
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Spatio-temporal graph-based CNNs for anomaly detection in weakly-labeled videos
Huiyu Mu, Ruizhi Sun, Miao Wang, et al.
Information Processing & Management (2022) Vol. 59, Iss. 4, pp. 102983-102983
Closed Access | Times Cited: 26
Huiyu Mu, Ruizhi Sun, Miao Wang, et al.
Information Processing & Management (2022) Vol. 59, Iss. 4, pp. 102983-102983
Closed Access | Times Cited: 26
Showing 1-25 of 26 citing articles:
Sequential attention mechanism for weakly supervised video anomaly detection
Waseem Ullah, Fath U Min Ullah, Zulfiqar Ahmad Khan, et al.
Expert Systems with Applications (2023) Vol. 230, pp. 120599-120599
Closed Access | Times Cited: 33
Waseem Ullah, Fath U Min Ullah, Zulfiqar Ahmad Khan, et al.
Expert Systems with Applications (2023) Vol. 230, pp. 120599-120599
Closed Access | Times Cited: 33
Detection of anomaly in surveillance videos using quantum convolutional neural networks
Javeria Amin, Muhammad Almas Anjum, Kainat Ibrar, et al.
Image and Vision Computing (2023) Vol. 135, pp. 104710-104710
Closed Access | Times Cited: 31
Javeria Amin, Muhammad Almas Anjum, Kainat Ibrar, et al.
Image and Vision Computing (2023) Vol. 135, pp. 104710-104710
Closed Access | Times Cited: 31
Vision transformer attention with multi-reservoir echo state network for anomaly recognition
Waseem Ullah, Tanveer Hussain, Sung Wook Baik
Information Processing & Management (2023) Vol. 60, Iss. 3, pp. 103289-103289
Closed Access | Times Cited: 29
Waseem Ullah, Tanveer Hussain, Sung Wook Baik
Information Processing & Management (2023) Vol. 60, Iss. 3, pp. 103289-103289
Closed Access | Times Cited: 29
Video anomaly detection with NTCN-ML: A novel TCN for multi-instance learning
Wenhao Shao, Ruliang Xiao, Praboda Rajapaksha, et al.
Pattern Recognition (2023) Vol. 143, pp. 109765-109765
Open Access | Times Cited: 23
Wenhao Shao, Ruliang Xiao, Praboda Rajapaksha, et al.
Pattern Recognition (2023) Vol. 143, pp. 109765-109765
Open Access | Times Cited: 23
Semantic-driven dual consistency learning for weakly supervised video anomaly detection
Yong Su, Yuyu Tan, Simin An, et al.
Pattern Recognition (2024) Vol. 157, pp. 110898-110898
Closed Access | Times Cited: 8
Yong Su, Yuyu Tan, Simin An, et al.
Pattern Recognition (2024) Vol. 157, pp. 110898-110898
Closed Access | Times Cited: 8
Anomalies cannot materialize or vanish out of thin air: A hierarchical multiple instance learning with position-scale awareness for video anomaly detection
Yong Su, Yuyu Tan, Simin An, et al.
Expert Systems with Applications (2024) Vol. 254, pp. 124392-124392
Closed Access | Times Cited: 7
Yong Su, Yuyu Tan, Simin An, et al.
Expert Systems with Applications (2024) Vol. 254, pp. 124392-124392
Closed Access | Times Cited: 7
VPE-WSVAD: Visual prompt exemplars for weakly-supervised video anomaly detection
Yong Su, Yuyu Tan, Meng Xing, et al.
Knowledge-Based Systems (2024) Vol. 299, pp. 111978-111978
Closed Access | Times Cited: 6
Yong Su, Yuyu Tan, Meng Xing, et al.
Knowledge-Based Systems (2024) Vol. 299, pp. 111978-111978
Closed Access | Times Cited: 6
Prime: Privacy-preserving video anomaly detection via Motion Exemplar guidance
Yong Su, Haohao Zhu, Yuyu Tan, et al.
Knowledge-Based Systems (2023) Vol. 278, pp. 110872-110872
Closed Access | Times Cited: 13
Yong Su, Haohao Zhu, Yuyu Tan, et al.
Knowledge-Based Systems (2023) Vol. 278, pp. 110872-110872
Closed Access | Times Cited: 13
A comprehensive survey on GNN-based anomaly detection: taxonomy, methods, and the role of large language models
Ziqi Yuan, Qingyun Sun, Haoyi Zhou, et al.
International Journal of Machine Learning and Cybernetics (2025)
Closed Access
Ziqi Yuan, Qingyun Sun, Haoyi Zhou, et al.
International Journal of Machine Learning and Cybernetics (2025)
Closed Access
Double locality sensitive hashing Bloom filter for high-dimensional streaming anomaly detection
Zhixia Zeng, Ruliang Xiao, Xinhong Lin, et al.
Information Processing & Management (2023) Vol. 60, Iss. 3, pp. 103306-103306
Closed Access | Times Cited: 11
Zhixia Zeng, Ruliang Xiao, Xinhong Lin, et al.
Information Processing & Management (2023) Vol. 60, Iss. 3, pp. 103306-103306
Closed Access | Times Cited: 11
Anomaly detection with dual-channel heterogeneous graph based on hypersphere learning
Qing Li, Guanzhong Wu, Hang Ni, et al.
Information Sciences (2024) Vol. 681, pp. 121242-121242
Closed Access | Times Cited: 2
Qing Li, Guanzhong Wu, Hang Ni, et al.
