
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing
M. J. Jiménez-Navarro, M. Martínez-Ballesteros, Isabel Sofía Brito, et al.
(2023)
Open Access | Times Cited: 38
M. J. Jiménez-Navarro, M. Martínez-Ballesteros, Isabel Sofía Brito, et al.
(2023)
Open Access | Times Cited: 38
Showing 1-25 of 38 citing articles:
A comprehensive survey on design and application of autoencoder in deep learning
Pengzhi Li, Yan Pei, Jianqiang Li
Applied Soft Computing (2023) Vol. 138, pp. 110176-110176
Closed Access | Times Cited: 192
Pengzhi Li, Yan Pei, Jianqiang Li
Applied Soft Computing (2023) Vol. 138, pp. 110176-110176
Closed Access | Times Cited: 192
Generative AI Empowered Network Digital Twins: Architecture, Technologies, and Applications
Tong Li, Qingyue Long, Haoye Chai, et al.
ACM Computing Surveys (2025)
Closed Access | Times Cited: 12
Tong Li, Qingyue Long, Haoye Chai, et al.
ACM Computing Surveys (2025)
Closed Access | Times Cited: 12
Machine learning robustness: a primer
Houssem Ben Braiek, Foutse Khomh
Elsevier eBooks (2025), pp. 37-71
Open Access | Times Cited: 4
Houssem Ben Braiek, Foutse Khomh
Elsevier eBooks (2025), pp. 37-71
Open Access | Times Cited: 4
Evolving techniques in cyber threat hunting: A systematic review
Arash Mahboubi, Khanh Luong, Hamed Aboutorab, et al.
Journal of Network and Computer Applications (2024) Vol. 232, pp. 104004-104004
Open Access | Times Cited: 10
Arash Mahboubi, Khanh Luong, Hamed Aboutorab, et al.
Journal of Network and Computer Applications (2024) Vol. 232, pp. 104004-104004
Open Access | Times Cited: 10
Advances in natural language processing for healthcare: A comprehensive review of techniques, applications, and future directions
Fatmah Alafari, Maha Driss, Asma Cherif
Computer Science Review (2025) Vol. 56, pp. 100725-100725
Closed Access | Times Cited: 1
Fatmah Alafari, Maha Driss, Asma Cherif
Computer Science Review (2025) Vol. 56, pp. 100725-100725
Closed Access | Times Cited: 1
Declarative RDF graph generation from heterogeneous (semi-)structured data: A systematic literature review
Dylan Van Assche, Thomas Delva, Gerald Haesendonck, et al.
Journal of Web Semantics (2022) Vol. 75, pp. 100753-100753
Open Access | Times Cited: 30
Dylan Van Assche, Thomas Delva, Gerald Haesendonck, et al.
Journal of Web Semantics (2022) Vol. 75, pp. 100753-100753
Open Access | Times Cited: 30
An enhanced energy efficient protocol for large-scale IoT-based heterogeneous WSNs
Antar Shaddad H. Abdul-Qawy, Nayef Abdulwahab Mohammed Alduais, Abdul‐Malik H. Y. Saad, et al.
Scientific African (2023) Vol. 21, pp. e01807-e01807
Open Access | Times Cited: 22
Antar Shaddad H. Abdul-Qawy, Nayef Abdulwahab Mohammed Alduais, Abdul‐Malik H. Y. Saad, et al.
Scientific African (2023) Vol. 21, pp. e01807-e01807
Open Access | Times Cited: 22
Defending novice user privacy: An evaluation of default web browser configurations
Kristina Radivojevic, N Clark, Anna Klempay, et al.
Computers & Security (2024) Vol. 140, pp. 103784-103784
Closed Access | Times Cited: 6
Kristina Radivojevic, N Clark, Anna Klempay, et al.
Computers & Security (2024) Vol. 140, pp. 103784-103784
Closed Access | Times Cited: 6
A Macro- and Micro-Hierarchical Transfer Learning Framework for Cross-Domain Fake News Detection
Xuankai Yang, Yan Wang, Xiuzhen Zhang, et al.
(2025), pp. 5297-5307
Open Access
Xuankai Yang, Yan Wang, Xiuzhen Zhang, et al.
(2025), pp. 5297-5307
Open Access
Penterep: Comprehensive penetration testing with adaptable interactive checklists
Willi Lazarov, Pavel Šeda, Zdeněk Martinásek, et al.
Computers & Security (2025), pp. 104399-104399
Open Access
Willi Lazarov, Pavel Šeda, Zdeněk Martinásek, et al.
Computers & Security (2025), pp. 104399-104399
Open Access
A Transformer-Enhanced LSTM Framework for Robust Malicious Traffic Detection in Industrial Control Systems
Fang Wang, Yuxuan Liu, Zhongyuan Qin, et al.
Knowledge-Based Systems (2025), pp. 113725-113725
Closed Access
Fang Wang, Yuxuan Liu, Zhongyuan Qin, et al.
Knowledge-Based Systems (2025), pp. 113725-113725
Closed Access
Bridging Language Gaps: The Role of NLP And Speech Recognition in Oral English Instruction
Deepika Dubey, Deepika Dubey, D. Raja, et al.
MethodsX (2025), pp. 103359-103359
Open Access
Deepika Dubey, Deepika Dubey, D. Raja, et al.
