
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Information Sources Estimation in Time-Varying Networks
Yun Chai, Youguo Wang, Liang Zhu
IEEE Transactions on Information Forensics and Security (2021) Vol. 16, pp. 2621-2636
Closed Access | Times Cited: 21
Yun Chai, Youguo Wang, Liang Zhu
IEEE Transactions on Information Forensics and Security (2021) Vol. 16, pp. 2621-2636
Closed Access | Times Cited: 21
Showing 21 citing articles:
Locating Multi-Sources in Social Networks With a Low Infection Rate
Peican Zhu, Le Cheng, Chao Gao, et al.
IEEE Transactions on Network Science and Engineering (2022) Vol. 9, Iss. 3, pp. 1853-1865
Closed Access | Times Cited: 50
Peican Zhu, Le Cheng, Chao Gao, et al.
IEEE Transactions on Network Science and Engineering (2022) Vol. 9, Iss. 3, pp. 1853-1865
Closed Access | Times Cited: 50
Early identification of diffusion source in complex networks with evidence theory
Jie Zhao, Kang Hao Cheong
Information Sciences (2023) Vol. 642, pp. 119061-119061
Closed Access | Times Cited: 23
Jie Zhao, Kang Hao Cheong
Information Sciences (2023) Vol. 642, pp. 119061-119061
Closed Access | Times Cited: 23
Diffusion Containment in Complex Networks Through Collective Influence of Connections
Yang Liu, Guangbo Liang, Xi Wang, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 19, pp. 1510-1524
Closed Access | Times Cited: 12
Yang Liu, Guangbo Liang, Xi Wang, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 19, pp. 1510-1524
Closed Access | Times Cited: 12
Fast Outbreak Sense and Effective Source Inference via Minimum Observer Set
Yang Liu, Xi Wang, Xiaoqi Wang, et al.
IEEE/ACM Transactions on Networking (2024) Vol. 32, Iss. 4, pp. 3111-3125
Closed Access | Times Cited: 4
Yang Liu, Xi Wang, Xiaoqi Wang, et al.
IEEE/ACM Transactions on Networking (2024) Vol. 32, Iss. 4, pp. 3111-3125
Closed Access | Times Cited: 4
Locating the propagation source in complex networks with observers-based similarity measures and direction-induced search
Fan Yang, Chungui Li, Yong Peng, et al.
Soft Computing (2023) Vol. 27, Iss. 21, pp. 16059-16085
Open Access | Times Cited: 8
Fan Yang, Chungui Li, Yong Peng, et al.
Soft Computing (2023) Vol. 27, Iss. 21, pp. 16059-16085
Open Access | Times Cited: 8
Identifying Multiple Propagation Sources With Motif-Based Graph Convolutional Networks for Social Networks
Kaijun Yang, Qing Bao, Hongjun Qiu
IEEE Access (2023) Vol. 11, pp. 61630-61645
Open Access | Times Cited: 4
Kaijun Yang, Qing Bao, Hongjun Qiu
IEEE Access (2023) Vol. 11, pp. 61630-61645
Open Access | Times Cited: 4
FROST: Controlled Label Propagation for Multisource Detection
Syed Shafat Ali, Ajay Rastogi, Tarique Anwar
IEEE Transactions on Computational Social Systems (2024) Vol. 11, Iss. 5, pp. 6217-6228
Closed Access | Times Cited: 1
Syed Shafat Ali, Ajay Rastogi, Tarique Anwar
IEEE Transactions on Computational Social Systems (2024) Vol. 11, Iss. 5, pp. 6217-6228
Closed Access | Times Cited: 1
Source localization in complex networks with optimal observers based on maximum entropy sampling
Zhao-Long Hu, Hongjue Wang, Lei Sun, et al.
Expert Systems with Applications (2024) Vol. 256, pp. 124946-124946
Closed Access | Times Cited: 1
Zhao-Long Hu, Hongjue Wang, Lei Sun, et al.
Expert Systems with Applications (2024) Vol. 256, pp. 124946-124946
Closed Access | Times Cited: 1
On the Privacy Guarantees of Gossip Protocols in General Networks
Richeng Jin, Yufan Huang, Zhaoyang Zhang, et al.
IEEE Transactions on Network Science and Engineering (2023), pp. 1-16
Open Access | Times Cited: 2
Richeng Jin, Yufan Huang, Zhaoyang Zhang, et al.
