
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Detection of anomaly in surveillance videos using quantum convolutional neural networks
Javeria Amin, Muhammad Almas Anjum, Kainat Ibrar, et al.
Image and Vision Computing (2023) Vol. 135, pp. 104710-104710
Closed Access | Times Cited: 31
Javeria Amin, Muhammad Almas Anjum, Kainat Ibrar, et al.
Image and Vision Computing (2023) Vol. 135, pp. 104710-104710
Closed Access | Times Cited: 31
Showing 1-25 of 31 citing articles:
Novel Deep Feature Fusion Framework for Multi-Scenario Violence Detection
Sabah Abdulazeez Jebur, Khalid Ali Hussein, Haider K. Hoomod, et al.
Computers (2023) Vol. 12, Iss. 9, pp. 175-175
Open Access | Times Cited: 27
Sabah Abdulazeez Jebur, Khalid Ali Hussein, Haider K. Hoomod, et al.
Computers (2023) Vol. 12, Iss. 9, pp. 175-175
Open Access | Times Cited: 27
DAST-Net: Dense visual attention augmented spatio-temporal network for unsupervised video anomaly detection
Rangachary Kommanduri, Mrinmoy Ghorai
Neurocomputing (2024) Vol. 579, pp. 127444-127444
Closed Access | Times Cited: 9
Rangachary Kommanduri, Mrinmoy Ghorai
Neurocomputing (2024) Vol. 579, pp. 127444-127444
Closed Access | Times Cited: 9
Multi-scale feature fusion quantum depthwise Convolutional Neural Networks for text classification
Yixiong Chen, Weichuan Fang
Engineering Analysis with Boundary Elements (2025) Vol. 174, pp. 106158-106158
Open Access | Times Cited: 1
Yixiong Chen, Weichuan Fang
Engineering Analysis with Boundary Elements (2025) Vol. 174, pp. 106158-106158
Open Access | Times Cited: 1
Research trends in deep learning and machine learning for cloud computing security
Yehia Ibrahim Alzoubi, Alok Mishra, Ahmet E. Topcu
Artificial Intelligence Review (2024) Vol. 57, Iss. 5
Closed Access | Times Cited: 5
Yehia Ibrahim Alzoubi, Alok Mishra, Ahmet E. Topcu
Artificial Intelligence Review (2024) Vol. 57, Iss. 5
Closed Access | Times Cited: 5
DReLNet: abnormal human activity classification in theft surveillance video using reinforcement learning based fusion
Shubhangi Kale, Shriram Raghunathan
Signal Image and Video Processing (2025) Vol. 19, Iss. 3
Closed Access
Shubhangi Kale, Shriram Raghunathan
Signal Image and Video Processing (2025) Vol. 19, Iss. 3
Closed Access
A comprehensive ATM security framework for detecting abnormal human activity via granger causality-inspired graph neural network optimized with eagle-strategy supply-demand optimization
Aniruddha Prakash Kshirsagar, H. Azath
Expert Systems with Applications (2025) Vol. 272, pp. 126731-126731
Closed Access
Aniruddha Prakash Kshirsagar, H. Azath
Expert Systems with Applications (2025) Vol. 272, pp. 126731-126731
Closed Access
A survey on quantum deep learning
Huaiguang Wu, Jiahui Zhang, Lijie Wang, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 4
Closed Access
Huaiguang Wu, Jiahui Zhang, Lijie Wang, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 4
Closed Access
Optimal satellite selection using quantum convolutional autoencoder for low-cost GNSS receiver applications
Nalineekumari Arasavali, Mogadala Vinod Kumar, Sasibhushana Rao Gottapu, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Nalineekumari Arasavali, Mogadala Vinod Kumar, Sasibhushana Rao Gottapu, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Scientometric analysis of ICT in vehicle route optimization: Practices and perspective
Kashvi Sood, Pooja, Sandeep K. Sood
Expert Systems with Applications (2025), pp. 127531-127531
Closed Access
Kashvi Sood, Pooja, Sandeep K. Sood
Expert Systems with Applications (2025), pp. 127531-127531
Closed Access
Fight detection with spatial and channel wise attentionābased ConvLSTM model
Kunal Chaturvedi, Chhavi Dhiman, Dinesh Kumar Vishwakarma
Expert Systems (2023) Vol. 41, Iss. 1
Closed Access | Times Cited: 7
Kunal Chaturvedi, Chhavi Dhiman, Dinesh Kumar Vishwakarma
Expert Systems (2023) Vol. 41, Iss. 1
Closed Access | Times Cited: 7
Anomaly detection in video surveillance: a supervised inception encoder approach
Rangachary Kommanduri, Mrinmoy Ghorai
Multimedia Tools and Applications (2024) Vol. 83, Iss. 32, pp. 78517-78534
Closed Access | Times Cited: 2
Rangachary Kommanduri, Mrinmoy Ghorai
Multimedia Tools and Applications (2024) Vol. 83, Iss. 32, pp. 78517-78534
Closed Access | Times Cited: 2
An efficient convolutional neural network for detecting the crime of stealing in videos
Nischita Waddenkery, Shridevi Soma
Entertainment Computing (2024) Vol. 51, pp. 100723-100723
Closed Access | Times Cited: 2
Nischita Waddenkery, Shridevi Soma
Entertainment Computing (2024) Vol. 51, pp. 100723-100723
Closed Access | Times Cited: 2
EASAD: efficient and accurate suspicious activity detection using deep learning model for IoT-based video surveillance
Mohd Hanief Wani, Arman Rasool Faridi
International Journal of Information Technology (2024)
Closed Access | Times Cited: 2
Mohd Hanief Wani, Arman Rasool Faridi
International Journal of Information Technology (2024)
Closed Access | Times Cited: 2
Shoplifting Detection Using Hybrid Neural Network CNN-BiLSMT and Development of Benchmark Dataset
Iqra Muneer, Mubbashar Saddique, Zulfiqar Habib, et al.
