
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A review on social spam detection: Challenges, open issues, and future directions
Sanjeev Rao, Anil Kumar Verma, Tarunpreet Bhatia
Expert Systems with Applications (2021) Vol. 186, pp. 115742-115742
Closed Access | Times Cited: 145
Sanjeev Rao, Anil Kumar Verma, Tarunpreet Bhatia
Expert Systems with Applications (2021) Vol. 186, pp. 115742-115742
Closed Access | Times Cited: 145
Showing 1-25 of 145 citing articles:
A Systematic Study on Reinforcement Learning Based Applications
Keerthana Sivamayilvelan, R Elakkiya, Belqasem Aljafari, et al.
Energies (2023) Vol. 16, Iss. 3, pp. 1512-1512
Open Access | Times Cited: 68
Keerthana Sivamayilvelan, R Elakkiya, Belqasem Aljafari, et al.
Energies (2023) Vol. 16, Iss. 3, pp. 1512-1512
Open Access | Times Cited: 68
Machine learning-based social media bot detection: a comprehensive literature review
Malak Aljabri, Rachid Zagrouba, Afrah Shaahid, et al.
Social Network Analysis and Mining (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 56
Malak Aljabri, Rachid Zagrouba, Afrah Shaahid, et al.
Social Network Analysis and Mining (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 56
Deepfake video detection: challenges and opportunities
Achhardeep Kaur, Azadeh Noori Hoshyar, Vidya Saikrishna, et al.
Artificial Intelligence Review (2024) Vol. 57, Iss. 6
Closed Access | Times Cited: 19
Achhardeep Kaur, Azadeh Noori Hoshyar, Vidya Saikrishna, et al.
Artificial Intelligence Review (2024) Vol. 57, Iss. 6
Closed Access | Times Cited: 19
Comparative Analysis of ChatGPT-4 and Google Gemini for Spam Detection on the SpamAssassin Public Mail Corpus
Ketut Mardiansyah, Wayan Surya
Research Square (Research Square) (2024)
Open Access | Times Cited: 18
Ketut Mardiansyah, Wayan Surya
Research Square (Research Square) (2024)
Open Access | Times Cited: 18
Application of Natural Language Processing and Machine Learning Boosted with Swarm Intelligence for Spam Email Filtering
Nebojša Bačanin, Miodrag Živković, Cătălin Stoean, et al.
Mathematics (2022) Vol. 10, Iss. 22, pp. 4173-4173
Open Access | Times Cited: 57
Nebojša Bačanin, Miodrag Živković, Cătălin Stoean, et al.
Mathematics (2022) Vol. 10, Iss. 22, pp. 4173-4173
Open Access | Times Cited: 57
“Real Attackers Don't Compute Gradients”: Bridging the Gap Between Adversarial ML Research and Practice
Giovanni Apruzzese, Hyrum S. Anderson, Savino Dambra, et al.
(2023)
Open Access | Times Cited: 38
Giovanni Apruzzese, Hyrum S. Anderson, Savino Dambra, et al.
(2023)
Open Access | Times Cited: 38
Hybrid ensemble framework with self-attention mechanism for social spam detection on imbalanced data
Sanjeev Rao, Anil Kumar Verma, Tarunpreet Bhatia
Expert Systems with Applications (2023) Vol. 217, pp. 119594-119594
Closed Access | Times Cited: 36
Sanjeev Rao, Anil Kumar Verma, Tarunpreet Bhatia
Expert Systems with Applications (2023) Vol. 217, pp. 119594-119594
Closed Access | Times Cited: 36
Addressing feature selection and extreme learning machine tuning by diversity-oriented social network search: an application for phishing websites detection
Nebojša Bačanin, Miodrag Živković, Miloš Antonijević, et al.
Complex & Intelligent Systems (2023) Vol. 9, Iss. 6, pp. 7269-7304
Open Access | Times Cited: 25
Nebojša Bačanin, Miodrag Živković, Miloš Antonijević, et al.
