
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
ConvNets for Fraud Detection analysis
Alae Chouiekh, El Hassane Ibn El Haj
Procedia Computer Science (2018) Vol. 127, pp. 133-138
Open Access | Times Cited: 65
Alae Chouiekh, El Hassane Ibn El Haj
Procedia Computer Science (2018) Vol. 127, pp. 133-138
Open Access | Times Cited: 65
Showing 1-25 of 65 citing articles:
Deep Learning for Anomaly Detection: A Survey
Raghavendra Chalapathy, Sanjay Chawla
arXiv (Cornell University) (2019)
Open Access | Times Cited: 1178
Raghavendra Chalapathy, Sanjay Chawla
arXiv (Cornell University) (2019)
Open Access | Times Cited: 1178
Fraud Detection using Machine Learning and Deep Learning
P. Raghavan, Neamat El Gayar
(2019), pp. 334-339
Closed Access | Times Cited: 109
P. Raghavan, Neamat El Gayar
(2019), pp. 334-339
Closed Access | Times Cited: 109
Deep Learning for Anomaly Detection
Ruoying Wang, Kexin Nie, Tie Wang, et al.
(2020)
Closed Access | Times Cited: 73
Ruoying Wang, Kexin Nie, Tie Wang, et al.
(2020)
Closed Access | Times Cited: 73
A proof that deep artificial neural networks overcome the curse of dimensionality in the numerical approximation of Kolmogorov partial differential equations with constant diffusion and nonlinear drift coefficients
Arnulf Jentzen, Diyora Salimova, Timo Welti
Communications in Mathematical Sciences (2021) Vol. 19, Iss. 5, pp. 1167-1205
Open Access | Times Cited: 71
Arnulf Jentzen, Diyora Salimova, Timo Welti
Communications in Mathematical Sciences (2021) Vol. 19, Iss. 5, pp. 1167-1205
Open Access | Times Cited: 71
Credit Card Fraud Detection Based on Unsupervised Attentional Anomaly Detection Network
Shanshan Jiang, Ruiting Dong, Jie Wang, et al.
Systems (2023) Vol. 11, Iss. 6, pp. 305-305
Open Access | Times Cited: 32
Shanshan Jiang, Ruiting Dong, Jie Wang, et al.
Systems (2023) Vol. 11, Iss. 6, pp. 305-305
Open Access | Times Cited: 32
A Convolutional Neural Network (CNN) classification to identify the presence of pores in powder bed fusion images
Muhammad Ayub Ansari, Andrew Crampton, Rebecca Garrard, et al.
The International Journal of Advanced Manufacturing Technology (2022) Vol. 120, Iss. 7-8, pp. 5133-5150
Open Access | Times Cited: 30
Muhammad Ayub Ansari, Andrew Crampton, Rebecca Garrard, et al.
The International Journal of Advanced Manufacturing Technology (2022) Vol. 120, Iss. 7-8, pp. 5133-5150
Open Access | Times Cited: 30
An effective fraud detection using competitive swarm optimization based deep neural network
T. Karthikeyan, M. Govindarajan, V. Vijayakumar
Measurement Sensors (2023) Vol. 27, pp. 100793-100793
Open Access | Times Cited: 20
T. Karthikeyan, M. Govindarajan, V. Vijayakumar
Measurement Sensors (2023) Vol. 27, pp. 100793-100793
Open Access | Times Cited: 20
BTG: A Bridge to Graph machine learning in telecommunications fraud detection
Xinxin Hu, Hongchang Chen, Shuxin Liu, et al.
Future Generation Computer Systems (2022) Vol. 137, pp. 274-287
Closed Access | Times Cited: 25
Xinxin Hu, Hongchang Chen, Shuxin Liu, et al.
Future Generation Computer Systems (2022) Vol. 137, pp. 274-287
Closed Access | Times Cited: 25
Meta-anova: screening interactions for interpretable machine learning
Yongchan Choi, Seokhun Park, Chankyu Park, et al.
Journal of the Korean Statistical Society (2025)
Open Access
Yongchan Choi, Seokhun Park, Chankyu Park, et al.
Journal of the Korean Statistical Society (2025)
Open Access
LM-Hunter: An NLP-Powered Graph Method for Detecting Adversary Lateral Movements in APT Cyber-Attacks at Scale
Mario Pérez-Gomariz, Fernando Cerdán, Jess García
Computer Networks (2025), pp. 111181-111181
Closed Access
Mario Pérez-Gomariz, Fernando Cerdán, Jess García
Computer Networks (2025), pp. 111181-111181
Closed Access
Strong error analysis for stochastic gradient descent optimization algorithms
Arnulf Jentzen, Benno Kuckuck, Ariel Neufeld, et al.
IMA Journal of Numerical Analysis (2019) Vol. 41, Iss. 1, pp. 455-492
Open Access | Times Cited: 37
Arnulf Jentzen, Benno Kuckuck, Ariel Neufeld, et al.
IMA Journal of Numerical Analysis (2019) Vol. 41, Iss. 1, pp. 455-492
Open Access | Times Cited: 37
A SMOTe based Oversampling Data-Point Approach to Solving the Credit Card Data Imbalance Problem in Financial Fraud Detection
Nhlakanipho Michael Mqadi, Nalindren Naicker, Timothy T. Adeliyi
International Journal of Computing and Digital Systems (2021) Vol. 10, Iss. 1, pp. 277-286
Open Access | Times Cited: 30
Nhlakanipho Michael Mqadi, Nalindren Naicker, Timothy T. Adeliyi
International Journal of Computing and Digital Systems (2021) Vol. 10, Iss. 1, pp. 277-286
Open Access | Times Cited: 30
Predicting Fraud in Financial Payment Services through Optimized Hyper-Parameter-Tuned XGBoost Model
Surjeet Dalal, Bijeta Seth, Magdalena Rădulescu, et al.
