OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

LAnoBERT: System log anomaly detection based on BERT masked language model
Yukyung Lee, Jina Kim, Pilsung Kang
Applied Soft Computing (2023) Vol. 146, pp. 110689-110689
Open Access | Times Cited: 38

Showing 1-25 of 38 citing articles:

Anomaly diagnosis of connected autonomous vehicles: A survey
Yukun Fang, Haigen Min, Xia Wu, et al.
Information Fusion (2024) Vol. 105, pp. 102223-102223
Closed Access | Times Cited: 12

LogFiT: Log Anomaly Detection Using Fine-Tuned Language Models
Crispin Almodovar, Fariza Sabrina, Sarvnaz Karimi, et al.
IEEE Transactions on Network and Service Management (2024) Vol. 21, Iss. 2, pp. 1715-1723
Open Access | Times Cited: 10

Large Language Models Meet Next-Generation Networking Technologies: A Review
Ching Nam Hang, Pei-Duo Yu, Roberto Morabito, et al.
Future Internet (2024) Vol. 16, Iss. 10, pp. 365-365
Open Access | Times Cited: 5

Generalizable and Robust Log Anomaly Detection Based on Transformer
Z. Lou, Xiaolin Chai, Ce Shang, et al.
Communications in computer and information science (2025), pp. 168-177
Closed Access

SemiRALD: A semi-supervised hybrid language model for Robust Anomalous Log Detection
Yicheng Sun, Jacky Keung, Zhen Yang, et al.
Information and Software Technology (2025), pp. 107743-107743
Closed Access

CAN-BERT do it? Controller Area Network Intrusion Detection System based on BERT Language Model
Natasha Alkhatib, Maria Mushtaq, Hadi Ghauch, et al.
(2022)
Open Access | Times Cited: 19

LogCTBL: a hybrid deep learning model for log-based anomaly detection
Hong Huang, Wengang Luo, Yunfei Wang, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 2
Closed Access

MidLog: An automated log anomaly detection method based on multi-head GRU
Wanli Yuan, Shi Hui Ying, Xiaoyu Duan, et al.
Journal of Systems and Software (2025), pp. 112431-112431
Closed Access

Improvement of Multi-Parameter Anomaly Detection Method: Addition of a Relational Token Between Parameters
Hironori Uchida, Keitaro Tominaga, Hideki Itai, et al.
Cognitive Robotics (2025)
Open Access

Large language models and unsupervised feature learning: implications for log analysis
Egil Karlsen, Xiao Luo, A. Nur Zincir‐Heywood, et al.
Annals of Telecommunications (2024)
Closed Access | Times Cited: 3

Training-free retrieval-based log anomaly detection with pre-trained language model considering token-level information
Gunho No, Yukyung Lee, Hyeongwon Kang, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 133, pp. 108613-108613
Closed Access | Times Cited: 2

Interpretable Spatial–Temporal Graph Convolutional Network for System Log Anomaly Detection
Rucong Xu, Yun Li
Advanced Engineering Informatics (2024) Vol. 62, pp. 102803-102803
Closed Access | Times Cited: 2

A survey on artificial intelligence techniques for security event correlation: models, challenges, and opportunities
Diana Levshun, Igor Kotenko
Research Square (Research Square) (2022)
Closed Access | Times Cited: 10

SaRLog: Semantic-Aware Robust Log Anomaly Detection via BERT-Augmented Contrastive Learning
Lelisa Adeba Jilcha, Deuk-Hun Kim, Jin Kwak
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 13, pp. 23727-23736
Open Access | Times Cited: 1

Machine Reasoning in FCAPS: Towards Enhanced Beyond 5G Network Management
Abdelkader Mekrache, Adlen Ksentini, Christos Verikoukis
IEEE Communications Surveys & Tutorials (2024) Vol. 26, Iss. 4, pp. 2769-2797
Closed Access | Times Cited: 1

Using Transformers to Classify Arabic Dialects on Social Networks
Berhoum Adel, Mohammad Charaf Eddine Meftah, Abdelkader Laouid, et al.
(2024) Vol. 9, pp. 1-7
Closed Access | Times Cited: 1

Lightweight Multi-Task Learning Method for System Log Anomaly Detection
Tuan-Anh Pham, Jonghoon Lee
IEEE Access (2024) Vol. 12, pp. 147739-147752
Open Access | Times Cited: 1

Enhancing Log Anomaly Detection through Knowledge Graph Integration
G.-H. Chen, Tai-Ju Yang, Chien Chin Chen
(2024), pp. 204-207
Closed Access

Neural Network-Based Log Anomaly Detection Algorithm for 6G Wireless Integrated Cyber-Physical System
Junjie Shen, Ranran Tie, Zujin Li, et al.
Wireless Personal Communications (2024)
Closed Access

Leveraging Large Language Models and BERT for Log Parsing and Anomaly Detection
Yihan Zhou, Yan Chen, X. L. Rao, et al.
Mathematics (2024) Vol. 12, Iss. 17, pp. 2758-2758
Open Access

Personalised soft prompt tuning in pre-trained language models: Bridging multitask transfer learning and crowdsourcing learning
Zeshu Tian, Hongli Zhang, Yan Wang
Knowledge-Based Systems (2024), pp. 112646-112646
Closed Access

LogCSS: Log anomaly detection based on BERT-CNN with context-semantics-statistics features
Zhongliang Li, Xuezhen Tu, Hong Gao, et al.
Journal of Intelligent & Fuzzy Systems (2024) Vol. 46, Iss. 4, pp. 7659-7676
Closed Access

Page 1 - Next Page

Scroll to top