MethodsX (2025), pp. 103359-103359
Open Access
Lightweight Federated Learning-Based Intrusion Detection System for Industrial Internet of Things
Sun-Jin Lee, Il-Gu Lee
ICT Express (2025)
Open Access
Sun-Jin Lee, Il-Gu Lee
ICT Express (2025)
Open Access
Fault localization of AI-enabled cyber-physical systems by exploiting temporal neuron activation
Deyun Lyu, Yi Li, Zhenya Zhang, et al.
Journal of Systems and Software (2025), pp. 112475-112475
Closed Access
Deyun Lyu, Yi Li, Zhenya Zhang, et al.
Journal of Systems and Software (2025), pp. 112475-112475
Closed Access
Onto-CARMEN: Ontology-driven approach for Cyber–Physical System Security Requirements meta-modelling and reasoning
Carlos Blanco, David G. Rosado, Ángel Jesús Varela‐Vaca, et al.
Internet of Things (2023) Vol. 24, pp. 100989-100989
Open Access | Times Cited: 8
Carlos Blanco, David G. Rosado, Ángel Jesús Varela‐Vaca, et al.
Internet of Things (2023) Vol. 24, pp. 100989-100989
Open Access | Times Cited: 8
Energy-efficient scheduling for parallel applications with reliability and time constraints on heterogeneous distributed systems
Hongzhi Xu, Binlian Zhang, Pan Chen, et al.
Journal of Systems Architecture (2024) Vol. 152, pp. 103173-103173
Closed Access | Times Cited: 2
Hongzhi Xu, Binlian Zhang, Pan Chen, et al.
Journal of Systems Architecture (2024) Vol. 152, pp. 103173-103173
Closed Access | Times Cited: 2
Integrating multiple data sources to measure sustainable tourism in Italian regions
Fabrizio Antolini, Ivan Terraglia, Samuele Cesarini
Socio-Economic Planning Sciences (2024) Vol. 95, pp. 101959-101959
Closed Access | Times Cited: 2
Fabrizio Antolini, Ivan Terraglia, Samuele Cesarini
Socio-Economic Planning Sciences (2024) Vol. 95, pp. 101959-101959
Closed Access | Times Cited: 2
Energy-efficient triple modular redundancy scheduling on heterogeneous multi-core real-time systems
Hongzhi Xu, Binlian Zhang, Pan Chen, et al.
Journal of Parallel and Distributed Computing (2024) Vol. 191, pp. 104915-104915
Closed Access | Times Cited: 2
Hongzhi Xu, Binlian Zhang, Pan Chen, et al.
Journal of Parallel and Distributed Computing (2024) Vol. 191, pp. 104915-104915
Closed Access | Times Cited: 2
yupi: Generation, tracking and analysis of trajectory data in Python
A. Reyes, G. Viera-López, J. J. Morgado-Vega, et al.
Environmental Modelling & Software (2023) Vol. 163, pp. 105679-105679
Open Access | Times Cited: 5
A. Reyes, G. Viera-López, J. J. Morgado-Vega, et al.
Environmental Modelling & Software (2023) Vol. 163, pp. 105679-105679
Open Access | Times Cited: 5
DongTing: A large-scale dataset for anomaly detection of the Linux kernel
Guoyun Duan, Yuanzhi Fu, Minjie Cai, et al.
Journal of Systems and Software (2023) Vol. 203, pp. 111745-111745
Closed Access | Times Cited: 5
Guoyun Duan, Yuanzhi Fu, Minjie Cai, et al.
Journal of Systems and Software (2023) Vol. 203, pp. 111745-111745
Closed Access | Times Cited: 5
Towards long-term depolarized interactive recommendations
Mohamed Lechiakh, Zakaria El-Moutaouakkil, Alexandre Maurer
Information Processing & Management (2024) Vol. 61, Iss. 6, pp. 103833-103833
Closed Access | Times Cited: 1
Mohamed Lechiakh, Zakaria El-Moutaouakkil, Alexandre Maurer
Information Processing & Management (2024) Vol. 61, Iss. 6, pp. 103833-103833
Closed Access | Times Cited: 1
An Exploratory Study on Machine Learning Model Management
Jasmine Latendresse, Samuel Abedu, Ahmad Abdellatif, et al.
ACM Transactions on Software Engineering and Methodology (2024)
Open Access | Times Cited: 1
Jasmine Latendresse, Samuel Abedu, Ahmad Abdellatif, et al.
ACM Transactions on Software Engineering and Methodology (2024)
Open Access | Times Cited: 1
An empirical study of ChatGPT-related projects and their issues on GitHub
Zheng Lin, Neng Zhang, Chao Liu, et al.
Expert Systems with Applications (2024), pp. 126113-126113
Closed Access | Times Cited: 1
Zheng Lin, Neng Zhang, Chao Liu, et al.
Expert Systems with Applications (2024), pp. 126113-126113
Closed Access | Times Cited: 1
Accuracy- and consistency-aware recommendation of configurations
Mathias Uta, Alexander Felfernig, Denis Helić, et al.
(2022), pp. 79-84
Closed Access | Times Cited: 5
Mathias Uta, Alexander Felfernig, Denis Helić, et al.
(2022), pp. 79-84
Closed Access | Times Cited: 5
Greediness is not always a vice: Efficient Discovery Algorithms for Assignment Problems
Romaric Duvignau, Ralf Klasing
Procedia Computer Science (2023) Vol. 223, pp. 43-52
Open Access | Times Cited: 1
Romaric Duvignau, Ralf Klasing
Procedia Computer Science (2023) Vol. 223, pp. 43-52
Open Access | Times Cited: 1