IEEE Transactions on Network Science and Engineering (2023), pp. 1-16
Open Access | Times Cited: 2
Near-optimal control of a stochastic rumor spreading model with Holling II functional response function and imprecise parameters*
Liang’an Huo, Xiaohong Chen
Chinese Physics B (2021) Vol. 30, Iss. 12, pp. 120205-120205
Closed Access | Times Cited: 5
Liang’an Huo, Xiaohong Chen
Chinese Physics B (2021) Vol. 30, Iss. 12, pp. 120205-120205
Closed Access | Times Cited: 5
Timeliness-Aware Multiple Rumor Sources Estimation in Dynamic Online Social Networks
Da-Wen Huang, Wenjie Wu, Jichao Bi, et al.
(2024)
Closed Access
Da-Wen Huang, Wenjie Wu, Jichao Bi, et al.
(2024)
Closed Access
A Malicious Information Traceability Model Based on Neighborhood Similarity and Multiple Types of Interaction
Tun Li, Zhou Li, Kexin Ma, et al.
IEEE Transactions on Computational Social Systems (2024) Vol. 11, Iss. 5, pp. 5815-5827
Closed Access
Tun Li, Zhou Li, Kexin Ma, et al.
IEEE Transactions on Computational Social Systems (2024) Vol. 11, Iss. 5, pp. 5815-5827
Closed Access
Source localization in signed networks based on dynamic message passing algorithm
Zhixiang Jiang, Zhao-Long Hu, Faliang Huang
Chaos Solitons & Fractals (2024) Vol. 188, pp. 115532-115532
Closed Access
Zhixiang Jiang, Zhao-Long Hu, Faliang Huang
Chaos Solitons & Fractals (2024) Vol. 188, pp. 115532-115532
Closed Access
Timeliness-aware rumor sources identification in community-structured dynamic online social networks
Da-Wen Huang, Wenjie Wu, Jichao Bi, et al.
Information Sciences (2024) Vol. 689, pp. 121508-121508
Closed Access
Da-Wen Huang, Wenjie Wu, Jichao Bi, et al.
Information Sciences (2024) Vol. 689, pp. 121508-121508
Closed Access
Finding the Source in Networks: An Approach Based on Structural Entropy
Chong Zhang, Qiang Guo, Luoyi Fu, et al.
ACM Transactions on Internet Technology (2023) Vol. 23, Iss. 1, pp. 1-25
Closed Access | Times Cited: 1
Chong Zhang, Qiang Guo, Luoyi Fu, et al.
ACM Transactions on Internet Technology (2023) Vol. 23, Iss. 1, pp. 1-25
Closed Access | Times Cited: 1
Diffusion characteristics classification framework for identification of diffusion source in complex networks
Fan Yang, Jingxian Liu, Ruisheng Zhang, et al.
PLoS ONE (2023) Vol. 18, Iss. 5, pp. e0285563-e0285563
Open Access | Times Cited: 1
Fan Yang, Jingxian Liu, Ruisheng Zhang, et al.
PLoS ONE (2023) Vol. 18, Iss. 5, pp. e0285563-e0285563
Open Access | Times Cited: 1
Dismantling Networks by Skeleton Extraction and Greedy Tree Breaking
Xiaobin Rui, Fanrong Meng, Yahui Chai, et al.
IEEE Access (2021) Vol. 9, pp. 84922-84931
Open Access | Times Cited: 2
Xiaobin Rui, Fanrong Meng, Yahui Chai, et al.
IEEE Access (2021) Vol. 9, pp. 84922-84931
Open Access | Times Cited: 2
Locating multi-source in time-varying networks with label back spread
Zhao-Long Hu, Yuan-Zhang Deng, Zeng Lingguo, et al.
(2023), pp. 1-8
Closed Access
Zhao-Long Hu, Yuan-Zhang Deng, Zeng Lingguo, et al.
(2023), pp. 1-8
Closed Access
Source identification via contact tracing in the presence of asymptomatic patients
Gergely Ódor, Jana Vuckovic, Miguel-Angel Sanchez Ndoye, et al.
Applied Network Science (2023) Vol. 8, Iss. 1
Open Access
Gergely Ódor, Jana Vuckovic, Miguel-Angel Sanchez Ndoye, et al.
Applied Network Science (2023) Vol. 8, Iss. 1
Open Access
Source Localization in Complex Networks with Optimal Observers Based on Maximum Entropy Sampling
Zhao-Long Hu, Hongjue Wang, Lei Sun, et al.
(2023)
Closed Access
Zhao-Long Hu, Hongjue Wang, Lei Sun, et al.
(2023)
Closed Access
Locating the propagation source in complex networks with observers based similarity measures and direction-induced search
Fan Yang, Chungui Li, Yong Peng, et al.
Research Square (Research Square) (2022)
Open Access
Fan Yang, Chungui Li, Yong Peng, et al.
Research Square (Research Square) (2022)
Open Access