashani, Mohammad Akbari, et al.
Expert Systems with Applications (2023) Vol. 228, pp. 120366-120366
Closed Access | Times Cited: 15
Sepideh Bazzaz Abkenar, Mostafa Haghi Kashani, Mohammad Akbari, et al.
Expert Systems with Applications (2023) Vol. 228, pp. 120366-120366
Closed Access | Times Cited: 15
Quantum behaved Binary Gravitational Search Algorithm with Random Forest for Twitter Spammer Detection
S. Prasad, Girdhari Lal, Madhu Shukla, et al.
Results in Engineering (2025), pp. 103993-103993
Open Access
S. Prasad, Girdhari Lal, Madhu Shukla, et al.
Results in Engineering (2025), pp. 103993-103993
Open Access
Threats on online social network platforms: classification, detection, and prevention techniques
Akash Shah, Sapna Varshney, Monica Mehrotra
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 3
Akash Shah, Sapna Varshney, Monica Mehrotra
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 3
SpADe: Multi-Stage Spam Account Detection for Online Social Networks
Federico Concone, Giuseppe Lo Re, Marco Morana, et al.
IEEE Transactions on Dependable and Secure Computing (2022) Vol. 20, Iss. 4, pp. 3128-3143
Open Access | Times Cited: 14
Federico Concone, Giuseppe Lo Re, Marco Morana, et al.
IEEE Transactions on Dependable and Secure Computing (2022) Vol. 20, Iss. 4, pp. 3128-3143
Open Access | Times Cited: 14
Specious Sites: Tracking the Spread and Sway of Spurious News Stories at Scale
Hans W. A. Hanley, Deepak Kumar, Zakir Durumeric
2022 IEEE Symposium on Security and Privacy (SP) (2024) Vol. 3, pp. 1609-1627
Closed Access | Times Cited: 2
Hans W. A. Hanley, Deepak Kumar, Zakir Durumeric
2022 IEEE Symposium on Security and Privacy (SP) (2024) Vol. 3, pp. 1609-1627
Closed Access | Times Cited: 2
Unsupervised online anomaly detection in Software Defined Network environments
Gustavo Frigo Scaranti, Luiz F. Carvalho, Sylvio Barbon, et al.
Expert Systems with Applications (2021) Vol. 191, pp. 116225-116225
Open Access | Times Cited: 12
Gustavo Frigo Scaranti, Luiz F. Carvalho, Sylvio Barbon, et al.
Expert Systems with Applications (2021) Vol. 191, pp. 116225-116225
Open Access | Times Cited: 12
Scalable Learning Framework for Detecting New Types of Twitter Spam with Misuse and Anomaly Detection
Jaeun Choi, Byunghwan Jeon, Chunmi Jeon
Sensors (2024) Vol. 24, Iss. 7, pp. 2263-2263
Open Access | Times Cited: 1
Jaeun Choi, Byunghwan Jeon, Chunmi Jeon
Sensors (2024) Vol. 24, Iss. 7, pp. 2263-2263
Open Access | Times Cited: 1
Adversarial Machine Learning on Social Network: A Survey
Sensen Guo, Xiaoyu Li, Zhiying Mu
Frontiers in Physics (2021) Vol. 9
Open Access | Times Cited: 11
Sensen Guo, Xiaoyu Li, Zhiying Mu
Frontiers in Physics (2021) Vol. 9
Open Access | Times Cited: 11
Akan veri kümeleme probleminde ağaç veri yapılarının performans karşılaştırması
Ali Şenol, Mahmut Kaya, Yavuz Canbay
Gazi Üniversitesi Mühendislik-Mimarlık Fakültesi Dergisi (2023) Vol. 39, Iss. 1, pp. 217-232
Open Access | Times Cited: 4
Ali Şenol, Mahmut Kaya, Yavuz Canbay
Gazi Üniversitesi Mühendislik-Mimarlık Fakültesi Dergisi (2023) Vol. 39, Iss. 1, pp. 217-232
Open Access | Times Cited: 4
ARD-Stream: An adaptive radius density-based stream clustering
Azadeh Faroughi, Reza Boostani, Hadi Tajalizadeh, et al.
