OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Antisocial Behavior Identification from Twitter Feeds Using Traditional Machine Learning Algorithms and Deep Learning.
Ravinder Singh, Sudha Subramani, Jiahua Du, et al.
ICST Transactions on Scalable Information Systems (2023), pp. e17-e17
Open Access | Times Cited: 42

Showing 1-25 of 42 citing articles:

Selection and evaluation of a set of attributes appropriate for detection of antisocial behaviour in online media
Kristína Machová, Viliam Balara, Marián Mach, et al.
Multimedia Tools and Applications (2025)
Open Access | Times Cited: 1

Text classification models for personality disorders identification
Deepti Jain, Sandhya Arora, C. K. Jha, et al.
Social Network Analysis and Mining (2024) Vol. 14, Iss. 1
Closed Access | Times Cited: 4

Beyond Trolling: Fine-Grained Detection of Antisocial Behavior in Social Media During the Pandemic
Andrew Asante, Petr Hájek
Information (2025) Vol. 16, Iss. 3, pp. 173-173
Open Access

HpGraphNEI: A network entity identification model based on heterophilous graph learning
Na Li, Tianao Li, Zhaorui Ma, et al.
Information Processing & Management (2024) Vol. 61, Iss. 5, pp. 103810-103810
Closed Access | Times Cited: 2

Multitask Sentiment Analysis and Topic Classification Using BERT
Parita Shah, Hiren Patel, Priya Swaminarayan
ICST Transactions on Scalable Information Systems (2024) Vol. 11
Open Access | Times Cited: 2

Empowering Vulnerability Prioritization: A Heterogeneous Graph-Driven Framework for Exploitability Prediction
Jiao Yin, Guihong Chen, Wei Hong, et al.
Lecture notes in computer science (2023), pp. 289-299
Closed Access | Times Cited: 6

Bilateral Insider Threat Detection: Harnessing Standalone and Sequential Activities with Recurrent Neural Networks
Phavithra Manoharan, Wei Hong, Jiao Yin, et al.
Lecture notes in computer science (2023), pp. 179-188
Closed Access | Times Cited: 4

Fast Lung Image Segmentation Using Lightweight VAEL-Unet
Xiulan Hao, Chuanjin Zhang, Shiluo Xu
ICST Transactions on Scalable Information Systems (2024)
Open Access | Times Cited: 1

A hybrid intrusion detection system with K-means and CNN+LSTM
Haifeng Lv, Yong Ding
ICST Transactions on Scalable Information Systems (2024) Vol. 11, Iss. 6
Open Access | Times Cited: 1

High-Order Local Clustering on Hypergraphs
Jie Wei, Zhengyi Yang, Qi Luo, et al.
ICST Transactions on Scalable Information Systems (2024) Vol. 11, Iss. 6
Open Access | Times Cited: 1

Enhancing Health Information Systems Security: An Ontology Model Approach
Raza Nowrozy, Khandakar Ahmed
Lecture notes in computer science (2023), pp. 91-100
Closed Access | Times Cited: 2

Surveying the Landscape: Compound Methods for Aspect-Based Sentiment Analysis
Marwah Alharbi, Jiao Yin, Hua Wang
Lecture notes in computer science (2023), pp. 101-115
Closed Access | Times Cited: 2

E-GVD: Efficient Software Vulnerability Detection Techniques Based on Graph Neural Network
Haiye Wang, Zhiguo Qu, Le Sun
ICST Transactions on Scalable Information Systems (2024)
Open Access

Investigation of Imbalanced Sentiment Analysis in Voice Data: A Comparative Study of Machine Learning Algorithms
Viraj Shah, Deep Rahul Shah, Mayank Umesh Shetty, et al.
ICST Transactions on Scalable Information Systems (2024)
Open Access

DTT: A Dual-domain Transformer model for Network Intrusion Detection
Chenjian Xu, Weirui Sun, Mengxue Li
ICST Transactions on Scalable Information Systems (2024)
Open Access

Multi-objective Demand Responsive Transit Scheduling in Smart City: A Multiple Populations Ant Colony System Approach
Ke-Jing Du, Jia-Quan Yang, Limin Wang, et al.
(2024), pp. 197-205
Closed Access

A multi-source heterogeneous medical data enhancement framework based on lakehouse
Ming Sheng, Shuliang Wang, Yong Zhang, et al.
Health Information Science and Systems (2024) Vol. 12, Iss. 1
Closed Access

Abuse Detection of Cyberbullying in Tweets Data Using Ensemble DL Model with Advanced Voting Mechanisms
R Mahaveerakannan, Cuddapah Anitha, Murali Dhar M S
(2024), pp. 1-6
Closed Access

Identifying Persons of Interest in Digital Forensics Using NLP-Based AI
Jonathan Adkins, Ali Al Bataineh, Majd Khalaf
Future Internet (2024) Vol. 16, Iss. 11, pp. 426-426
Open Access

Node-Alive Index Driven Redundancy Elimination for Energy-Efficient Wireless Sensor Networks
Archana Bomnale, Avinash More
ICST Transactions on Scalable Information Systems (2024) Vol. 11
Open Access

MFUIE: A Fake News Detection Model Based on Multimodal Features and User Information Enhancement
Xiulan Hao, Wenjing Xu, Xu Huang, et al.
ICST Transactions on Scalable Information Systems (2024) Vol. 11
Open Access

Correlation Between Macro Economic Variables and Financial Sector Australian Share Market Index
Praveen Sadasivan, Frank Whittaker, Ravinder Singh
Lecture notes in computer science (2024), pp. 239-249
Closed Access

Integrating Metaheuristics and Two-Tiered Classification for Enhanced Fake News Detection with Feature Optimization
Poonam Narang, Ajay Vikram Singh, Himanshu Monga
ICST Transactions on Scalable Information Systems (2024)
Open Access

Detection of antisocial personality disorder using optimal multi-head attention based auto encoder
A. Rohini, A. Packialatha
Multimedia Tools and Applications (2024)
Closed Access

Page 1 - Next Page

Scroll to top