
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Deep Learning Approaches for Cyberbullying Detection and Classification on Social Media
S. Neelakandan, M. Sridevi, Saravanan Chandrasekaran, et al.
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-13
Open Access | Times Cited: 55
S. Neelakandan, M. Sridevi, Saravanan Chandrasekaran, et al.
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-13
Open Access | Times Cited: 55
Showing 1-25 of 55 citing articles:
Improved Metaheuristic-Driven Energy-Aware Cluster-Based Routing Scheme for IoT-Assisted Wireless Sensor Networks
Kuruva Lakshmanna, S. Neelakandan, Youseef Alotaibi, et al.
Sustainability (2022) Vol. 14, Iss. 13, pp. 7712-7712
Open Access | Times Cited: 109
Kuruva Lakshmanna, S. Neelakandan, Youseef Alotaibi, et al.
Sustainability (2022) Vol. 14, Iss. 13, pp. 7712-7712
Open Access | Times Cited: 109
Handcrafted Deep-Feature-Based Brain Tumor Detection and Classification Using MRI Images
M. Prakash, Sathishkumar Veerappampalayam Easwaramoorthy, S. Neelakandan, et al.
Electronics (2022) Vol. 11, Iss. 24, pp. 4178-4178
Open Access | Times Cited: 47
M. Prakash, Sathishkumar Veerappampalayam Easwaramoorthy, S. Neelakandan, et al.
Electronics (2022) Vol. 11, Iss. 24, pp. 4178-4178
Open Access | Times Cited: 47
A Review on Deep-Learning-Based Cyberbullying Detection
Md. Tarek Hasan, Md. Al Emran Hossain, Md. Saddam Hossain Mukta, et al.
Future Internet (2023) Vol. 15, Iss. 5, pp. 179-179
Open Access | Times Cited: 28
Md. Tarek Hasan, Md. Al Emran Hossain, Md. Saddam Hossain Mukta, et al.
Future Internet (2023) Vol. 15, Iss. 5, pp. 179-179
Open Access | Times Cited: 28
Detection of violence incitation expressions in Urdu tweets using convolutional neural network
Muhammad Shahid Khan, Muhammad Shahid Iqbal Malik, Aamer Nadeem
Expert Systems with Applications (2024) Vol. 245, pp. 123174-123174
Closed Access | Times Cited: 10
Muhammad Shahid Khan, Muhammad Shahid Iqbal Malik, Aamer Nadeem
Expert Systems with Applications (2024) Vol. 245, pp. 123174-123174
Closed Access | Times Cited: 10
Artificial Intelligence Based Customer Churn Prediction Model for Business Markets
F. Hussain, S. Neelakandan, B. T. Geetha, et al.
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-14
Open Access | Times Cited: 33
F. Hussain, S. Neelakandan, B. T. Geetha, et al.
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-14
Open Access | Times Cited: 33
Intelligent multimodal pedestrian detection using hybrid metaheuristic optimization with deep learning model
Johnson Kolluri, Ranjita Das
Image and Vision Computing (2023) Vol. 131, pp. 104628-104628
Closed Access | Times Cited: 21
Johnson Kolluri, Ranjita Das
Image and Vision Computing (2023) Vol. 131, pp. 104628-104628
Closed Access | Times Cited: 21
A Gradient Boosted Decision Tree-Based Influencer Prediction in Social Network Analysis
S. Neelakandan, Sathishkumar Veerappampalayam Easwaramoorthy, M. Prakash, et al.
Big Data and Cognitive Computing (2023) Vol. 7, Iss. 1, pp. 6-6
Open Access | Times Cited: 17
S. Neelakandan, Sathishkumar Veerappampalayam Easwaramoorthy, M. Prakash, et al.
Big Data and Cognitive Computing (2023) Vol. 7, Iss. 1, pp. 6-6
Open Access | Times Cited: 17
Robust Facial Expression Recognition Using an Evolutionary Algorithm with a Deep Learning Model