Future Generation Computer Systems (2023) Vol. 149, pp. 416-431
Closed Access | Times Cited: 4
Azadeh Faroughi, Reza Boostani, Hadi Tajalizadeh, et al.
Future Generation Computer Systems (2023) Vol. 149, pp. 416-431
Closed Access | Times Cited: 4
Discovering and Ranking Urban Social Clusters Out of Streaming Social Media Datasets
Mete Çelik, Ahmet Şakir Dokuz, Alper Ecemiş, et al.
Concurrency and Computation Practice and Experience (2024)
Closed Access | Times Cited: 1
Mete Çelik, Ahmet Şakir Dokuz, Alper Ecemiş, et al.
Concurrency and Computation Practice and Experience (2024)
Closed Access | Times Cited: 1
Twitter Spam Detection: A Systematic Review
Sepideh Bazzaz Abkenar, Mostafa Haghi Kashani, Mohammad Akbari, et al.
arXiv (Cornell University) (2020)
Open Access | Times Cited: 10
Sepideh Bazzaz Abkenar, Mostafa Haghi Kashani, Mohammad Akbari, et al.
arXiv (Cornell University) (2020)
Open Access | Times Cited: 10
Invisible Stories That Drive Online Social Cognition
Raksha Pavagada Subbanarasimha, Srinath Srinivasa, Sridhar Mandyam
IEEE Transactions on Computational Social Systems (2020) Vol. 7, Iss. 5, pp. 1264-1277
Closed Access | Times Cited: 9
Raksha Pavagada Subbanarasimha, Srinath Srinivasa, Sridhar Mandyam
IEEE Transactions on Computational Social Systems (2020) Vol. 7, Iss. 5, pp. 1264-1277
Closed Access | Times Cited: 9
A novel hybrid approach of gravitational search algorithm and decision tree for twitter spammer detection
Luis Vives, Gurpreet Singh Tuteja, A. Sai Manideep, et al.
International Journal of Modern Physics C (2021) Vol. 33, Iss. 05
Closed Access | Times Cited: 7
Luis Vives, Gurpreet Singh Tuteja, A. Sai Manideep, et al.
International Journal of Modern Physics C (2021) Vol. 33, Iss. 05
Closed Access | Times Cited: 7
Detecting suspicious transactions in a virtual-currency-enabled online social network
Yadong Zhou, Bowen Hu, Junjie Zhang, et al.
Journal of Network and Computer Applications (2022) Vol. 211, pp. 103555-103555
Closed Access | Times Cited: 5
Yadong Zhou, Bowen Hu, Junjie Zhang, et al.
Journal of Network and Computer Applications (2022) Vol. 211, pp. 103555-103555
Closed Access | Times Cited: 5
DME: An Adaptive and Just-in-Time Weighted Ensemble Learning Method for Classifying Block-Based Concept Drift Steam
Baoquan Feng, Yan Gu, Hualong Yu, et al.
IEEE Access (2022) Vol. 10, pp. 120578-120591
Open Access | Times Cited: 5
Baoquan Feng, Yan Gu, Hualong Yu, et al.
IEEE Access (2022) Vol. 10, pp. 120578-120591
Open Access | Times Cited: 5
A Multi-classifier Framework for Detecting Spam and Fake Spam Messages in Twitter
R. Jeberson Retna Raj, Senduru Srinivasulu, Aldrin Ashutosh
2022 IEEE 11th International Conference on Communication Systems and Network Technologies (CSNT) (2020), pp. 266-270
Closed Access | Times Cited: 6
R. Jeberson Retna Raj, Senduru Srinivasulu, Aldrin Ashutosh
2022 IEEE 11th International Conference on Communication Systems and Network Technologies (CSNT) (2020), pp. 266-270
Closed Access | Times Cited: 6
CDEC: a constrained deep embedded clustering
Elham Amirizadeh, Reza Boostani
International Journal of Intelligent Computing and Cybernetics (2021) Vol. 14, Iss. 4, pp. 686-701
Closed Access | Times Cited: 6
Elham Amirizadeh, Reza Boostani
International Journal of Intelligent Computing and Cybernetics (2021) Vol. 14, Iss. 4, pp. 686-701
Closed Access | Times Cited: 6