
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
How to detect propaganda from social media? Exploitation of semantic and fine-tuned language models
Muhammad Shahid Iqbal Malik, Tahir Imran, Jamjoom Mona Mamdouh
PeerJ Computer Science (2023) Vol. 9, pp. e1248-e1248
Open Access | Times Cited: 17
Muhammad Shahid Iqbal Malik, Tahir Imran, Jamjoom Mona Mamdouh
PeerJ Computer Science (2023) Vol. 9, pp. e1248-e1248
Open Access | Times Cited: 17
Showing 17 citing articles:
Detection of violence incitation expressions in Urdu tweets using convolutional neural network
Muhammad Shahid Khan, Muhammad Shahid Iqbal Malik, Aamer Nadeem
Expert Systems with Applications (2024) Vol. 245, pp. 123174-123174
Closed Access | Times Cited: 10
Muhammad Shahid Khan, Muhammad Shahid Iqbal Malik, Aamer Nadeem
Expert Systems with Applications (2024) Vol. 245, pp. 123174-123174
Closed Access | Times Cited: 10
Categorization of tweets for damages: infrastructure and human damage assessment using fine-tuned BERT model
Muhammad Shahid Iqbal Malik, Muhammad Zeeshan Younas, Mona Jamjoom, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e1859-e1859
Open Access | Times Cited: 7
Muhammad Shahid Iqbal Malik, Muhammad Zeeshan Younas, Mona Jamjoom, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e1859-e1859
Open Access | Times Cited: 7
Fine-Tuning Transformer Models Using Transfer Learning for Multilingual Threatening Text Identification
Muhammad Rehan, Muhammad Shahid Iqbal Malik, Mona Jamjoom
IEEE Access (2023) Vol. 11, pp. 106503-106515
Open Access | Times Cited: 15
Muhammad Rehan, Muhammad Shahid Iqbal Malik, Mona Jamjoom
IEEE Access (2023) Vol. 11, pp. 106503-106515
Open Access | Times Cited: 15
Automated defect identification for cell phones using language context, linguistic and smoke-word models
Muhammad Zeeshan Younas, Muhammad Shahid Iqbal Malik, Dmitry I. Ignatov
Expert Systems with Applications (2023) Vol. 227, pp. 120236-120236
Closed Access | Times Cited: 14
Muhammad Zeeshan Younas, Muhammad Shahid Iqbal Malik, Dmitry I. Ignatov
Expert Systems with Applications (2023) Vol. 227, pp. 120236-120236
Closed Access | Times Cited: 14
Contextual Embeddings based on Fine-tuned Urdu-BERT for Urdu threatening content and target identification
Muhammad Shahid Iqbal Malik, Uswa Cheema, Dmitry I. Ignatov
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 7, pp. 101606-101606
Open Access | Times Cited: 14
Muhammad Shahid Iqbal Malik, Uswa Cheema, Dmitry I. Ignatov
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 7, pp. 101606-101606
Open Access | Times Cited: 14
Improving Recommender Systems for Fake News Detection in Social Networks with Knowledge Graphs and Graph Attention Networks
Aleksei Golovin, Nataly Zhukova, Radhakrishnan Delhibabu, et al.
Mathematics (2025) Vol. 13, Iss. 6, pp. 1011-1011
Open Access
Aleksei Golovin, Nataly Zhukova, Radhakrishnan Delhibabu, et al.