A. V. R. Mayuri, Ranjith Kumar Manoharan, S. Neelakandan, et al.
Applied Sciences (2022) Vol. 13, Iss. 1, pp. 468-468
Open Access | Times Cited: 24
A. V. R. Mayuri, Ranjith Kumar Manoharan, S. Neelakandan, et al.
Applied Sciences (2022) Vol. 13, Iss. 1, pp. 468-468
Open Access | Times Cited: 24
Blockchain-based Wireless Sensor Network Security Through Authentication and Cluster Head Selection
D. Paulraj, R Lavanya, T Jayasudha, et al.
(2023), pp. 1-5
Closed Access | Times Cited: 11
D. Paulraj, R Lavanya, T Jayasudha, et al.
(2023), pp. 1-5
Closed Access | Times Cited: 11
AI Strategies for Handling Disciplinary and Cyber Bullying in Schools
Manjit Singh Sidhu, Kirandeep Kaur Sidhu
Studies in computational intelligence (2025), pp. 207-229
Closed Access
Manjit Singh Sidhu, Kirandeep Kaur Sidhu
Studies in computational intelligence (2025), pp. 207-229
Closed Access
Artificial intelligence based classification and prediction of medical imaging using a novel framework of inverted and self-attention deep neural network architecture
Junaid Aftab, Muhammad Attique Khan, Sobia Arshad, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Junaid Aftab, Muhammad Attique Khan, Sobia Arshad, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
A Study on Cyberbullying Identification Based on Large Model Language Method
Shirley J. Dyke, Zhao Yang Dong
(2025), pp. 641-647
Closed Access
Shirley J. Dyke, Zhao Yang Dong
(2025), pp. 641-647
Closed Access
Probability evaluation of blade flutter in a transonic compressor with inlet distortion using SSA-DBEN model
Jingshan Wei, Zhidong Chi, Shimin Wang, et al.
Journal of Fluids and Structures (2025) Vol. 135, pp. 104318-104318
Closed Access
Jingshan Wei, Zhidong Chi, Shimin Wang, et al.
Journal of Fluids and Structures (2025) Vol. 135, pp. 104318-104318
Closed Access
A comprehensive review of cyberbullying-related content classification in online social media
Teoh Hwai Teng, Kasturi Dewi Varathan, Fábio Crestani
Expert Systems with Applications (2023) Vol. 244, pp. 122644-122644
Closed Access | Times Cited: 8
Teoh Hwai Teng, Kasturi Dewi Varathan, Fábio Crestani
Expert Systems with Applications (2023) Vol. 244, pp. 122644-122644
Closed Access | Times Cited: 8
Automatic detection of cyberbullying behaviour on social media using Stacked Bi-Gru attention with BERT model
Mohan K. Mali, Ranjeet R. Pawar, Sandeep A. Shinde, et al.
Expert Systems with Applications (2024) Vol. 262, pp. 125641-125641
Closed Access | Times Cited: 2
Mohan K. Mali, Ranjeet R. Pawar, Sandeep A. Shinde, et al.
Expert Systems with Applications (2024) Vol. 262, pp. 125641-125641
Closed Access | Times Cited: 2
An explainable deep learning model for prediction of early‐stage chronic kidney disease
