
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
IM-IAD: Industrial Image Anomaly Detection Benchmark in Manufacturing
Guoyang Xie, Jinbao Wang, Jiaqi Liu, et al.
IEEE Transactions on Cybernetics (2024) Vol. 54, Iss. 5, pp. 2720-2733
Open Access | Times Cited: 30
Guoyang Xie, Jinbao Wang, Jiaqi Liu, et al.
IEEE Transactions on Cybernetics (2024) Vol. 54, Iss. 5, pp. 2720-2733
Open Access | Times Cited: 30
Showing 1-25 of 30 citing articles:
Cybersecurity Solutions for Industrial Internet of Things–Edge Computing Integration: Challenges, Threats, and Future Directions
Tamara Zhukabayeva, Lazzat Zholshiyeva, Nurdaulet Karabayev, et al.
Sensors (2025) Vol. 25, Iss. 1, pp. 213-213
Open Access | Times Cited: 3
Tamara Zhukabayeva, Lazzat Zholshiyeva, Nurdaulet Karabayev, et al.
Sensors (2025) Vol. 25, Iss. 1, pp. 213-213
Open Access | Times Cited: 3
SAM-LAD: Segment Anything Model meets zero-shot logic anomaly detection
Yun Peng, Xiao Lin, Nachuan Ma, et al.
Knowledge-Based Systems (2025) Vol. 314, pp. 113176-113176
Open Access | Times Cited: 1
Yun Peng, Xiao Lin, Nachuan Ma, et al.
Knowledge-Based Systems (2025) Vol. 314, pp. 113176-113176
Open Access | Times Cited: 1
Two-stage reverse knowledge distillation incorporated and Self-Supervised Masking strategy for industrial anomaly detection
Guoxiang Tong, Quanquan Li, Yan Song
Knowledge-Based Systems (2023) Vol. 273, pp. 110611-110611
Closed Access | Times Cited: 18
Guoxiang Tong, Quanquan Li, Yan Song
Knowledge-Based Systems (2023) Vol. 273, pp. 110611-110611
Closed Access | Times Cited: 18
Template-based Feature Aggregation Network for industrial anomaly detection
Wei Luo, Haiming Yao, Wenyong Yu
Engineering Applications of Artificial Intelligence (2024) Vol. 131, pp. 107810-107810
Closed Access | Times Cited: 7
Wei Luo, Haiming Yao, Wenyong Yu
Engineering Applications of Artificial Intelligence (2024) Vol. 131, pp. 107810-107810
Closed Access | Times Cited: 7
BiaS: Incorporating Biased Knowledge to Boost Unsupervised Image Anomaly Localization
Yunkang Cao, Xiaohao Xu, Chen Sun, et al.
IEEE Transactions on Systems Man and Cybernetics Systems (2024) Vol. 54, Iss. 4, pp. 2342-2353
Closed Access | Times Cited: 7
Yunkang Cao, Xiaohao Xu, Chen Sun, et al.
IEEE Transactions on Systems Man and Cybernetics Systems (2024) Vol. 54, Iss. 4, pp. 2342-2353
Closed Access | Times Cited: 7
Component-aware anomaly detection framework for adjustable and logical industrial visual inspection
Tongkun Liu, Bing Li, Du Xiao, et al.
Advanced Engineering Informatics (2023) Vol. 58, pp. 102161-102161
Open Access | Times Cited: 15
Tongkun Liu, Bing Li, Du Xiao, et al.
Advanced Engineering Informatics (2023) Vol. 58, pp. 102161-102161
Open Access | Times Cited: 15
PKU-GoodsAD: A Supermarket Goods Dataset for Unsupervised Anomaly Detection and Segmentation
Jian Zhang, Runwei Ding, Miaoju Ban, et al.
IEEE Robotics and Automation Letters (2024) Vol. 9, Iss. 3, pp. 2008-2015
Open Access | Times Cited: 4
Jian Zhang, Runwei Ding, Miaoju Ban, et al.