Information Sciences (2024) Vol. 681, pp. 121242-121242
Closed Access | Times Cited: 2
Uncovering Hidden Vulnerabilities in Convolutional Neural Networks through Graph-based Adversarial Robustness Evaluation
Ke Wang, Zicong Chen, Xilin Dang, et al.
Pattern Recognition (2023) Vol. 143, pp. 109745-109745
Closed Access | Times Cited: 5
Ke Wang, Zicong Chen, Xilin Dang, et al.
Pattern Recognition (2023) Vol. 143, pp. 109745-109745
Closed Access | Times Cited: 5
Consistency-constrained unsupervised video anomaly detection framework based on Co-teaching
Wenhao Shao, Praboda Rajapaksha, Noël Crespi, et al.
Neurocomputing (2024) Vol. 610, pp. 128589-128589
Closed Access | Times Cited: 1
Wenhao Shao, Praboda Rajapaksha, Noël Crespi, et al.
Neurocomputing (2024) Vol. 610, pp. 128589-128589
Closed Access | Times Cited: 1
A lightweight video anomaly detection model with weak supervision and adaptive instance selection
Yang Wang, Jiaogen Zhou, Jihong Guan
Neurocomputing (2024), pp. 128698-128698
Closed Access | Times Cited: 1
Yang Wang, Jiaogen Zhou, Jihong Guan
Neurocomputing (2024), pp. 128698-128698
Closed Access | Times Cited: 1
Temporal-Semantic Context Fusion for Robust Weakly Supervised Video Anomaly Detection
Yuan Zeng, Yuanyuan Wu, Jing Liang, et al.
Lecture notes in computer science (2023), pp. 245-256
Closed Access | Times Cited: 2
Yuan Zeng, Yuanyuan Wu, Jing Liang, et al.
Lecture notes in computer science (2023), pp. 245-256
Closed Access | Times Cited: 2
Comparative Analysis of Deep CNN and VGG-16 for Anomaly Detection
N. Anvesh, G. Yuvaraj, A. Vijaya Lakshmi, et al.
(2024) Vol. 190, pp. 1-7
Closed Access
N. Anvesh, G. Yuvaraj, A. Vijaya Lakshmi, et al.
(2024) Vol. 190, pp. 1-7
Closed Access
A Lightweight Video Anomaly Detection Model with Weak Supervision and Adaptive Instance Selection
Yang Wang, Jiaogen Zhou, Jihong Guan
(2024)
Open Access
Yang Wang, Jiaogen Zhou, Jihong Guan
(2024)
Open Access
Structure-aware sign language recognition with spatial–temporal scene graph
Shiquan Lin, Zhengye Xiao, Li-Xin Wang, et al.
Information Processing & Management (2024) Vol. 61, Iss. 6, pp. 103850-103850
Closed Access
Shiquan Lin, Zhengye Xiao, Li-Xin Wang, et al.
Information Processing & Management (2024) Vol. 61, Iss. 6, pp. 103850-103850
Closed Access
Research on Anomaly Detection for Intelligent Inspection Robot Based on Computer Deep Learning
Yong Shi
Learning and analytics in intelligent systems (2024), pp. 702-713
Closed Access
Yong Shi
Learning and analytics in intelligent systems (2024), pp. 702-713
Closed Access
A Universal Adaptive Algorithm for Graph Anomaly Detection
Yuqi Li, Guosheng Zang, Chunyao Song, et al.
Information Processing & Management (2024) Vol. 62, Iss. 1, pp. 103905-103905
Closed Access
Yuqi Li, Guosheng Zang, Chunyao Song, et al.
Information Processing & Management (2024) Vol. 62, Iss. 1, pp. 103905-103905
Closed Access
K-fold matching model for crowd behavioral anomaly detection from discontinuous inputs
Ye Han, Jinming Wang, Fangfang Ye
Expert Systems with Applications (2024), pp. 125504-125504
Closed Access
Ye Han, Jinming Wang, Fangfang Ye
Expert Systems with Applications (2024), pp. 125504-125504
Closed Access
TAAD: Time-varying adversarial anomaly detection in dynamic graphs
Guanghua Liu, Zhang Jia, Peng Lv, et al.
Information Processing & Management (2024) Vol. 62, Iss. 1, pp. 103912-103912
Closed Access
Guanghua Liu, Zhang Jia, Peng Lv, et al.
Information Processing & Management (2024) Vol. 62, Iss. 1, pp. 103912-103912
Closed Access
Region Anomaly Detection via Spatial and Semantic Attributed Graph in Human Monitoring
Kang Zhang, Muhammad Fikko Fadjrimiratno, Einoshin Suzuki
Sensors (2023) Vol. 23, Iss. 3, pp. 1307-1307
Open Access | Times Cited: 1
Kang Zhang, Muhammad Fikko Fadjrimiratno, Einoshin Suzuki
Sensors (2023) Vol. 23, Iss. 3, pp. 1307-1307
Open Access | Times Cited: 1
Weakly-supervised video anomaly detection via temporal resolution feature learning
Shengjun Peng, Yiheng Cai, Zijun Yao, et al.
Applied Intelligence (2023) Vol. 53, Iss. 24, pp. 30607-30625
Closed Access | Times Cited: 1
Shengjun Peng, Yiheng Cai, Zijun Yao, et al.
Applied Intelligence (2023) Vol. 53, Iss. 24, pp. 30607-30625
Closed Access | Times Cited: 1
Investigating of Deep Learning-based Approaches for Anomaly Detection in IoT Surveillance Systems
Jianchang HUANG, Yakun CAI, Tingting Sun
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 12
Open Access
Jianchang HUANG, Yakun CAI, Tingting Sun
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 12
Open Access