Complex & Intelligent Systems (2023) Vol. 9, Iss. 6, pp. 7269-7304
Open Access | Times Cited: 25
Research on aesthetic perception factors of city outdoor advertising based on Kano model
Jialing Chen, Wanli Zhang, Jizhou Chen, et al.
Acta Psychologica (2025) Vol. 254, pp. 104821-104821
Closed Access | Times Cited: 1
Jialing Chen, Wanli Zhang, Jizhou Chen, et al.
Acta Psychologica (2025) Vol. 254, pp. 104821-104821
Closed Access | Times Cited: 1
Deepfakes: evolution and trends
Rosa Gil, Jordi Virgili‐Gomà, Juan Miguel López, et al.
Soft Computing (2023) Vol. 27, Iss. 16, pp. 11295-11318
Open Access | Times Cited: 18
Rosa Gil, Jordi Virgili‐Gomà, Juan Miguel López, et al.
Soft Computing (2023) Vol. 27, Iss. 16, pp. 11295-11318
Open Access | Times Cited: 18
Deep convolutional forest: a dynamic deep ensemble approach for spam detection in text
Mai A. Shaaban, Yasser F. Hassan, Shawkat K. Guirguis
Complex & Intelligent Systems (2022) Vol. 8, Iss. 6, pp. 4897-4909
Open Access | Times Cited: 28
Mai A. Shaaban, Yasser F. Hassan, Shawkat K. Guirguis
Complex & Intelligent Systems (2022) Vol. 8, Iss. 6, pp. 4897-4909
Open Access | Times Cited: 28
An unsupervised method for social network spammer detection based on user information interests
Darshika Koggalahewa, Yue Xu, Ernest Foo
Journal Of Big Data (2022) Vol. 9, Iss. 1
Open Access | Times Cited: 24
Darshika Koggalahewa, Yue Xu, Ernest Foo
Journal Of Big Data (2022) Vol. 9, Iss. 1
Open Access | Times Cited: 24
A deep learning method for automatic SMS spam classification: Performance of learning algorithms on indigenous dataset
Olusola Abayomi‐Alli, Sanjay Misra, Adebayo Abayomi‐Alli
Concurrency and Computation Practice and Experience (2022) Vol. 34, Iss. 17
Closed Access | Times Cited: 23
Olusola Abayomi‐Alli, Sanjay Misra, Adebayo Abayomi‐Alli
Concurrency and Computation Practice and Experience (2022) Vol. 34, Iss. 17
Closed Access | Times Cited: 23
Learning textual features for Twitter spam detection: A systematic literature review
Sepideh Bazzaz Abkenar, Mostafa Haghi Kashani, Mohammad Akbari, et al.
Expert Systems with Applications (2023) Vol. 228, pp. 120366-120366
Closed Access | Times Cited: 16
Sepideh Bazzaz Abkenar, Mostafa Haghi Kashani, Mohammad Akbari, et al.
Expert Systems with Applications (2023) Vol. 228, pp. 120366-120366
Closed Access | Times Cited: 16
Evaluating the Effectiveness of AI-Driven Frameworks in Predicting and Preventing Cyber Attacks
Karthik Meduri, Hari Gonaygunt, Geeta Sandeep Nadella
International Journal of Research Publication and Reviews (2024) Vol. 5, Iss. 3, pp. 6591-6595
Open Access | Times Cited: 6
Karthik Meduri, Hari Gonaygunt, Geeta Sandeep Nadella
International Journal of Research Publication and Reviews (2024) Vol. 5, Iss. 3, pp. 6591-6595
Open Access | Times Cited: 6
Overcoming the Challenges of Data Lack, Leakage, and Dimensionality in Intrusion Detection Systems: A Comprehensive Review
Mohamed Aly Bouke, Azizol Abdullah, Nur Izura Udzir, et al.
Journal of Communication and Information Systems (2024) Vol. 39, Iss. 2024, pp. 22-34
Open Access | Times Cited: 5
Mohamed Aly Bouke, Azizol Abdullah, Nur Izura Udzir, et al.
