
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Adaptive Attention-Based Graph Representation Learning to Detect Phishing Accounts on the Ethereum Blockchain
Haojie Sun, Zhaowei Liu, Shenqiang Wang, et al.
IEEE Transactions on Network Science and Engineering (2024) Vol. 11, Iss. 3, pp. 2963-2975
Closed Access | Times Cited: 14
Haojie Sun, Zhaowei Liu, Shenqiang Wang, et al.
IEEE Transactions on Network Science and Engineering (2024) Vol. 11, Iss. 3, pp. 2963-2975
Closed Access | Times Cited: 14
Showing 14 citing articles:
Graph neural networks for financial fraud detection: a review
Dawei Cheng, Yao Zou, Sheng Xiang, et al.
Frontiers of Computer Science (2025) Vol. 19, Iss. 9
Open Access | Times Cited: 7
Dawei Cheng, Yao Zou, Sheng Xiang, et al.
Frontiers of Computer Science (2025) Vol. 19, Iss. 9
Open Access | Times Cited: 7
A blockchain platform selection method with heterogeneous multi-criteria Decision-Making based on hybrid distance measures and an AHP-EWM weight method
Jun Liu, Qi Zhang, Mingyue Xie, et al.
Expert Systems with Applications (2024) Vol. 256, pp. 124910-124910
Closed Access | Times Cited: 8
Jun Liu, Qi Zhang, Mingyue Xie, et al.
Expert Systems with Applications (2024) Vol. 256, pp. 124910-124910
Closed Access | Times Cited: 8
An Effective Detection Approach for Phishing URL Using ResMLP
S. Remya, Manu J. Pillai, Kajal K. Nair, et al.
IEEE Access (2024) Vol. 12, pp. 79367-79382
Open Access | Times Cited: 5
S. Remya, Manu J. Pillai, Kajal K. Nair, et al.
IEEE Access (2024) Vol. 12, pp. 79367-79382
Open Access | Times Cited: 5
Momentum gradient-based untargeted poisoning attack on hypergraph neural networks
Yang Chen, Stjepan Picek, Zhonglin Ye, et al.
Neurocomputing (2025), pp. 129835-129835
Closed Access
Yang Chen, Stjepan Picek, Zhonglin Ye, et al.
Neurocomputing (2025), pp. 129835-129835
Closed Access
DAG-HFC: Dual-domain attention and graph optimization network for heterogeneous graph feature completion
Yingjie Jiang, Zhaowei Liu, Yongchao Song, et al.
Expert Systems with Applications (2025) Vol. 278, pp. 127293-127293
Closed Access
Yingjie Jiang, Zhaowei Liu, Yongchao Song, et al.
Expert Systems with Applications (2025) Vol. 278, pp. 127293-127293
Closed Access
Parallel graph neural architecture search optimization with incomplete features
Haitao Yang, Zhaowei Liu, Dong Yang, et al.
Applied Soft Computing (2025), pp. 113068-113068
Closed Access
Haitao Yang, Zhaowei Liu, Dong Yang, et al.
Applied Soft Computing (2025), pp. 113068-113068
Closed Access
An approach to stock price prediction based on improved EEMD and attention-enhanced BiLSTM
Zhizhong Liu, Z. Su, Ling Shang, et al.
Expert Systems with Applications (2025), pp. 127802-127802
Closed Access
Zhizhong Liu, Z. Su, Ling Shang, et al.
Expert Systems with Applications (2025), pp. 127802-127802
Closed Access
Graph Structure Learning With Automatic Search of Hyperparameters Based on Genetic Programming
Pengda Wang, Mingjie Lu, Weiqing Yan, et al.
IEEE Transactions on Emerging Topics in Computational Intelligence (2024) Vol. 8, Iss. 6, pp. 4155-4164
Closed Access | Times Cited: 1
Pengda Wang, Mingjie Lu, Weiqing Yan, et al.
IEEE Transactions on Emerging Topics in Computational Intelligence (2024) Vol. 8, Iss. 6, pp. 4155-4164
Closed Access | Times Cited: 1
A Token-based Approach to Detect Fraud in Ethereum Transactions
Praniket Walavalkar, Ansh Dasrapuria, Meghna Sarda, et al.
International Journal for Research in Applied Science and Engineering Technology (2024) Vol. 12, Iss. 4, pp. 34-42
Open Access
Praniket Walavalkar, Ansh Dasrapuria, Meghna Sarda, et al.
International Journal for Research in Applied Science and Engineering Technology (2024) Vol. 12, Iss. 4, pp. 34-42
Open Access
Bayesian graph convolutional network with partial observations
Shuhui Luo, Peilan Liu, Xulun Ye
PLoS ONE (2024) Vol. 19, Iss. 7, pp. e0307146-e0307146
Open Access
Shuhui Luo, Peilan Liu, Xulun Ye
PLoS ONE (2024) Vol. 19, Iss. 7, pp. e0307146-e0307146
Open Access
KGhish: A Phishing Website Detection Method Based on Knowledge Graph
Changlin Liu, Shanshan Wang, Zhenxiang Chen, et al.
Lecture notes in computer science (2024), pp. 300-311
Closed Access
Changlin Liu, Shanshan Wang, Zhenxiang Chen, et al.
Lecture notes in computer science (2024), pp. 300-311
Closed Access
A Flexible Hierarchical Framework for Implicit 3D Characterization of Bionic Devices
Yunhong Lu, Xiangnan Li, Mingliang Li
Biomimetics (2024) Vol. 9, Iss. 10, pp. 590-590
Open Access
Yunhong Lu, Xiangnan Li, Mingliang Li
Biomimetics (2024) Vol. 9, Iss. 10, pp. 590-590
Open Access
BAB-GSL: Using Bayesian influence with attention mechanism to optimize graph structure in basic views
Zhaowei Liu, Miaosi Xie, Yongchao Song, et al.
Neural Networks (2024) Vol. 181, pp. 106785-106785
Closed Access
Zhaowei Liu, Miaosi Xie, Yongchao Song, et al.
Neural Networks (2024) Vol. 181, pp. 106785-106785
Closed Access
Cryptocurrency Transaction Anomaly Detection Based on Chebyshev Graph Neural Network
Chao Li, Xiangkai Zhu, Jianjia Li, et al.
Communications in computer and information science (2024), pp. 375-386
Closed Access
Chao Li, Xiangkai Zhu, Jianjia Li, et al.
Communications in computer and information science (2024), pp. 375-386
Closed Access