Mathematics (2025) Vol. 13, Iss. 6, pp. 1011-1011
Open Access
Multilingual hope speech detection: A Robust framework using transfer learning of fine-tuning RoBERTa model
Muhammad Shahid Iqbal Malik, Anna Nazarova, Mona Jamjoom, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 8, pp. 101736-101736
Open Access | Times Cited: 11
Muhammad Shahid Iqbal Malik, Anna Nazarova, Mona Jamjoom, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 8, pp. 101736-101736
Open Access | Times Cited: 11
Leveraging Large Language Models to Detect Influence Campaigns on Social Media
Luca Luceri, Eric Boniardi, Emilio Ferrara
(2024), pp. 1459-1467
Open Access | Times Cited: 4
Luca Luceri, Eric Boniardi, Emilio Ferrara
(2024), pp. 1459-1467
Open Access | Times Cited: 4
Threatening Expression and Target Identification in Under-Resource Languages Using NLP Techniques
Muhammad Shahid Iqbal Malik
Lecture notes in computer science (2024), pp. 3-17
Closed Access | Times Cited: 3
Muhammad Shahid Iqbal Malik
Lecture notes in computer science (2024), pp. 3-17
Closed Access | Times Cited: 3
SEHP: stacking-based ensemble learning on novel features for review helpfulness prediction
Muhammad Shahid Iqbal Malik, Aftab Nawaz
Knowledge and Information Systems (2023)
Closed Access | Times Cited: 7
Muhammad Shahid Iqbal Malik, Aftab Nawaz
Knowledge and Information Systems (2023)
Closed Access | Times Cited: 7
Hate Speech and Target Community Detection in Nastaliq Urdu Using Transfer Learning Techniques
Muhammad Shahid Iqbal Malik, Aftab Nawaz, Mona Jamjoom
IEEE Access (2024) Vol. 12, pp. 116875-116890
Open Access | Times Cited: 1
Muhammad Shahid Iqbal Malik, Aftab Nawaz, Mona Jamjoom
IEEE Access (2024) Vol. 12, pp. 116875-116890
Open Access | Times Cited: 1
Modelling information warfare dynamics to counter propaganda using a nonlinear differential equation with a PINN-based learning approach
Rashmikiran Pandey, Mrinal Pandey, Alexey Nazarov
International Journal of Information Technology (2023) Vol. 16, Iss. 3, pp. 1527-1538
Closed Access | Times Cited: 3
Rashmikiran Pandey, Mrinal Pandey, Alexey Nazarov
International Journal of Information Technology (2023) Vol. 16, Iss. 3, pp. 1527-1538
Closed Access | Times Cited: 3
Improving Prediction of Arabic Fake News Using ELMO’s Features-Based Tri-Ensemble Model and LIME XAI
Turki Aljrees
IEEE Access (2024) Vol. 12, pp. 63066-63076
Open Access
Turki Aljrees
IEEE Access (2024) Vol. 12, pp. 63066-63076
Open Access
Predictive Modeling for Arabic Fake News Detection: Leveraging Language Model Embeddings and Stacked Ensemble
Muhammad Umer, Arwa A. Jamjoom, Shtwai Alsubai, et al.
ACM Transactions on Asian and Low-Resource Language Information Processing (2024)
Closed Access
Muhammad Umer, Arwa A. Jamjoom, Shtwai Alsubai, et al.
ACM Transactions on Asian and Low-Resource Language Information Processing (2024)
Closed Access
Deepthreatexplainer: a united explainable predictor for threat comments identification on Twitter
Anna Nazarova, Muhammad Shahid Iqbal Malik, Dmitry I. Ignatov, et al.
Social Network Analysis and Mining (2024) Vol. 14, Iss. 1
Closed Access
Anna Nazarova, Muhammad Shahid Iqbal Malik, Dmitry I. Ignatov, et al.
Social Network Analysis and Mining (2024) Vol. 14, Iss. 1
Closed Access
Novel approach for Arabic fake news classification using embedding from large language features with CNN-LSTM ensemble model and explainable AI
Omar Aboulola, Muhammad Umer
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access
Omar Aboulola, Muhammad Umer
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access
Analyzing Cross-Lingual Approaches: a Case Study for Detecting Multilingual Hope Expressions in YouTube Comments
Muhammad Shahid Iqbal Malik, Muhammad Rehan, Aftab Nawaz
Pattern Recognition and Image Analysis (2024) Vol. 34, Iss. 3, pp. 831-843
Closed Access
Muhammad Shahid Iqbal Malik, Muhammad Rehan, Aftab Nawaz
Pattern Recognition and Image Analysis (2024) Vol. 34, Iss. 3, pp. 831-843
Closed Access