IEEE Robotics and Automation Letters (2024) Vol. 9, Iss. 3, pp. 2008-2015
Open Access | Times Cited: 4
Paying more attention on backgrounds: Background-centric attention for UAV detection
Xiuxiu Lin, Yafeng Niu, Xinran Yu, et al.
Neural Networks (2025) Vol. 185, pp. 107182-107182
Closed Access
Xiuxiu Lin, Yafeng Niu, Xinran Yu, et al.
Neural Networks (2025) Vol. 185, pp. 107182-107182
Closed Access
Continual Learning for Behavior-based Driver Identification
Mattia Fanan, Davide Dalle Pezze, Emad Efatinasab, et al.
Engineering Applications of Artificial Intelligence (2025) Vol. 150, pp. 110459-110459
Closed Access
Mattia Fanan, Davide Dalle Pezze, Emad Efatinasab, et al.
Engineering Applications of Artificial Intelligence (2025) Vol. 150, pp. 110459-110459
Closed Access
A simple and reliable semi-supervised anomaly detection network for detecting crack in stamped parts
Xingjun Dong, Changsheng Zhang, Shuaitong Liu, et al.
Computers in Industry (2025) Vol. 169, pp. 104301-104301
Closed Access
Xingjun Dong, Changsheng Zhang, Shuaitong Liu, et al.
Computers in Industry (2025) Vol. 169, pp. 104301-104301
Closed Access
A Low-Complexity and High-Accuracy Defect Detection Network
Xunkuai Zhou, Xi Chen, Jie Chen, et al.
Journal of Systems Science and Complexity (2025) Vol. 38, Iss. 2, pp. 573-596
Closed Access
Xunkuai Zhou, Xi Chen, Jie Chen, et al.
Journal of Systems Science and Complexity (2025) Vol. 38, Iss. 2, pp. 573-596
Closed Access
Learning Global-Local Correspondence With Semantic Bottleneck for Logical Anomaly Detection
Haiming Yao, Wenyong Yu, Wei Luo, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2023) Vol. 34, Iss. 5, pp. 3589-3605
Open Access | Times Cited: 9
Haiming Yao, Wenyong Yu, Wei Luo, et al.
IEEE Transactions on Circuits and Systems for Video Technology (2023) Vol. 34, Iss. 5, pp. 3589-3605
Open Access | Times Cited: 9
Industrial defective chips detection using deep convolutional neural network with inverse feature matching mechanism
Waseem Ullah, Samee U. Khan, Min Je Kim, et al.
Journal of Computational Design and Engineering (2024) Vol. 11, Iss. 3, pp. 326-336
Open Access | Times Cited: 3
Waseem Ullah, Samee U. Khan, Min Je Kim, et al.
Journal of Computational Design and Engineering (2024) Vol. 11, Iss. 3, pp. 326-336
Open Access | Times Cited: 3
Semantic Coarse-to-Fine Granularity Learning for Two-Stage Few-Shot Anomaly Detection
Lei Zhang, Chengzhi Lyu, Ziheng Chen, et al.
International Journal on Semantic Web and Information Systems (2024) Vol. 20, Iss. 1, pp. 1-22
Open Access | Times Cited: 1
Lei Zhang, Chengzhi Lyu, Ziheng Chen, et al.
International Journal on Semantic Web and Information Systems (2024) Vol. 20, Iss. 1, pp. 1-22
Open Access | Times Cited: 1
Efficient visual anomaly detection model with adaptive wavelet transform
Du Xiao, Bing Li, Tongkun Liu, et al.
Optics and Lasers in Engineering (2024) Vol. 182, pp. 108457-108457
Closed Access | Times Cited: 1
Du Xiao, Bing Li, Tongkun Liu, et al.
