
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
An unsupervised deep learning ensemble model for anomaly detection in static attributed social networks
Wasim Khan, Mohammad Haroon
International Journal of Cognitive Computing in Engineering (2022) Vol. 3, pp. 153-160
Open Access | Times Cited: 37
Wasim Khan, Mohammad Haroon
International Journal of Cognitive Computing in Engineering (2022) Vol. 3, pp. 153-160
Open Access | Times Cited: 37
Showing 1-25 of 37 citing articles:
Multi-class sentiment classification on Bengali social media comments using machine learning
Rezaul Haque, Naimul Islam, Mayisha Tasneem, et al.
International Journal of Cognitive Computing in Engineering (2023) Vol. 4, pp. 21-35
Open Access | Times Cited: 63
Rezaul Haque, Naimul Islam, Mayisha Tasneem, et al.
International Journal of Cognitive Computing in Engineering (2023) Vol. 4, pp. 21-35
Open Access | Times Cited: 63
Comparison of multiclass classification techniques using dry bean dataset
Md. Salauddin Khan, Tushar Deb Nath, Md. Murad Hossain, et al.
International Journal of Cognitive Computing in Engineering (2023) Vol. 4, pp. 6-20
Open Access | Times Cited: 28
Md. Salauddin Khan, Tushar Deb Nath, Md. Murad Hossain, et al.
International Journal of Cognitive Computing in Engineering (2023) Vol. 4, pp. 6-20
Open Access | Times Cited: 28
Detecting Anomalies in Attributed Networks Through Sparse Canonical Correlation Analysis Combined With Random Masking and Padding
Wasim Khan, Mohammad Ishrat, Ahmad Neyaz Khan, et al.
IEEE Access (2024) Vol. 12, pp. 65555-65569
Open Access | Times Cited: 11
Wasim Khan, Mohammad Ishrat, Ahmad Neyaz Khan, et al.
IEEE Access (2024) Vol. 12, pp. 65555-65569
Open Access | Times Cited: 11
Estimating rumor source in social networks using incomplete observer information
Ravi Kishore Devarapalli, Anupam Biswas
Expert Systems with Applications (2024) Vol. 249, pp. 123499-123499
Closed Access | Times Cited: 9
Ravi Kishore Devarapalli, Anupam Biswas
Expert Systems with Applications (2024) Vol. 249, pp. 123499-123499
Closed Access | Times Cited: 9
Anomalous node detection in attributed social networks using dual variational autoencoder with generative adversarial networks
Wasim Khan, Shafiqul Abidin, Mohammad Arif, et al.
Data Science and Management (2023) Vol. 7, Iss. 2, pp. 89-98
Open Access | Times Cited: 19
Wasim Khan, Shafiqul Abidin, Mohammad Arif, et al.
Data Science and Management (2023) Vol. 7, Iss. 2, pp. 89-98
Open Access | Times Cited: 19
Fake review detection using transformer-based enhanced LSTM and RoBERTa
Rami Mohawesh, Haythem Bany Salameh, Yaser Jararweh, et al.
International Journal of Cognitive Computing in Engineering (2024) Vol. 5, pp. 250-258
Open Access | Times Cited: 6
Rami Mohawesh, Haythem Bany Salameh, Yaser Jararweh, et al.
International Journal of Cognitive Computing in Engineering (2024) Vol. 5, pp. 250-258
Open Access | Times Cited: 6
Deep Learning-Driven Optimized Approaches for Network Anomaly Detection in IoT-Enabled Cloud Ecosystems: A Comprehensive Review
Anjum Ahsan, Parvez Rauf, Mohd Haroon
International Journal of Innovative Research in Computer Science & Technology (2025) Vol. 13, Iss. 1, pp. 12-18
Open Access
Anjum Ahsan, Parvez Rauf, Mohd Haroon
International Journal of Innovative Research in Computer Science & Technology (2025) Vol. 13, Iss. 1, pp. 12-18
Open Access
Cloud-Based Digital Twins: Revolutionizing Healthcare Monitoring and Management: A Comprehensive Review
Rizwan Taj, A. S. A. Ferdous Alam, Falak Alam, et al.
