OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

RETRACTED ARTICLE: Innovation and improvement of visual communication design of mobile app based on social network interaction interface design
Haotian Wu, Guangan Li
Multimedia Tools and Applications (2019) Vol. 79, Iss. 1-2, pp. 1-16
Closed Access | Times Cited: 75

Showing 1-25 of 75 citing articles:

Efficient deep learning approach for augmented detection of Coronavirus disease
Ahmed Sedik, Mohamed Hammad, Fathi E. Abd El‐Samie, et al.
Neural Computing and Applications (2021) Vol. 34, Iss. 14, pp. 11423-11440
Open Access | Times Cited: 177

Diabetic retinopathy detection and stage classification in eye fundus images using active deep learning
Imran Qureshi, Jun Ma, Qaisar Abbas
Multimedia Tools and Applications (2021) Vol. 80, Iss. 8, pp. 11691-11721
Closed Access | Times Cited: 137

CB-Fake: A multimodal deep learning framework for automatic fake news detection using capsule neural network and BERT
Balasubramanian Palani, Sivasankar Elango, Vignesh Viswanathan K
Multimedia Tools and Applications (2021) Vol. 81, Iss. 4, pp. 5587-5620
Open Access | Times Cited: 83

Energy management strategy for solid‐state transformer‐based solar charging station for electric vehicles in smart grids
Mohammad Zand, Morteza Azimi Nasab, Sanjeevikumar Padmanaban, et al.
IET Renewable Power Generation (2020) Vol. 14, Iss. 18, pp. 3843-3852
Closed Access | Times Cited: 76

A Novel Multi-Perspective Benchmarking Framework for Selecting Image Dehazing Intelligent Algorithms Based on BWM and Group VIKOR Techniques
Karrar Hameed Abdulkareem, Nureize Arbaiy, A. A. Zaidan, et al.
International Journal of Information Technology & Decision Making (2020) Vol. 19, Iss. 03, pp. 909-957
Closed Access | Times Cited: 75

Protection of image ROI using chaos-based encryption and DCNN-based object detection
Wei Song, Chong Fu, Yu Zheng, et al.
Neural Computing and Applications (2022) Vol. 34, Iss. 7, pp. 5743-5756
Closed Access | Times Cited: 52

Nature-inspired optimization algorithms and their significance in multi-thresholding image segmentation: an inclusive review
Rebika Rai, Arunita Das, Krishna Gopal Dhal
Evolving Systems (2022) Vol. 13, Iss. 6, pp. 889-945
Open Access | Times Cited: 47

Hyperchaotic image encryption using phase-truncated fractional Fourier transform and DNA-level operation
Yabin Zhang, Li Zhang, Zhi Zhong, et al.
Optics and Lasers in Engineering (2021) Vol. 143, pp. 106626-106626
Closed Access | Times Cited: 41

Low dimensional DCT and DWT feature based model for detection of image splicing and copy-move forgery
Sahani Pooja Jaiprakash, Madhavi B. Desai, Choudhary Shyam Prakash, et al.
Multimedia Tools and Applications (2020) Vol. 79, Iss. 39-40, pp. 29977-30005
Closed Access | Times Cited: 48

A systematic literature review and existing challenges toward fake news detection models
Minal Nirav Shah, Amit Ganatra
Social Network Analysis and Mining (2022) Vol. 12, Iss. 1
Open Access | Times Cited: 28

Innovative application of new media in visual communication design and resistance to innovation
Ge Yu, Shamim Akhter, Tribhuwan Kumar, et al.
Frontiers in Psychology (2022) Vol. 13
Open Access | Times Cited: 23

Link prediction approach to recommender systems
T. Jaya Lakshmi, S. Durga Bhavani
Computing (2023) Vol. 106, Iss. 7, pp. 2157-2183
Closed Access | Times Cited: 13

A home health management app designed in the post-epidemic era using empirical evidence based on the demand collection of elderly users
Chengmin Zhou, Jingyi Guo, Yurong Zhang, et al.
Humanities and Social Sciences Communications (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 5

Facial image encryption scheme based on improved 4-D hyperchaotic system
Xuncai Zhang, Min Liu, Ying Niu
The Journal of Supercomputing (2025) Vol. 81, Iss. 3
Closed Access

Applying deep neural networks for user intention identification
Asad Masood Khattak, Anam Habib, Muhammad Zubair Asghar, et al.
Soft Computing (2020) Vol. 25, Iss. 3, pp. 2191-2220
Closed Access | Times Cited: 32

Mixing characterization of binary-coalesced droplets in microchannels using deep neural network
A. Arjun, R. R. Ajith, S. Kumar Ranjith
Biomicrofluidics (2020) Vol. 14, Iss. 3
Open Access | Times Cited: 29

Role of twitter user profile features in retweet prediction for big data streams
Saurabh Sharma, Vishal Gupta
Multimedia Tools and Applications (2022) Vol. 81, Iss. 19, pp. 27309-27338
Open Access | Times Cited: 17

Preadolescent Children Using Real-Time Heart Rate During Moderate to Vigorous Physical Activity: A Feasibility Study
Lincoln Lu, Danielle E. Jake‐Schoffman, Hannah A. Lavoie, et al.
JMIR Human Factors (2025) Vol. 12, pp. e58715-e58715
Open Access

Cauchy with whale optimizer based eagle strategy for multi-level color hematology image segmentation
Swarnajit Ray, Arunita Das, Krishna Gopal Dhal, et al.
Neural Computing and Applications (2020) Vol. 33, Iss. 11, pp. 5917-5949
Closed Access | Times Cited: 27

Reference-based model using multimodal gated recurrent units for image captioning
Tiago do Carmo Nogueira, Cássio Dener Noronha Vinhal, Gelson da Cruz, et al.
Multimedia Tools and Applications (2020) Vol. 79, Iss. 41-42, pp. 30615-30635
Closed Access | Times Cited: 24

A two-stage CNN-based hand-drawn electrical and electronic circuit component recognition system
Mrityunjoy Dey, Shoif Md Mia, Navonil Sarkar, et al.
Neural Computing and Applications (2021) Vol. 33, Iss. 20, pp. 13367-13390
Closed Access | Times Cited: 23

Cross‐media search method based on complementary attention and generative adversarial network for social networks
Lei Shi, Junping Du, Gang Cheng, et al.
International Journal of Intelligent Systems (2021) Vol. 37, Iss. 8, pp. 4393-4416
Open Access | Times Cited: 21

A new image/video encryption scheme based on fractional discrete Tchebichef transform and singular value decomposition
Omar El Ogri, Hicham Karmouni, Mhamed Sayyouri, et al.
Multimedia Tools and Applications (2023) Vol. 82, Iss. 22, pp. 33465-33497
Closed Access | Times Cited: 8

An exploratory study of factors influencing user app abandonment on smartphones
Shaobo Liang, Ziyi Wei, Lan Zang
Library Hi Tech (2024)
Closed Access | Times Cited: 3

Deblurring microscopic image by integrated convolutional neural network
Yanqi Wang, Zheng Xu, Yifan Yang, et al.
Precision Engineering (2023) Vol. 82, pp. 44-51
Closed Access | Times Cited: 7

Page 1 - Next Page

Scroll to top