
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Discrete log anomaly detection: A novel time-aware graph-based link prediction approach
Lejing Yan, Chao Luo, Rui Shao
Information Sciences (2023) Vol. 647, pp. 119576-119576
Closed Access | Times Cited: 17
Lejing Yan, Chao Luo, Rui Shao
Information Sciences (2023) Vol. 647, pp. 119576-119576
Closed Access | Times Cited: 17
Showing 17 citing articles:
LogGT: Cross-system log anomaly detection via heterogeneous graph feature and transfer learning
Peipeng Wang, Xiuguo Zhang, Zhiying Cao, et al.
Expert Systems with Applications (2024) Vol. 251, pp. 124082-124082
Closed Access | Times Cited: 5
Peipeng Wang, Xiuguo Zhang, Zhiying Cao, et al.
Expert Systems with Applications (2024) Vol. 251, pp. 124082-124082
Closed Access | Times Cited: 5
Anomaly detection in virtual machine logs against irrelevant attribute interference
Hao Zhang, Yun Zhou, Huahu Xu, et al.
PLoS ONE (2025) Vol. 20, Iss. 1, pp. e0315897-e0315897
Open Access
Hao Zhang, Yun Zhou, Huahu Xu, et al.
PLoS ONE (2025) Vol. 20, Iss. 1, pp. e0315897-e0315897
Open Access
A comprehensive survey on GNN-based anomaly detection: taxonomy, methods, and the role of large language models
Ziqi Yuan, Qingyun Sun, Haoyi Zhou, et al.
International Journal of Machine Learning and Cybernetics (2025)
Closed Access
Ziqi Yuan, Qingyun Sun, Haoyi Zhou, et al.
International Journal of Machine Learning and Cybernetics (2025)
Closed Access
Harnessing Logic Heterograph Learning for Financial Operational Risks: A Perspective of Cluster and Thin-tailed Distributions
Guanyuan Yu, Boyu Han, Qing Li, et al.
Information Sciences (2025), pp. 121939-121939
Closed Access
Guanyuan Yu, Boyu Han, Qing Li, et al.
Information Sciences (2025), pp. 121939-121939
Closed Access
Edge propagation for link prediction in requirement-cyber threat intelligence knowledge graph
Yang Zhang, Jiarui Chen, Zhe Cheng, et al.
Information Sciences (2023) Vol. 653, pp. 119770-119770
Closed Access | Times Cited: 11
Yang Zhang, Jiarui Chen, Zhe Cheng, et al.
Information Sciences (2023) Vol. 653, pp. 119770-119770
Closed Access | Times Cited: 11
Intelligent fatigue damage tracking and prognostics of composite structures utilizing raw images via interpretable deep learning
Panagiotis Komninos, A.E.C. Verraest, Nick Eleftheroglou, et al.
Composites Part B Engineering (2024), pp. 111863-111863
Open Access | Times Cited: 3
Panagiotis Komninos, A.E.C. Verraest, Nick Eleftheroglou, et al.
Composites Part B Engineering (2024), pp. 111863-111863
Open Access | Times Cited: 3
Refining one-class representation: A unified transformer for unsupervised time-series anomaly detection
Guoxiang Zhong, Fagui Liu, Jun Jiang, et al.
Information Sciences (2023) Vol. 656, pp. 119914-119914
Closed Access | Times Cited: 8
Guoxiang Zhong, Fagui Liu, Jun Jiang, et al.
Information Sciences (2023) Vol. 656, pp. 119914-119914
Closed Access | Times Cited: 8
Rectifying inaccurate unsupervised learning for robust time series anomaly detection
Zejian Chen, Zuoyong Li, Xinwei Chen, et al.
Information Sciences (2024) Vol. 662, pp. 120222-120222
Closed Access | Times Cited: 2
Zejian Chen, Zuoyong Li, Xinwei Chen, et al.
