ACM Transactions on the Web

Papers
(The median citation count of ACM Transactions on the Web is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
What Did My Users Experience? Discovering Visual Stimuli on Graphical User Interfaces of the Web65
Layout Cross-Browser Failure Classification for Mobile Responsive Design Web Applications: Combining Classification Models Using Feature Selection61
Adoption of Recurrent Innovations: A Large-Scale Case Study on Mobile App Updates55
Introducing the NFT Popularity to Cover the Gap of Rarity in the NFT Evaluation54
Decentralized Model Selection for Test-Time Adaptation in Heterogeneous Connected Systems44
SHGCN: Socially Enhanced Heterogeneous Graph Convolutional Network for Multi-behavior Prediction40
Integrating Content Moderation Systems with Large Language Models38
Summarizing Web Archive Corpora via Social Media Storytelling by Automatically Selecting and Visualizing Exemplars33
BNoteHelper: A Note-based Outline Generation Tool for Structured Learning on Video-sharing Platforms32
Introduction to the Special Issue on Advanced Graph Mining on the Web: Theory, Algorithms, and Applications: Part 231
Introduction to the Special Issue on Advances in Social Media Technologies and Analysis: Part 228
Triangle-oriented Community Detection Considering Node Features and Network Topology24
DeLink: An Adversarial Framework for Defending against Cross-site User Identity Linkage23
Automated Monitoring of Web User Interfaces20
Large Language Models in Crisis Informatics for Zero and Few-Shot Classification17
Ethical Risk Analysis of L2 Rollups16
Personalized Visualization Recommendation16
GPoS: Geospatially-aware Proof of Stake16
BNoteToDanmu: Category-Guided Note-to-Danmu Conversion Method for Learning on Video Sharing Platforms14
Introduction to the Special Issue on Advanced Graph Mining on the Web: Theory, Algorithms, and Applications: Part 114
Cross-domain Transfer of Valence Preferences via a Meta-optimization Approach14
Pretending to be a VIP! Characterization and Detection of Fake and Clone Channels on Telegram14
An Extended Ultimatum Game for Multi-Party Access Control in Social Networks13
Fake News Propagation: A Review of Epidemic Models, Datasets, and Insights13
Multiresolution Local Spectral Attributed Community Search13
Disentangling Decentralized Finance (DeFi) Compositions12
Enhancing Graph Neural Networks via Memorized Global Information12
To Re-experience the Web: A Framework for the Transformation and Replay of Archived Web Pages11
Ransomware Over Modern Web Browsers: A Novel Strain and a New Defense Mechanism10
It's Not Easy: Applying Supervised Machine Learning to Detect Malicious Extensions in the Chrome Web Store9
sGrow: Explaining the Scale-Invariant Strength Assortativity of Streaming Butterflies9
Validation of an Improved Vision-Based Web Page Parsing Pipeline9
CoDÆN: Benchmarks and Comparison of Evolutionary Community Detection Algorithms for Dynamic Networks9
Understanding the Contribution of Recommendation Algorithms on Misinformation Recommendation and Misinformation Dissemination on Social Networks8
Web3-Based Identity and KYC Innovations for Next-Generation FinTech8
ColBERT-PRF: Semantic Pseudo-Relevance Feedback for Dense Passage and Document Retrieval8
Innovative Integration of Q-learning in BSO Algorithm for Adaptive Community Detection in Social Networks7
DCDIMB: Dynamic Community-based Diversified Influence Maximization using Bridge Nodes7
PIDKG: Propagating Interaction Influence on the Dynamic Knowledge Graph for Recommendation7
Exploring Time-Ordered Triadic Closure in Online Social Networks7
Bridging Performance of X (formerly known as Twitter) Users: A Predictor of Subjective Well-Being During the Pandemic7
Optimisation Techniques for Flexible SPARQL Queries7
Joint Credibility Estimation of News, User, and Publisher via Role-relational Graph Convolutional Networks7
Towards More Personalized Recommendations by Modeling Users? Temporal Behaviors with Task-Based Graph Neural Network (TGNN)7
Enhancing Conversational Recommendation Systems with Representation Fusion6