Optics and Lasers in Engineering (2024) Vol. 182, pp. 108457-108457
Closed Access | Times Cited: 1
Adjacent Image Augmentation and Its Framework for Self-Supervised Learning in Anomaly Detection
Gi Seung Kwon, Yong Suk Choi
Sensors (2024) Vol. 24, Iss. 17, pp. 5616-5616
Open Access | Times Cited: 1
Gi Seung Kwon, Yong Suk Choi
Sensors (2024) Vol. 24, Iss. 17, pp. 5616-5616
Open Access | Times Cited: 1
Context-aware feature reconstruction for class-incremental anomaly detection and localization
Jingxuan Pang, Chunguang Li
Neural Networks (2024) Vol. 181, pp. 106788-106788
Closed Access | Times Cited: 1
Jingxuan Pang, Chunguang Li
Neural Networks (2024) Vol. 181, pp. 106788-106788
Closed Access | Times Cited: 1
Towards High-resolution 3D Anomaly Detection via Group-Level Feature Contrastive Learning
Hongze Zhu, Guoyang Xie, Chengbin Hou, et al.
(2024), pp. 4680-4689
Open Access | Times Cited: 1
Hongze Zhu, Guoyang Xie, Chengbin Hou, et al.
(2024), pp. 4680-4689
Open Access | Times Cited: 1
Active Learning in Feature Extraction for Glass-in-Glass Detection
Jerzy Rapcewicz, Marcin Malesa
Electronics (2024) Vol. 13, Iss. 11, pp. 2049-2049
Open Access
Jerzy Rapcewicz, Marcin Malesa
Electronics (2024) Vol. 13, Iss. 11, pp. 2049-2049
Open Access
Multilevel saliency-guided self-supervised learning for image anomaly detection
Jianjian Qin, Chunzhi Gu, Jun Yu, et al.
Signal Image and Video Processing (2024) Vol. 18, Iss. 8-9, pp. 6339-6351
Closed Access
Jianjian Qin, Chunzhi Gu, Jun Yu, et al.
Signal Image and Video Processing (2024) Vol. 18, Iss. 8-9, pp. 6339-6351
Closed Access
An Anomaly Detection Approach to Determine Optimal Cutting Time in Cheese Formation
Andrea Loddo, Davide Ghiani, Alessandra Perniciano, et al.
Information (2024) Vol. 15, Iss. 6, pp. 360-360
Open Access
Andrea Loddo, Davide Ghiani, Alessandra Perniciano, et al.
Information (2024) Vol. 15, Iss. 6, pp. 360-360
Open Access
Scale Adaptive Attention Network for Accurate Defect Detection From Metal Parts
Zijiao Sun, Xiaohong Wang, Fang Luo, et al.
IEEE Access (2024) Vol. 12, pp. 131035-131043
Open Access
Zijiao Sun, Xiaohong Wang, Fang Luo, et al.
IEEE Access (2024) Vol. 12, pp. 131035-131043
Open Access
OV-AS: Zero-Shot/Few-Shot Open-Vocabulary Anomaly Segmentation Based on CLIP
Jingtong Mo, Yuzhuo Fu, Ting Liu
2022 4th International Conference on Communications, Information System and Computer Engineering (CISCE) (2024) Vol. 34, pp. 890-894
Closed Access
Jingtong Mo, Yuzhuo Fu, Ting Liu
2022 4th International Conference on Communications, Information System and Computer Engineering (CISCE) (2024) Vol. 34, pp. 890-894
Closed Access
Fractals as Pre-Training Datasets for Anomaly Detection and Localization
Cynthia Ifeyinwa Ugwu, E. Caruso, Oswald Lanz
Fractal and Fractional (2024) Vol. 8, Iss. 11, pp. 661-661
Open Access
Cynthia Ifeyinwa Ugwu, E. Caruso, Oswald Lanz
Fractal and Fractional (2024) Vol. 8, Iss. 11, pp. 661-661
Open Access
Low-shot Visual Anomaly Detection with Multimodal Large Language Models
Tobias Schiele, Daria Kern, A.K.M. De Silva, et al.
Procedia Computer Science (2024) Vol. 246, pp. 2587-2596
Open Access
Tobias Schiele, Daria Kern, A.K.M. De Silva, et al.
Procedia Computer Science (2024) Vol. 246, pp. 2587-2596
Open Access