International Journal of Innovative Research in Computer Science & Technology (2025) Vol. 13, Iss. 1, pp. 19-25
Open Access
Rizwan Taj, A. S. A. Ferdous Alam, Falak Alam, et al.
International Journal of Innovative Research in Computer Science & Technology (2025) Vol. 13, Iss. 1, pp. 19-25
Open Access
Role of Generative AI for Fraud Detection and Prevention
Prasanna Kulkarni, Pankaj Pathak, Samaya Pillai, et al.
(2025), pp. 175-198
Closed Access
Prasanna Kulkarni, Pankaj Pathak, Samaya Pillai, et al.
(2025), pp. 175-198
Closed Access
A comprehensive survey on GNN-based anomaly detection: taxonomy, methods, and the role of large language models
Ziqi Yuan, Qingyun Sun, Haoyi Zhou, et al.
International Journal of Machine Learning and Cybernetics (2025)
Closed Access
Ziqi Yuan, Qingyun Sun, Haoyi Zhou, et al.
International Journal of Machine Learning and Cybernetics (2025)
Closed Access
Leveraging attention layer in improving deep learning models performance for sentiment analysis
Monir Yahya Ali Salmony, Arman Rasool Faridi, Faraz Masood
International Journal of Information Technology (2023)
Closed Access | Times Cited: 9
Monir Yahya Ali Salmony, Arman Rasool Faridi, Faraz Masood
International Journal of Information Technology (2023)
Closed Access | Times Cited: 9
Deep learning-based approaches for abusive content detection and classification for multi-class online user-generated data
Simrat Kaur, Sarbjeet Singh, Sakshi Kaushal
International Journal of Cognitive Computing in Engineering (2024) Vol. 5, pp. 104-122
Open Access | Times Cited: 3
Simrat Kaur, Sarbjeet Singh, Sakshi Kaushal
International Journal of Cognitive Computing in Engineering (2024) Vol. 5, pp. 104-122
Open Access | Times Cited: 3
Unveiling the Depths of Explainable AI
Wasim Khan, Mohammad Ishrat
Advances in systems analysis, software engineering, and high performance computing book series (2024), pp. 78-106
Closed Access | Times Cited: 3
Wasim Khan, Mohammad Ishrat
Advances in systems analysis, software engineering, and high performance computing book series (2024), pp. 78-106
Closed Access | Times Cited: 3
Advances in deep learning intrusion detection over encrypted data with privacy preservation: a systematic review
Fatma Hendaoui, Ahlem Ferchichi, Lamia Trabelsi, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 8683-8724
Closed Access | Times Cited: 3
Fatma Hendaoui, Ahlem Ferchichi, Lamia Trabelsi, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 8683-8724
Closed Access | Times Cited: 3
Securing the IoT Cyber Environment: Enhancing Intrusion Anomaly Detection With Vision Transformers
Laraib Sana, Mohsin Nazir, Jing Yang, et al.
IEEE Access (2024) Vol. 12, pp. 82443-82468
Open Access | Times Cited: 3
Laraib Sana, Mohsin Nazir, Jing Yang, et al.
IEEE Access (2024) Vol. 12, pp. 82443-82468
Open Access | Times Cited: 3
A comprehensive study of auto-encoders for anomaly detection: Efficiency and trade-offs
Asif Ahmed Neloy, Maxime Turgeon
Machine Learning with Applications (2024) Vol. 17, pp. 100572-100572
Open Access | Times Cited: 3
Asif Ahmed Neloy, Maxime Turgeon
Machine Learning with Applications (2024) Vol. 17, pp. 100572-100572
Open Access | Times Cited: 3
An Extensive Study and Review on Dark Web Threats and Detection Techniques
Wasim Khan, Mohammad Ishrat, Mohd Haleem, et al.
Advances in human and social aspects of technology book series (2023), pp. 202-219
Closed Access | Times Cited: 9
Wasim Khan, Mohammad Ishrat, Mohd Haleem, et al.
