
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Video anomaly detection: A systematic review of issues and prospects
Yau Alhaji Samaila, Patrick Sebastian, Narinderjit Singh Sawaran Singh, et al.
Neurocomputing (2024) Vol. 591, pp. 127726-127726
Closed Access | Times Cited: 5
Yau Alhaji Samaila, Patrick Sebastian, Narinderjit Singh Sawaran Singh, et al.
Neurocomputing (2024) Vol. 591, pp. 127726-127726
Closed Access | Times Cited: 5
Showing 5 citing articles:
Human Pose Estimation-Based ID Assignment Method in the Wild: A Real-Time Approach
Pyunghwa Shin, Ohung Kwon
Lecture notes in computer science (2025), pp. 223-236
Closed Access
Pyunghwa Shin, Ohung Kwon
Lecture notes in computer science (2025), pp. 223-236
Closed Access
Real-Time Deep Anomaly Detection: An Overview of Benchmark Datasets and Performance Metrics
Yau Alhaji Samaila, Patrick Sebastian, Aliyu Nuhu Shuaibu, et al.
Transportation research procedia (2025) Vol. 84, pp. 418-425
Open Access
Yau Alhaji Samaila, Patrick Sebastian, Aliyu Nuhu Shuaibu, et al.
Transportation research procedia (2025) Vol. 84, pp. 418-425
Open Access
Adversarial diffusion for few-shot scene adaptive video anomaly detection
Yumna Zahid, Christine Zarges, Bernard Tiddeman, et al.
Neurocomputing (2024) Vol. 614, pp. 128796-128796
Closed Access | Times Cited: 4
Yumna Zahid, Christine Zarges, Bernard Tiddeman, et al.
Neurocomputing (2024) Vol. 614, pp. 128796-128796
Closed Access | Times Cited: 4
A Comprehensive Investigation of Anomaly Detection Methods in Deep Learning and Machine Learning: 2019–2023
Shalini Kumari, Chander Prabha, Asif Karim, et al.
IET Information Security (2024) Vol. 2024, Iss. 1
Open Access | Times Cited: 1
Shalini Kumari, Chander Prabha, Asif Karim, et al.
IET Information Security (2024) Vol. 2024, Iss. 1
Open Access | Times Cited: 1
Pro-ReID: Producing reliable pseudo labels for unsupervised person re-identification
Haiming Sun, Shiwei Ma
Image and Vision Computing (2024) Vol. 150, pp. 105244-105244
Closed Access
Haiming Sun, Shiwei Ma
Image and Vision Computing (2024) Vol. 150, pp. 105244-105244
Closed Access
Transformer Tracking Using Spatiotemporal Features
Janani Kugarajeevan, Kokul Thanikasalam, Amirthalingam Ramanan, et al.
2022 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET) (2024), pp. 524-529
Closed Access
Janani Kugarajeevan, Kokul Thanikasalam, Amirthalingam Ramanan, et al.
2022 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET) (2024), pp. 524-529
Closed Access