Journal of Communication and Information Systems (2024) Vol. 39, Iss. 2024, pp. 22-34
Open Access | Times Cited: 5
Threats on online social network platforms: classification, detection, and prevention techniques
Akash Shah, Sapna Varshney, Monica Mehrotra
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 5
Akash Shah, Sapna Varshney, Monica Mehrotra
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 5
Review for Meta-Heuristic Optimization Propels Machine Learning Computations Execution on Spam Comment Area Under Digital Security Aegis Region
Biswajit Mondal, Debkanta Chakraborty, Niloy Kumar Bhattacherjee, et al.
Studies in computational intelligence (2022), pp. 343-361
Closed Access | Times Cited: 20
Biswajit Mondal, Debkanta Chakraborty, Niloy Kumar Bhattacherjee, et al.
Studies in computational intelligence (2022), pp. 343-361
Closed Access | Times Cited: 20
SybilFlyover: Heterogeneous graph-based fake account detection model on social networks
Siyu Li, Jin Yang, Gang Liang, et al.
Knowledge-Based Systems (2022) Vol. 258, pp. 110038-110038
Closed Access | Times Cited: 20
Siyu Li, Jin Yang, Gang Liang, et al.
Knowledge-Based Systems (2022) Vol. 258, pp. 110038-110038
Closed Access | Times Cited: 20
Energy-Efficient Self-Supervised Technique to Identify Abnormal User Over 5G Network for E-Commerce
Sami Ahmed Haider, Mohammad Zia Ur Rahman, Sachin Gupta, et al.
IEEE Transactions on Consumer Electronics (2024) Vol. 70, Iss. 1, pp. 1631-1639
Closed Access | Times Cited: 4
Sami Ahmed Haider, Mohammad Zia Ur Rahman, Sachin Gupta, et al.
IEEE Transactions on Consumer Electronics (2024) Vol. 70, Iss. 1, pp. 1631-1639
Closed Access | Times Cited: 4
Bengali fake reviews: A benchmark dataset and detection system
G. M. Shahariar, Md. Tanvir Rouf Shawon, Faisal Muhammad Shah, et al.
Neurocomputing (2024) Vol. 592, pp. 127732-127732
Open Access | Times Cited: 4
G. M. Shahariar, Md. Tanvir Rouf Shawon, Faisal Muhammad Shah, et al.
Neurocomputing (2024) Vol. 592, pp. 127732-127732
Open Access | Times Cited: 4
A novel deep learning model-based optimization algorithm for text message spam detection
Lipsa Das, Laxmi Ahuja, Adesh Pandey
The Journal of Supercomputing (2024) Vol. 80, Iss. 12, pp. 17823-17848
Closed Access | Times Cited: 4
Lipsa Das, Laxmi Ahuja, Adesh Pandey
The Journal of Supercomputing (2024) Vol. 80, Iss. 12, pp. 17823-17848
Closed Access | Times Cited: 4
Towards Transparent Cybersecurity: The Role of Explainable AI in Mitigating Spam Threats
El Arbi Abdellaoui Alaoui, Adnane Filali, Amine Sallah, et al.
Procedia Computer Science (2024) Vol. 236, pp. 394-401
Open Access | Times Cited: 4
El Arbi Abdellaoui Alaoui, Adnane Filali, Amine Sallah, et al.
Procedia Computer Science (2024) Vol. 236, pp. 394-401
Open Access | Times Cited: 4
Scams and Frauds in the Digital Age: ML-Based Detection and Prevention Strategies
Sai Venkata Jaswant Kolupuri, Ananya Paul, Rajat Subhra Bhowmick, et al.
(2025), pp. 340-345
Closed Access
Sai Venkata Jaswant Kolupuri, Ananya Paul, Rajat Subhra Bhowmick, et al.
(2025), pp. 340-345
Closed Access
Spam Email Detection using Naïve Bayes classifier
L. G. Wang
ITM Web of Conferences (2025) Vol. 70, pp. 04028-04028
Open Access
L. G. Wang
ITM Web of Conferences (2025) Vol. 70, pp. 04028-04028
Open Access