OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Detection of anomaly in surveillance videos using quantum convolutional neural networks
Javeria Amin, Muhammad Almas Anjum, Kainat Ibrar, et al.
Image and Vision Computing (2023) Vol. 135, pp. 104710-104710
Closed Access | Times Cited: 31

Showing 1-25 of 31 citing articles:

Novel Deep Feature Fusion Framework for Multi-Scenario Violence Detection
Sabah Abdulazeez Jebur, Khalid Ali Hussein, Haider K. Hoomod, et al.
Computers (2023) Vol. 12, Iss. 9, pp. 175-175
Open Access | Times Cited: 27

DAST-Net: Dense visual attention augmented spatio-temporal network for unsupervised video anomaly detection
Rangachary Kommanduri, Mrinmoy Ghorai
Neurocomputing (2024) Vol. 579, pp. 127444-127444
Closed Access | Times Cited: 9

Multi-scale feature fusion quantum depthwise Convolutional Neural Networks for text classification
Yixiong Chen, Weichuan Fang
Engineering Analysis with Boundary Elements (2025) Vol. 174, pp. 106158-106158
Open Access | Times Cited: 1

Research trends in deep learning and machine learning for cloud computing security
Yehia Ibrahim Alzoubi, Alok Mishra, Ahmet E. Topcu
Artificial Intelligence Review (2024) Vol. 57, Iss. 5
Closed Access | Times Cited: 5

DReLNet: abnormal human activity classification in theft surveillance video using reinforcement learning based fusion
Shubhangi Kale, Shriram Raghunathan
Signal Image and Video Processing (2025) Vol. 19, Iss. 3
Closed Access

A survey on quantum deep learning
Huaiguang Wu, Jiahui Zhang, Lijie Wang, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 4
Closed Access

Optimal satellite selection using quantum convolutional autoencoder for low-cost GNSS receiver applications
Nalineekumari Arasavali, Mogadala Vinod Kumar, Sasibhushana Rao Gottapu, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access

Scientometric analysis of ICT in vehicle route optimization: Practices and perspective
Kashvi Sood, Pooja, Sandeep K. Sood
Expert Systems with Applications (2025), pp. 127531-127531
Closed Access

Fight detection with spatial and channel wise attentionā€based ConvLSTM model
Kunal Chaturvedi, Chhavi Dhiman, Dinesh Kumar Vishwakarma
Expert Systems (2023) Vol. 41, Iss. 1
Closed Access | Times Cited: 7

Anomaly detection in video surveillance: a supervised inception encoder approach
Rangachary Kommanduri, Mrinmoy Ghorai
Multimedia Tools and Applications (2024) Vol. 83, Iss. 32, pp. 78517-78534
Closed Access | Times Cited: 2

An efficient convolutional neural network for detecting the crime of stealing in videos
Nischita Waddenkery, Shridevi Soma
Entertainment Computing (2024) Vol. 51, pp. 100723-100723
Closed Access | Times Cited: 2

EASAD: efficient and accurate suspicious activity detection using deep learning model for IoT-based video surveillance
Mohd Hanief Wani, Arman Rasool Faridi
International Journal of Information Technology (2024)
Closed Access | Times Cited: 2

Shoplifting Detection Using Hybrid Neural Network CNN-BiLSMT and Development of Benchmark Dataset
Iqra Muneer, Mubbashar Saddique, Zulfiqar Habib, et al.
Applied Sciences (2023) Vol. 13, Iss. 14, pp. 8341-8341
Open Access | Times Cited: 6

Suspicious action recognition in surveillance based on handcrafted and deep learning methods: A survey of the state of the art
Shaista Khanam, Muhammad Imran Sharif, Xiaochun Cheng, et al.
Computers & Electrical Engineering (2024) Vol. 120, pp. 109811-109811
Closed Access | Times Cited: 1

Flow Accumulation Based Violence Detection Model Using Transformers
M. Hemalatha, Shrish Rajamohan, K Aravindh, et al.
(2024)
Open Access

Flow Accumulation Based Violence Detection Model Using Transformers
M. Hemalatha, Shrish Rajamohan, K Aravindh, et al.
(2024)
Open Access

Suspicious activities detection using spatialā€“temporal features based on vision transformer and recurrent neural network
Saba Hameed, Javeria Amin, Muhammad Almas Anjum, et al.
Journal of Ambient Intelligence and Humanized Computing (2024) Vol. 15, Iss. 9, pp. 3379-3391
Closed Access

A puzzle questions form training for self-supervised skeleton-based action recognition
Oumaima Moutik, Hiba Sekkat, Taha Ait Tchakoucht, et al.
Image and Vision Computing (2024) Vol. 148, pp. 105137-105137
Closed Access

Flow accumulation-based violence detection model using transformers
M. Hemalatha, R Shrish, K Aravindh, et al.
Research Square (Research Square) (2024)
Open Access

Unveiling Rare Patterns: Anomaly Detection in CCTV Footage for Safeguarding Home Premises
Mintu Movi, Abdul Jabbar P
Journal of Information assurance and security (2024) Vol. 19, Iss. 1, pp. 15-35
Closed Access

Learning weakly supervised audio-visual violence detection in hyperbolic space
Xiao Zhou, Xiaogang Peng, Hao Wen, et al.
Image and Vision Computing (2024), pp. 105286-105286
Closed Access

K-fold matching model for crowd behavioral anomaly detection from discontinuous inputs
Ye Han, Jinming Wang, Fangfang Ye
Expert Systems with Applications (2024), pp. 125504-125504
Closed Access

Page 1 - Next Page

Scroll to top