A Regulatable Blockchain Rewriting Scheme for Identity-Aware Data Modification and User Identity Update6
Type Information Utilized Event Detection via Multi-Channel GNNs in Electrical Power Systems6
Edge Caching Placement Strategy based on Evolutionary Game for Conversational Information Seeking in Edge Cloud Computing6
Web3Agent: Automating On-Chain Operations via Natural Language Interfaces6
Privacy Policies and Consent Management Platforms: Growth and Users' Interactions over Time6
TLD-SCA: A Transformer-LSTM Detection Model against Side-Channel Attack in Blockchain Payment Channel6
A Blockchain-Assisted Revocable and Efficient ABSE Scheme for Secure Medical Data Sharing5
Pre-trained Language Model-based Retrieval and Ranking for Web Search5
Learning Dynamic Multimodal Network Slot Concepts from the Web for Forecasting Environmental, Social and Governance Ratings5
Graph Attention Network for Text Classification and Detection of Mental Disorder5
Trust Models Go to the Web: Learning How to Trust Strangers5
A User-Centric Analysis of Social Media for Stock Market Prediction5
LLM-D12: A Dual-Dimensional Scale of Instrumental and Relational Dependencies on Large Language Models5
Reinforced MOOCs Concept Recommendation in Heterogeneous Information Networks5
MuLX-QA: Classifying Multi-Labels and Extracting Rationale Spans in Social Media Posts4
A Graph-Based Framework for Temporal and Causal Analysis of Sentiments4
A Novel Review Helpfulness Measure Based on the User-Review-Item Paradigm4
Online Incentive Protocol Design for Reposting Service in Online Social Networks4
You Shall Not Pass (Without Consent): Enforcing Data Sovereignty with Solid Pods4
Incorporating a Triple Graph Neural Network with Multiple Implicit Feedback for Social Recommendation4
Rethinking Information Retrieval in a Re-Decentralised Web: Exploring the Feasibility and Quality of Search Across Personal Online Datastores4
From Discussions to Decisions: Understanding User Behavior in Decentralized Autonomous Organizations4
Modeling Disinformation Spread in Social Networks: Phase Transitions and Mean-Field Analysis3
A Proxy Re-Encryption Based Trusted Data Sharing Scheme for Digital Twins with Privacy Protection3
RoSGAS : Adaptive Social Bot Detection with Reinforced Self-supervised GNN Architecture Search3
GroupAligner : A Deep Reinforcement Learning with Domain Adaptation for Social Group Alignment3
Classification of Layout vs. Relational Tables on the Web: Machine Learning with Rendered Pages3
A Multi-Task Graph Neural Network with Variational Graph Auto-Encoders for Session-Based Travel Packages Recommendation3
Niffler: Real-time Device-level Anomalies Detection in Smart Home3
Contrastive Graph Similarity Networks3
Privacy Scoring over OSNs: Shared Data Granularity as a Latent Dimension3
PORTRAIT: A Hybrid Approach to Create Extractive Ground-truth Summary for Disaster Event3
Causality and Correlation Graph Modeling for Effective and Explainable Session-Based Recommendation2
Keywords-enhanced Deep Reinforcement Learning Model for Travel Recommendation2
Twitter User Geolocation Based on Location Feature Enhancement2
Understanding Rug Pulls: An In-depth Behavioral Analysis of Fraudulent NFT Creators2
Human Team Behavior and Predictability in the Massively Multiplayer Online Game WOT Blitz2
Beyond Authorial Burden2
Closeness Centrality on Uncertain Graphs2
An Empirical Analysis of Web Storage and Its Applications to Web Tracking2
Scraping Relevant Images from Web Pages without Download2
Matching Tabular Data to Knowledge Graph with Effective Core Column Set Discovery.2
Comparing Echo Chamber Detection Metrics: A Cross-modeling and Cross-platform Analysis of Twitter and Reddit2
“HOT” ChatGPT: The Promise of ChatGPT in Detecting and Discriminating Hateful, Offensive, and Toxic Comments on Social Media2
Pre-Training Across Different Cities for Next POI Recommendation2
Know their Customers: An Empirical Study of Online Account Enumeration Attacks2
Mutexion: Mutually Exclusive Compression System for Mitigating Compression Side-Channel Attacks2
XRAD: Ransomware Address Detection Method based on Bitcoin Transaction Relationships2
0.057329893112183