Applied Sciences (2023) Vol. 13, Iss. 14, pp. 8341-8341
Open Access | Times Cited: 6
Iqra Muneer, Mubbashar Saddique, Zulfiqar Habib, et al.
Applied Sciences (2023) Vol. 13, Iss. 14, pp. 8341-8341
Open Access | Times Cited: 6
Suspicious action recognition in surveillance based on handcrafted and deep learning methods: A survey of the state of the art
Shaista Khanam, Muhammad Imran Sharif, Xiaochun Cheng, et al.
Computers & Electrical Engineering (2024) Vol. 120, pp. 109811-109811
Closed Access | Times Cited: 1
Shaista Khanam, Muhammad Imran Sharif, Xiaochun Cheng, et al.
Computers & Electrical Engineering (2024) Vol. 120, pp. 109811-109811
Closed Access | Times Cited: 1
Armed Boundary Sabotage: A Case Study of Human Malicious Behaviors Identification with Computer Vision and Explainable Reasoning Methods
Zhan Li, Xingyu Song, Shi Chen, et al.
(2024)
Closed Access
Zhan Li, Xingyu Song, Shi Chen, et al.
(2024)
Closed Access
Flow Accumulation Based Violence Detection Model Using Transformers
M. Hemalatha, Shrish Rajamohan, K Aravindh, et al.
(2024)
Open Access
M. Hemalatha, Shrish Rajamohan, K Aravindh, et al.
(2024)
Open Access
Flow Accumulation Based Violence Detection Model Using Transformers
M. Hemalatha, Shrish Rajamohan, K Aravindh, et al.
(2024)
Open Access
M. Hemalatha, Shrish Rajamohan, K Aravindh, et al.
(2024)
Open Access
Suspicious activities detection using spatialātemporal features based on vision transformer and recurrent neural network
Saba Hameed, Javeria Amin, Muhammad Almas Anjum, et al.
Journal of Ambient Intelligence and Humanized Computing (2024) Vol. 15, Iss. 9, pp. 3379-3391
Closed Access
Saba Hameed, Javeria Amin, Muhammad Almas Anjum, et al.
Journal of Ambient Intelligence and Humanized Computing (2024) Vol. 15, Iss. 9, pp. 3379-3391
Closed Access
A puzzle questions form training for self-supervised skeleton-based action recognition
Oumaima Moutik, Hiba Sekkat, Taha Ait Tchakoucht, et al.
Image and Vision Computing (2024) Vol. 148, pp. 105137-105137
Closed Access
Oumaima Moutik, Hiba Sekkat, Taha Ait Tchakoucht, et al.
Image and Vision Computing (2024) Vol. 148, pp. 105137-105137
Closed Access
Flow accumulation-based violence detection model using transformers
M. Hemalatha, R Shrish, K Aravindh, et al.
Research Square (Research Square) (2024)
Open Access
M. Hemalatha, R Shrish, K Aravindh, et al.
Research Square (Research Square) (2024)
Open Access
Unveiling Rare Patterns: Anomaly Detection in CCTV Footage for Safeguarding Home Premises
Mintu Movi, Abdul Jabbar P
Journal of Information assurance and security (2024) Vol. 19, Iss. 1, pp. 15-35
Closed Access
Mintu Movi, Abdul Jabbar P
Journal of Information assurance and security (2024) Vol. 19, Iss. 1, pp. 15-35
Closed Access
Learning weakly supervised audio-visual violence detection in hyperbolic space
Xiao Zhou, Xiaogang Peng, Hao Wen, et al.
Image and Vision Computing (2024), pp. 105286-105286
Closed Access
Xiao Zhou, Xiaogang Peng, Hao Wen, et al.
Image and Vision Computing (2024), pp. 105286-105286
Closed Access
K-fold matching model for crowd behavioral anomaly detection from discontinuous inputs
Ye Han, Jinming Wang, Fangfang Ye
Expert Systems with Applications (2024), pp. 125504-125504
Closed Access
Ye Han, Jinming Wang, Fangfang Ye
Expert Systems with Applications (2024), pp. 125504-125504
Closed Access
Mosaicking based optimal threshold image enhancement for violence detection with deep quadratic attention mechanism
V. Elakiya, P. Aruna, N. Puviarasan
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access
V. Elakiya, P. Aruna, N. Puviarasan
Journal Of Big Data (2024) Vol. 11, Iss. 1
Open Access