Information Sciences (2024) Vol. 662, pp. 120222-120222
Closed Access | Times Cited: 2
SaRLog: Semantic-Aware Robust Log Anomaly Detection via BERT-Augmented Contrastive Learning
Lelisa Adeba Jilcha, Deuk-Hun Kim, Jin Kwak
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 13, pp. 23727-23736
Open Access | Times Cited: 1
Lelisa Adeba Jilcha, Deuk-Hun Kim, Jin Kwak
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 13, pp. 23727-23736
Open Access | Times Cited: 1
MADMM: microservice system anomaly detection via multi-modal data and multi-feature extraction
Peipeng Wang, Xiuguo Zhang, Zhiying Cao, et al.
Neural Computing and Applications (2024) Vol. 36, Iss. 25, pp. 15739-15757
Closed Access | Times Cited: 1
Peipeng Wang, Xiuguo Zhang, Zhiying Cao, et al.
Neural Computing and Applications (2024) Vol. 36, Iss. 25, pp. 15739-15757
Closed Access | Times Cited: 1
TP-GNN: Continuous Dynamic Graph Neural Network for Graph Classification
Jie Liu, Jiamou Liu, Kaiqi Zhao, et al.
2022 IEEE 38th International Conference on Data Engineering (ICDE) (2024), pp. 2848-2861
Closed Access | Times Cited: 1
Jie Liu, Jiamou Liu, Kaiqi Zhao, et al.
2022 IEEE 38th International Conference on Data Engineering (ICDE) (2024), pp. 2848-2861
Closed Access | Times Cited: 1
A novel privacy-preserving graph convolutional network via secure matrix multiplication
Haifeng Zhang, Feng Zhang, Huan Wang, et al.
Information Sciences (2023) Vol. 657, pp. 119897-119897
Closed Access | Times Cited: 4
Haifeng Zhang, Feng Zhang, Huan Wang, et al.
Information Sciences (2023) Vol. 657, pp. 119897-119897
Closed Access | Times Cited: 4
Landscape and Taxonomy of Online Parser-Supported Log Anomaly Detection Methods
Scott Lupton, Hironori Washizaki, Nobukazu Yoshioka, et al.
IEEE Access (2024) Vol. 12, pp. 78193-78218
Open Access
Scott Lupton, Hironori Washizaki, Nobukazu Yoshioka, et al.
IEEE Access (2024) Vol. 12, pp. 78193-78218
Open Access
A Review of Research on Social Network Event Detection Methods
Tianqi Chen
International Journal of Computer Science and Information Technology (2024) Vol. 3, Iss. 1, pp. 82-92
Open Access
Tianqi Chen
International Journal of Computer Science and Information Technology (2024) Vol. 3, Iss. 1, pp. 82-92
Open Access
Unsupervised microservice system anomaly detection via contrastive multi-modal representation clustering
Peipeng Wang, Xiuguo Zhang, Yutian Chen, et al.
Information Processing & Management (2024) Vol. 62, Iss. 3, pp. 104013-104013
Closed Access
Peipeng Wang, Xiuguo Zhang, Yutian Chen, et al.
Information Processing & Management (2024) Vol. 62, Iss. 3, pp. 104013-104013
Closed Access
Substructure-Aware Log Anomaly Detection
Yanni Tang, Zhuoxing Zhang, Kaiqi Zhao, et al.
Proceedings of the VLDB Endowment (2024) Vol. 18, Iss. 2, pp. 213-225
Closed Access
Yanni Tang, Zhuoxing Zhang, Kaiqi Zhao, et al.
Proceedings of the VLDB Endowment (2024) Vol. 18, Iss. 2, pp. 213-225
Closed Access
HEDGE: Heterogeneous Semantic Dynamic Graph Framework for Log Anomaly Detection in Digital Service Network
Bangping Qian, Mengying Zhu, Mengyuan Yang, et al.
(2024) Vol. 33, pp. 208-216
Closed Access
Bangping Qian, Mengying Zhu, Mengyuan Yang, et al.
(2024) Vol. 33, pp. 208-216
Closed Access