
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
AnomMAN: Detect anomalies on multi-view attributed networks
Ling-Hao Chen, He Li, Wanyuan Zhang, et al.
Information Sciences (2023) Vol. 628, pp. 1-21
Closed Access | Times Cited: 18
Ling-Hao Chen, He Li, Wanyuan Zhang, et al.
Information Sciences (2023) Vol. 628, pp. 1-21
Closed Access | Times Cited: 18
Showing 18 citing articles:
Multimodal graph learning based on 3D Haar semi-tight framelet for student engagement prediction
Ming Li, Xiaosheng Zhuang, Lu Bai, et al.
Information Fusion (2024) Vol. 105, pp. 102224-102224
Closed Access | Times Cited: 29
Ming Li, Xiaosheng Zhuang, Lu Bai, et al.
Information Fusion (2024) Vol. 105, pp. 102224-102224
Closed Access | Times Cited: 29
Detecting Anomalies in Attributed Networks Through Sparse Canonical Correlation Analysis Combined With Random Masking and Padding
Wasim Khan, Mohammad Ishrat, Ahmad Neyaz Khan, et al.
IEEE Access (2024) Vol. 12, pp. 65555-65569
Open Access | Times Cited: 11
Wasim Khan, Mohammad Ishrat, Ahmad Neyaz Khan, et al.
IEEE Access (2024) Vol. 12, pp. 65555-65569
Open Access | Times Cited: 11
Graph anomaly detection based on hybrid node representation learning
Xiang Wang, Hao Dou, Dibo Dong, et al.
Neural Networks (2025) Vol. 185, pp. 107169-107169
Closed Access | Times Cited: 1
Xiang Wang, Hao Dou, Dibo Dong, et al.
Neural Networks (2025) Vol. 185, pp. 107169-107169
Closed Access | Times Cited: 1
Refining one-class representation: A unified transformer for unsupervised time-series anomaly detection
Guoxiang Zhong, Fagui Liu, Jun Jiang, et al.
Information Sciences (2023) Vol. 656, pp. 119914-119914
Closed Access | Times Cited: 11
Guoxiang Zhong, Fagui Liu, Jun Jiang, et al.
Information Sciences (2023) Vol. 656, pp. 119914-119914
Closed Access | Times Cited: 11
Anomaly Detection in Dynamic Graphs: A Comprehensive Survey
Ocheme Anthony Ekle, William Eberle
ACM Transactions on Knowledge Discovery from Data (2024) Vol. 18, Iss. 8, pp. 1-44
Open Access | Times Cited: 4
Ocheme Anthony Ekle, William Eberle
ACM Transactions on Knowledge Discovery from Data (2024) Vol. 18, Iss. 8, pp. 1-44
Open Access | Times Cited: 4
Multi-view graph anomaly detection via subgraph anomaly augmentation
Fu Lin, Yue Zhang, Xuexiong Luo, et al.
Neurocomputing (2025), pp. 130109-130109
Closed Access
Fu Lin, Yue Zhang, Xuexiong Luo, et al.
Neurocomputing (2025), pp. 130109-130109
Closed Access
AnoEdgePred: A Novel Method for Detecting Anomalous Edges in Social Networks
Pallavi Raj
IETE Technical Review (2025), pp. 1-17
Closed Access
Pallavi Raj
IETE Technical Review (2025), pp. 1-17
Closed Access
An unsupervised deep global–local views model for anomaly detection in attributed networks
Tianyang Lei, Mengxin Ou, Chang Gong, et al.
Knowledge-Based Systems (2024) Vol. 300, pp. 112185-112185
Closed Access | Times Cited: 3
Tianyang Lei, Mengxin Ou, Chang Gong, et al.
Knowledge-Based Systems (2024) Vol. 300, pp. 112185-112185
Closed Access | Times Cited: 3
ERASE: Error-Resilient Representation Learning on Graphs for Label Noise Tolerance
Ling-Hao Chen, Yuanshuo Zhang, Taohua Huang, et al.
(2024), pp. 270-280
Open Access | Times Cited: 2
Ling-Hao Chen, Yuanshuo Zhang, Taohua Huang, et al.
(2024), pp. 270-280
Open Access | Times Cited: 2
A deep co-evolution architecture for anomaly detection in dynamic networks
Malik Khizar Hayat, Ali Daud, Ameen Banjar, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 14, pp. 40489-40508
Closed Access | Times Cited: 4
Malik Khizar Hayat, Ali Daud, Ameen Banjar, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 14, pp. 40489-40508
Closed Access | Times Cited: 4
Deep joint adversarial learning for anomaly detection on attribute networks
Haoyi Fan, Ruidong Wang, Xunhua Huang, et al.
Information Sciences (2023) Vol. 654, pp. 119840-119840
Closed Access | Times Cited: 4
Haoyi Fan, Ruidong Wang, Xunhua Huang, et al.
Information Sciences (2023) Vol. 654, pp. 119840-119840
Closed Access | Times Cited: 4
Dynamic heterogeneous graph contrastive networks for knowledge tracing
Yehong Han, Hailiang Tang, Wenxiao Zhang, et al.
Applied Soft Computing (2024) Vol. 166, pp. 112194-112194
Closed Access | Times Cited: 1
Yehong Han, Hailiang Tang, Wenxiao Zhang, et al.
Applied Soft Computing (2024) Vol. 166, pp. 112194-112194
Closed Access | Times Cited: 1
Refining One-Class Representation: A Unified Transformer for Unsupervised Time-Series Anomaly Detection
Guoxiang Zhong, Fagui Liu, Jun Jiang, et al.
(2023)
Closed Access | Times Cited: 1
Guoxiang Zhong, Fagui Liu, Jun Jiang, et al.
(2023)
Closed Access | Times Cited: 1
Detection of misbehaving individuals in social networks using overlapping communities and machine learning
Wejdan Alshlahy, Delel Rhouma
Journal of King Saud University - Computer and Information Sciences (2024) Vol. 36, Iss. 6, pp. 102110-102110
Open Access
Wejdan Alshlahy, Delel Rhouma
Journal of King Saud University - Computer and Information Sciences (2024) Vol. 36, Iss. 6, pp. 102110-102110
Open Access
A Joint Training and Confidence Calibration Procedure That is Robust to Label Noise
Coby Penso, Jacob Goldberger
(2024), pp. 1-5
Closed Access
Coby Penso, Jacob Goldberger
(2024), pp. 1-5
Closed Access
Weighted Contrastive Prototype Network for Few-Shot Hyperspectral Image Classification with Noisy Labels
Dan Zhang, Yiyuan Ren, Chun Liu, et al.
Remote Sensing (2024) Vol. 16, Iss. 18, pp. 3527-3527
Open Access
Dan Zhang, Yiyuan Ren, Chun Liu, et al.
Remote Sensing (2024) Vol. 16, Iss. 18, pp. 3527-3527
Open Access
ACLM: Adaptive Compensatory Label Mining for Facial Expression Recognition
Chengguang Liu, Shanmin Wang, Hui Shuai, et al.
Lecture notes in computer science (2023), pp. 33-46
Closed Access
Chengguang Liu, Shanmin Wang, Hui Shuai, et al.
Lecture notes in computer science (2023), pp. 33-46
Closed Access
HiSec: Towards Cyber Threat Correlation and Discovery Based on Hierarchical Graph Neural Networks
Liwen Xu, Xiang Lin, Jianhua Li, et al.
(2023), pp. 369-378
Closed Access
Liwen Xu, Xiang Lin, Jianhua Li, et al.
(2023), pp. 369-378
Closed Access