A. Vinothini, Baghavathi Priya Sankaralingam, Uma Maheswari Jayachandran, et al.
Computational Intelligence (2023) Vol. 39, Iss. 6, pp. 1022-1038
Closed Access | Times Cited: 5
A. Vinothini, Baghavathi Priya Sankaralingam, Uma Maheswari Jayachandran, et al.
Computational Intelligence (2023) Vol. 39, Iss. 6, pp. 1022-1038
Closed Access | Times Cited: 5
A Survey on Cybercrime Using Social Media
Zainab Khyioon Abdalrdha, Abbas M. Al-Bakry, Alaa Kadhim Farhan
Iraqi Journal for Computers and Informatics (2023) Vol. 49, Iss. 1, pp. 52-65
Open Access | Times Cited: 5
Zainab Khyioon Abdalrdha, Abbas M. Al-Bakry, Alaa Kadhim Farhan
Iraqi Journal for Computers and Informatics (2023) Vol. 49, Iss. 1, pp. 52-65
Open Access | Times Cited: 5
A Novel Multimodal Hybrid Classifier Based Cyberbullying Detection for Social Media Platform
R Suhas Bharadwaj, S. Kuzhalvaimozhi, N. Vedavathi
Lecture notes in networks and systems (2023), pp. 689-699
Closed Access | Times Cited: 4
R Suhas Bharadwaj, S. Kuzhalvaimozhi, N. Vedavathi
Lecture notes in networks and systems (2023), pp. 689-699
Closed Access | Times Cited: 4
Game-theoretic modeling and analysis of cyberbullying spreading on OSNs
Qi Chu, Yang Qin, Lu‐Xing Yang, et al.
Information Sciences (2024) Vol. 659, pp. 120067-120067
Closed Access | Times Cited: 1
Qi Chu, Yang Qin, Lu‐Xing Yang, et al.
Information Sciences (2024) Vol. 659, pp. 120067-120067
Closed Access | Times Cited: 1
A Deep Learning Framework for Assamese Toxic Comment Detection: Leveraging LSTM and BiLSTM Models with Attention Mechanism
Mandira Neog, Nomi Baruah
Lecture notes in networks and systems (2024), pp. 485-497
Closed Access | Times Cited: 1
Mandira Neog, Nomi Baruah
Lecture notes in networks and systems (2024), pp. 485-497
Closed Access | Times Cited: 1
Detecting Cyberbullying in Twitter: A Multi-Model Approach
V. Joseph, Boppuru Rudra Prathap, Kukatlapalli Pradeep Kumar
(2024), pp. 1-6
Closed Access | Times Cited: 1
V. Joseph, Boppuru Rudra Prathap, Kukatlapalli Pradeep Kumar
(2024), pp. 1-6
Closed Access | Times Cited: 1
InArt: In-Network Aggregation with Route Selection for Accelerating Distributed Training
Jiawei Liu, Yutong Zhai, Gongming Zhao, et al.
Proceedings of the ACM Web Conference 2022 (2024), pp. 2879-2889
Closed Access | Times Cited: 1
Jiawei Liu, Yutong Zhai, Gongming Zhao, et al.
Proceedings of the ACM Web Conference 2022 (2024), pp. 2879-2889
Closed Access | Times Cited: 1
A Real-Time Crowd Tracking and Control System Using Deep Learning
Daksh Jain, Uday Jain, K. Rajeshwer Rao, et al.
Lecture notes in networks and systems (2024), pp. 587-601
Closed Access | Times Cited: 1
Daksh Jain, Uday Jain, K. Rajeshwer Rao, et al.
Lecture notes in networks and systems (2024), pp. 587-601
Closed Access | Times Cited: 1
Silent Screams: A Narrative Review of Cyberbullying Among Indian Adolescents
M Vijayarani, G Balamurugan, Sanjay Sevak, et al.
Cureus (2024)
Open Access | Times Cited: 1
M Vijayarani, G Balamurugan, Sanjay Sevak, et al.
Cureus (2024)
Open Access | Times Cited: 1
Quasi-Reflection Learning Arithmetic Firefly Search Optimization with Deep Learning-based Cyberbullying Detection on Social Networking
Ahmad Taher Azar, Harith Muthanna Noori, Ahmed Redha Mahlous, et al.
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 5, pp. 17162-17169
Open Access | Times Cited: 1
Ahmad Taher Azar, Harith Muthanna Noori, Ahmed Redha Mahlous, et al.
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 5, pp. 17162-17169
Open Access | Times Cited: 1