Advances in human and social aspects of technology book series (2023), pp. 202-219
Closed Access | Times Cited: 9
UAV Abnormal State Detection Model Based on Timestamp Slice and Multi-Separable CNN
Tao Yang, Jiangchuan Chen, Hongli Deng, et al.
Electronics (2023) Vol. 12, Iss. 6, pp. 1299-1299
Open Access | Times Cited: 8
Tao Yang, Jiangchuan Chen, Hongli Deng, et al.
Electronics (2023) Vol. 12, Iss. 6, pp. 1299-1299
Open Access | Times Cited: 8
FEGAN: A Feature Extraction Based Approach for GAN Anomaly Detection and Localization
Fuyou Fan, Lin Zhang, Yang Dai
IEEE Access (2024) Vol. 12, pp. 76154-76168
Open Access | Times Cited: 2
Fuyou Fan, Lin Zhang, Yang Dai
IEEE Access (2024) Vol. 12, pp. 76154-76168
Open Access | Times Cited: 2
Diverse joint nonnegative matrix tri-factorization for attributed graph clustering
Arina Mohammadi, Seyed Amjad Seyedi, Fardin Akhlaghian Tab, et al.
Applied Soft Computing (2024) Vol. 164, pp. 112012-112012
Closed Access | Times Cited: 2
Arina Mohammadi, Seyed Amjad Seyedi, Fardin Akhlaghian Tab, et al.
Applied Soft Computing (2024) Vol. 164, pp. 112012-112012
Closed Access | Times Cited: 2
Multi Level Deep Learning Model for Network Anomaly Detection
Maythem S. Derweesh, Sundos Abdulameer Alazawi, Anwar H. Al-Saleh
Journal of Al-Qadisiyah for Computer Science and Mathematics (2024) Vol. 15, Iss. 4
Open Access | Times Cited: 1
Maythem S. Derweesh, Sundos Abdulameer Alazawi, Anwar H. Al-Saleh
Journal of Al-Qadisiyah for Computer Science and Mathematics (2024) Vol. 15, Iss. 4
Open Access | Times Cited: 1
Performance Analysis of Classification Models for Network Anomaly Detection
Maythem S. Derweesh, Sundos Abdulameer Alazawi, Anwar H. Al-Saleh
Lecture notes in networks and systems (2024), pp. 155-166
Closed Access | Times Cited: 1
Maythem S. Derweesh, Sundos Abdulameer Alazawi, Anwar H. Al-Saleh
Lecture notes in networks and systems (2024), pp. 155-166
Closed Access | Times Cited: 1
Innovative IoT Threat Detection: Weighted Variational Autoencoder-Based Hunter Prey Search Algorithm for Strengthening Cybersecurity
Sami Alshmrany
IETE Journal of Research (2024) Vol. 70, Iss. 10, pp. 7687-7700
Closed Access | Times Cited: 1
Sami Alshmrany
IETE Journal of Research (2024) Vol. 70, Iss. 10, pp. 7687-7700
Closed Access | Times Cited: 1
Innovations in Healthcare through Computational Intelligence- A Study of Smart Technologies and AI
Nazish Adeel, Nudrat Fatima
International Journal of Innovative Research in Computer Science & Technology (2024) Vol. 12, Iss. 4, pp. 38-42
Open Access | Times Cited: 1
Nazish Adeel, Nudrat Fatima
International Journal of Innovative Research in Computer Science & Technology (2024) Vol. 12, Iss. 4, pp. 38-42
Open Access | Times Cited: 1
GMG-NCDVAE: Guided de novo Molecule Generation using NLP Techniques and Constrained Diverse Variational Autoencoder
Arun Singh Bhadwal, Kamal Kumar, Neeraj Kumar
ACM Transactions on Asian and Low-Resource Language Information Processing (2023)
Open Access | Times Cited: 2
Arun Singh Bhadwal, Kamal Kumar, Neeraj Kumar
ACM Transactions on Asian and Low-Resource Language Information Processing (2023)
Open Access | Times Cited: 2