OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

AUC-oriented Graph Neural Network for Fraud Detection
Mengda Huang, Yang Liu, Xiang Ao, et al.
Proceedings of the ACM Web Conference 2022 (2022), pp. 1311-1321
Open Access | Times Cited: 50

Showing 26-50 of 50 citing articles:

Enabling Graph Neural Networks for Semi-Supervised Risk Prediction in Online Credit Loan Services
Hao Tang, Cheng Wang, Jianguo Zheng, et al.
ACM Transactions on Intelligent Systems and Technology (2023) Vol. 15, Iss. 1, pp. 1-24
Open Access | Times Cited: 3

Neighborhood Homophily-based Graph Convolutional Network
Shengbo Gong, Jiajun Zhou, Chenxuan Xie, et al.
(2023), pp. 3908-3912
Open Access | Times Cited: 3

Knowledge-inspired Subdomain Adaptation for Cross-Domain Knowledge Transfer
Liyue Chen, Linian Wang, Jinyu Xu, et al.
(2023), pp. 234-244
Open Access | Times Cited: 3

Improving fraud detection via imbalanced graph structure learning
Lingfei Ren, Ruimin Hu, Yang Liu, et al.
Machine Learning (2023) Vol. 113, Iss. 3, pp. 1069-1090
Closed Access | Times Cited: 3

Removing Camouflage and Revealing Collusion: Leveraging Gang-crime Pattern in Fraudster Detection
Lewen Wang, Haozhe Zhao, Cunguang Feng, et al.
Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (2023)
Closed Access | Times Cited: 2

Collaborative Metapath Enhanced Corporate Default Risk Assessment on Heterogeneous Graph
Zheng Zhang, Y. Ji, Jiachen Shen, et al.
Proceedings of the ACM Web Conference 2022 (2024), pp. 446-456
Closed Access

Anomaly Detection Service for Blockchain Transactions Using Minimal Substitution-Based Label Propagation
Ranran Wang, Yin Zhang⋆, Limei Peng
IEEE Transactions on Services Computing (2024) Vol. 17, Iss. 5, pp. 2054-2066
Closed Access

Robust AUC optimization under the supervision of clean data
Chenkang Zhang, Haobing Tian, Lang Zhang, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access

Do not ignore heterogeneity and heterophily: Multi-network collaborative telecom fraud detection
Lingfei Ren, Yilong Zang, Ruimin Hu, et al.
Expert Systems with Applications (2024) Vol. 257, pp. 124974-124974
Closed Access

Online Learning and Detecting Corrupted Users for Conversational Recommendation Systems
Xiangxiang Dai, Zhiyong Wang, Jize Xie, et al.
IEEE Transactions on Knowledge and Data Engineering (2024) Vol. 36, Iss. 12, pp. 8939-8953
Open Access

VecAug: Unveiling Camouflaged Frauds with Cohort Augmentation for Enhanced Detection
Fei Xiao, Shaofeng Cai, Gang Chen, et al.
Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (2024), pp. 6025-6036
Open Access

HopLearn: Leveraging Multi-Hop Neighbors and Learnable Parameters for GNNs with Missing Node Features
Kyusik Kim, Bongwon Suh
Lecture notes in computer science (2024), pp. 440-450
Closed Access

Semi-supervised anomaly detection with contamination-resilience and incremental training
Liheng Yuan, Fanghua Ye, Heng Li, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 138, pp. 109311-109311
Closed Access

LEX-GNN: Label-Exploring Graph Neural Network for Accurate Fraud Detection
Woochang Hyun, I.W.C. Lee, Bongwon Suh
(2024), pp. 3802-3806
Closed Access

Graph Local Homophily Network for Anomaly Detection
Ronghui Guo, Minghui Zou, Sai Zhang, et al.
(2024), pp. 706-716
Open Access

Multiplex graph fusion network with reinforcement structure learning for fraud detection in online e-commerce platforms
Zheng Zhang, Xiang Ao, Claudio J. Tessone, et al.
Expert Systems with Applications (2024), pp. 125598-125598
Closed Access

FFDM − GNN:A Financial Fraud Detection Model using Graph Neural Network
Abhishek Kesharwani, Prashant Kumar Shukla
(2024), pp. 1-6
Closed Access

Rethinking the Trigger-injecting Position in Graph Backdoor Attack
Jing Xu, Gorka Abad, Stjepan Picek
2022 International Joint Conference on Neural Networks (IJCNN) (2023), pp. 1-8
Open Access | Times Cited: 1

Revisiting AUC-Oriented Adversarial Training With Loss-Agnostic Perturbations
Zhiyong Yang, Qianqian Xu, Wenzheng Hou, et al.
IEEE Transactions on Pattern Analysis and Machine Intelligence (2023) Vol. 45, Iss. 12, pp. 15494-15511
Closed Access | Times Cited: 1

Detecting Inactive Cyberwarriors from Online Forums
Ruei-Yuan Wang, Hung‐Hsuan Chen
(2023), pp. 9-15
Open Access | Times Cited: 1

Dynamic Relation-Attentive Graph Neural Networks for Fraud Detection
Heehyeon Kim, Jinhyeok Choi, Joyce Jiyoung Whang
2022 IEEE International Conference on Data Mining Workshops (ICDMW) (2023)
Open Access | Times Cited: 1

Meta-MSGAT: Meta Multi-scale Fused Graph Attention Network
Ting Chen, Jianming Wang, Yukuan Sun
2022 International Joint Conference on Neural Networks (IJCNN) (2023), pp. 1-8
Closed Access

Boosting the Performance of Deployable Timestamped Directed GNNs via Time-Relaxed Sampling
Arihant Jain, Gundeep Arora, Anoop Saladi
Lecture notes in computer science (2023), pp. 190-206
Closed Access

Generative Graph Augmentation for Minority Class in Fraud Detection
Meng Lin, Hesham Mostafa, Marcel Nassar, et al.
(2023), pp. 4200-4204
Closed Access

Location-Adaptive Generative Graph Augmentation for Fraud Detection
Lin Meng, Xiaonan Zhang, Jiawei Zhang, et al.
(2023), pp. 24-30
Closed Access

Previous Page - Page 2

Scroll to top