OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

It's who you know
Keith Henderson, Brian Gallagher, Lei Li, et al.
(2011)
Open Access | Times Cited: 219

Showing 1-25 of 219 citing articles:

node2vec
Aditya Grover, Jure Leskovec
(2016), pp. 855-864
Open Access | Times Cited: 9582

DeepWalk
Bryan Perozzi, Rami Al‐Rfou, Steven Skiena
(2014), pp. 701-710
Open Access | Times Cited: 8747

Graph based anomaly detection and description: a survey
Leman Akoglu, Hanghang Tong, Danai Koutra
Data Mining and Knowledge Discovery (2014) Vol. 29, Iss. 3, pp. 626-688
Closed Access | Times Cited: 1233

RolX
Keith Henderson, Brian Gallagher, Tina Eliassi‐Rad, et al.
(2012)
Closed Access | Times Cited: 398

Multi-Scale attributed node embedding
Benedek Rózemberczki, Carl Allen, Rik Sarkar
Journal of Complex Networks (2021) Vol. 9, Iss. 2
Open Access | Times Cited: 358

Data-Driven Cybersecurity Incident Prediction: A Survey
Nan Sun, Jun Zhang, Paul Rimba, et al.
IEEE Communications Surveys & Tutorials (2018) Vol. 21, Iss. 2, pp. 1744-1772
Closed Access | Times Cited: 285

APATE: A novel approach for automated credit card transaction fraud detection using network-based extensions
Véronique Van Vlasselaer, Cristián Bravo, Olivier Caelen, et al.
Decision Support Systems (2015) Vol. 75, pp. 38-48
Open Access | Times Cited: 285

Graph Summarization Methods and Applications
Yike Liu, Tara Safavi, Abhilash Dighe, et al.
ACM Computing Surveys (2018) Vol. 51, Iss. 3, pp. 1-34
Open Access | Times Cited: 240

An efficient reconciliation algorithm for social networks
Nitish Korula, Silvio Lattanzi
Proceedings of the VLDB Endowment (2014) Vol. 7, Iss. 5, pp. 377-388
Open Access | Times Cited: 236

Learning Structural Node Embeddings via Diffusion Wavelets
Claire Donnat, Marinka Żitnik, David Hallac, et al.
(2018)
Open Access | Times Cited: 221

VERSE
Anton Tsitsulin, Davide Mottin, Panagiotis Karras, et al.
(2018), pp. 539-548
Open Access | Times Cited: 161

Modeling dynamic behavior in large evolving graphs
Ryan A. Rossi, Brian Gallagher, Jennifer Neville, et al.
(2013)
Open Access | Times Cited: 179

Role Discovery in Networks
Ryan A. Rossi, Nesreen K. Ahmed
IEEE Transactions on Knowledge and Data Engineering (2014) Vol. 27, Iss. 4, pp. 1112-1131
Open Access | Times Cited: 164

BIG-ALIGN: Fast Bipartite Graph Alignment
Danai Koutra, Hanghang Tong, David Lubensky
(2013), pp. 389-398
Closed Access | Times Cited: 147

Botnet detection using graph-based feature clustering
Sudipta Chowdhury, Mojtaba Khanzadeh, Ravi Akula, et al.
Journal Of Big Data (2017) Vol. 4, Iss. 1
Open Access | Times Cited: 146

Discriminative Deep Random Walk for Network Classification
Juzheng Li, Jun Zhu, Bo Zhang
Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers) (2016), pp. 1004-1013
Open Access | Times Cited: 135

Interactive Anomaly Detection on Attributed Networks
Kaize Ding, Jundong Li, Huan Liu
(2019)
Open Access | Times Cited: 126

Growing a graph matching from a handful of seeds
Ehsan Kazemi, S. Hamed Hassani, Matthias Grossglauser
Proceedings of the VLDB Endowment (2015) Vol. 8, Iss. 10, pp. 1010-1021
Open Access | Times Cited: 114

A survey of data mining and social network analysis based anomaly detection techniques
Ravneet Kaur, Sarbjeet Singh
Egyptian Informatics Journal (2015) Vol. 17, Iss. 2, pp. 199-216
Open Access | Times Cited: 108

CoDetect: Financial Fraud Detection With Anomaly Feature Detection
Dongxu Huang, Dejun Mu, Libin Yang, et al.
IEEE Access (2018) Vol. 6, pp. 19161-19174
Open Access | Times Cited: 108

Combining Label Propagation and Simple Models Out-performs Graph Neural Networks
Qian Huang, Horace He, Abhay Pratap Singh, et al.
arXiv (Cornell University) (2020)
Open Access | Times Cited: 107

Research Commentary—Information in Digital, Economic, and Social Networks
Arun Sundararajan, Foster Provost, Gal Oestreicher-Singer, et al.
Information Systems Research (2013) Vol. 24, Iss. 4, pp. 883-905
Closed Access | Times Cited: 104

Node Immunization on Large Graphs: Theory and Algorithms
Chen Chen, Hanghang Tong, B. Aditya Prakash, et al.
IEEE Transactions on Knowledge and Data Engineering (2015) Vol. 28, Iss. 1, pp. 113-126
Open Access | Times Cited: 93

Multi-scale Attributed Node Embedding
Benedek Rózemberczki, Carl Allen, Rik Sarkar
arXiv (Cornell University) (2019)
Closed Access | Times Cited: 90

Preserving Minority Structures in Graph Sampling
Ying Zhao, Haojin Jiang, Chen Qian, et al.
IEEE Transactions on Visualization and Computer Graphics (2020) Vol. 27, Iss. 2, pp. 1698-1708
Open Access | Times Cited: 71

Page 1 - Next Page

Scroll to top