Mathematics (2022) Vol. 10, Iss. 24, pp. 4679-4679
Open Access | Times Cited: 21
Surjeet Dalal, Bijeta Seth, Magdalena Rădulescu, et al.
Mathematics (2022) Vol. 10, Iss. 24, pp. 4679-4679
Open Access | Times Cited: 21
Variational Autoencoders and Wasserstein Generative Adversarial Networks for Improving the Anti-Money Laundering Process
Zhiyuan Chen, Waleed Mahmoud Soliman, Amril Nazir, et al.
IEEE Access (2021) Vol. 9, pp. 83762-83785
Open Access | Times Cited: 25
Zhiyuan Chen, Waleed Mahmoud Soliman, Amril Nazir, et al.
IEEE Access (2021) Vol. 9, pp. 83762-83785
Open Access | Times Cited: 25
Deep neural network approximations for Monte Carlo algorithms
Philipp Grohs, Arnulf Jentzen, Diyora Salimova
(2019)
Closed Access | Times Cited: 28
Philipp Grohs, Arnulf Jentzen, Diyora Salimova
(2019)
Closed Access | Times Cited: 28
Anomaly Detection in Power Generation Plants Using Machine Learning and Neural Networks
Jecinta Mulongo, Marcellin Atemkeng, Theophilus Ansah-Narh, et al.
Applied Artificial Intelligence (2019) Vol. 34, Iss. 1, pp. 64-79
Open Access | Times Cited: 26
Jecinta Mulongo, Marcellin Atemkeng, Theophilus Ansah-Narh, et al.
Applied Artificial Intelligence (2019) Vol. 34, Iss. 1, pp. 64-79
Open Access | Times Cited: 26
Telecom traffic pumping analytics via explainable data science
María Elisa Irarrázaval, Sebastián Maldonado, Juan Pérez, et al.
Decision Support Systems (2021) Vol. 150, pp. 113559-113559
Closed Access | Times Cited: 22
María Elisa Irarrázaval, Sebastián Maldonado, Juan Pérez, et al.
Decision Support Systems (2021) Vol. 150, pp. 113559-113559
Closed Access | Times Cited: 22
Deep Learning Approach for Credit Card Fraud Detection
Aya Abd El Naby, Ezz El‐Din Hemdan, Ayman El‐Sayed
(2021), pp. 1-5
Closed Access | Times Cited: 19
Aya Abd El Naby, Ezz El‐Din Hemdan, Ayman El‐Sayed
(2021), pp. 1-5
Closed Access | Times Cited: 19
Deep neural network approximations for solutions of PDEs based on Monte Carlo algorithms
Philipp Grohs, Arnulf Jentzen, Diyora Salimova
Partial Differential Equations and Applications (2022) Vol. 3, Iss. 4
Open Access | Times Cited: 13
Philipp Grohs, Arnulf Jentzen, Diyora Salimova
Partial Differential Equations and Applications (2022) Vol. 3, Iss. 4
Open Access | Times Cited: 13
Weld defect detection with convolutional neural network: an application of deep learning
Manu S. Madhav, Suhas Suresh Ambekar, Manoj Hudnurkar
Annals of Operations Research (2023)
Closed Access | Times Cited: 7
Manu S. Madhav, Suhas Suresh Ambekar, Manoj Hudnurkar
Annals of Operations Research (2023)
Closed Access | Times Cited: 7
Review: enhancing Additive Digital Manufacturing with supervised classification machine learning algorithms
Nguyen Huu Phan, Pham Van Dong, Thinh Hoang Xuan, et al.
The International Journal of Advanced Manufacturing Technology (2024) Vol. 133, Iss. 3-4, pp. 1027-1043
Closed Access | Times Cited: 2
Nguyen Huu Phan, Pham Van Dong, Thinh Hoang Xuan, et al.
The International Journal of Advanced Manufacturing Technology (2024) Vol. 133, Iss. 3-4, pp. 1027-1043
Closed Access | Times Cited: 2
Systemic Acquired Critique of Credit Card Deception Exposure through Machine Learning
Rui Miguel Dantas, Raheela Firdaus, Farrokh Jaleel, et al.
Journal of Open Innovation Technology Market and Complexity (2022) Vol. 8, Iss. 4, pp. 192-192
Open Access | Times Cited: 12
Rui Miguel Dantas, Raheela Firdaus, Farrokh Jaleel, et al.
Journal of Open Innovation Technology Market and Complexity (2022) Vol. 8, Iss. 4, pp. 192-192
Open Access | Times Cited: 12
Exploitation of Machine Learning Algorithms for Detecting Financial Crimes Based on Customers’ Behavior
Sanjay Kumar, Rafeeq Ahmed, Salil Bharany, et al.
Sustainability (2022) Vol. 14, Iss. 21, pp. 13875-13875
Open Access | Times Cited: 12
Sanjay Kumar, Rafeeq Ahmed, Salil Bharany, et al.
Sustainability (2022) Vol. 14, Iss. 21, pp. 13875-13875
Open Access | Times Cited: 12
Approaches to Fraud Detection on Credit Card Transactions using Artificial Intelligence Methods
Yusuf Yazıcı
(2020), pp. 235-244
Open Access | Times Cited: 17
Yusuf Yazıcı
(2020), pp. 235-244
Open Access | Times Cited: 17
FRAUD DETECTION USING MACHINE LEARNING AND DEEP LEARNING
Sameeksha Shetty
International Research Journal of Modernization in Engineering Technology and Science (2023)
Open Access | Times Cited: 5
Sameeksha Shetty
International Research Journal of Modernization in Engineering Technology and Science (2023)
Open Access | Times Cited: 5