
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Comprehensive Survey of Machine Learning Methods for Surveillance Videos Anomaly Detection
Nomica Choudhry, Jemal Abawajy, Shamsul Huda, et al.
IEEE Access (2023) Vol. 11, pp. 114680-114713
Open Access | Times Cited: 13
Nomica Choudhry, Jemal Abawajy, Shamsul Huda, et al.
IEEE Access (2023) Vol. 11, pp. 114680-114713
Open Access | Times Cited: 13
Showing 13 citing articles:
Deep BiLSTM Attention Model for Spatial and Temporal Anomaly Detection in Video Surveillance
Sarfaraz Natha, Fareed Ahmed, Mohammad Siraj, et al.
Sensors (2025) Vol. 25, Iss. 1, pp. 251-251
Open Access
Sarfaraz Natha, Fareed Ahmed, Mohammad Siraj, et al.
Sensors (2025) Vol. 25, Iss. 1, pp. 251-251
Open Access
Deep Learning for Abnormal Human Behavior Detection in Surveillance Videos—A Survey
Leonard Matheus Wastupranata, Seong G. Kong, Lipo Wang
Electronics (2024) Vol. 13, Iss. 13, pp. 2579-2579
Open Access | Times Cited: 1
Leonard Matheus Wastupranata, Seong G. Kong, Lipo Wang
Electronics (2024) Vol. 13, Iss. 13, pp. 2579-2579
Open Access | Times Cited: 1
Deep Learning for Abnormal Human Behavior Detection in Surveillance Videos - a Survey
Leonard Matheus Wastupranata, Seong G. Kong
(2024)
Closed Access | Times Cited: 1
Leonard Matheus Wastupranata, Seong G. Kong
(2024)
Closed Access | Times Cited: 1
Advanced CCTV Surveillance Anomaly Detection, Alert Generation and Crowd Management using Deep Learning Algorithm
R Kevin Lemuel Thomas, G Sanjay, C Pandeeswaran, et al.
(2024), pp. 1-6
Closed Access | Times Cited: 1
R Kevin Lemuel Thomas, G Sanjay, C Pandeeswaran, et al.
(2024), pp. 1-6
Closed Access | Times Cited: 1
Leveraging Attention for Improved Discriminative Correlation Filters in Single Object Tracking
Ahmed O. Elsaid, Mohamed M. Fouad, Tarek S. Ghoniemy
Research Square (Research Square) (2024)
Open Access
Ahmed O. Elsaid, Mohamed M. Fouad, Tarek S. Ghoniemy
Research Square (Research Square) (2024)
Open Access
CROWD VIDEO SEQUENCES PROCESSING METHODS FOR DETERMINING THE CROWD MOTION PATTERNS
S. V. Sholtanyuk, Qinyuan Bu, A. Nedzved
HERALD OF POLOTSK STATE UNIVERSITY Series С FUNDAMENTAL SCIENCES (2024), Iss. 1, pp. 26-33
Open Access
S. V. Sholtanyuk, Qinyuan Bu, A. Nedzved
HERALD OF POLOTSK STATE UNIVERSITY Series С FUNDAMENTAL SCIENCES (2024), Iss. 1, pp. 26-33
Open Access
Crowd Anomaly Estimation and Detection: A Review
A. Hussein, Mhd. Wasim Raed, Ali Al‐Shaikhi, et al.
Franklin Open (2024) Vol. 8, pp. 100169-100169
Open Access
A. Hussein, Mhd. Wasim Raed, Ali Al‐Shaikhi, et al.
Franklin Open (2024) Vol. 8, pp. 100169-100169
Open Access
Unsupervised Learning Methods for Human Abnormal Behavior Detection in Surveillance Systems; A Survey
Leonard Matheus Wastupranata
(2024)
Open Access
Leonard Matheus Wastupranata
(2024)
Open Access
Optimizing Image Recognition Efficiency using Sparse Representation Learning and Transfer Learning for Resource-Constrained Environments
S. Vijayprasath
Deleted Journal (2024) Vol. 20, Iss. 5s, pp. 2001-2008
Open Access
S. Vijayprasath
Deleted Journal (2024) Vol. 20, Iss. 5s, pp. 2001-2008
Open Access
Unveiling Rare Patterns: Anomaly Detection in CCTV Footage for Safeguarding Home Premises
Mintu Movi, Abdul Jabbar P
Journal of Information assurance and security (2024) Vol. 19, Iss. 1, pp. 15-35
Closed Access
Mintu Movi, Abdul Jabbar P
Journal of Information assurance and security (2024) Vol. 19, Iss. 1, pp. 15-35
Closed Access
Generative AI in Network Security and Intrusion Detection
Siva Raja Sindiramutty, Krishna Raj V. Prabagaran, N. Z. Jhanjhi, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 77-124
Closed Access
Siva Raja Sindiramutty, Krishna Raj V. Prabagaran, N. Z. Jhanjhi, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 77-124
Closed Access
Analysing the Effectiveness of YOLO Model in Detecting the Images Captured by the Drone
Muhammad Ramzan, Hamid Jahankhani
Advanced sciences and technologies for security applications (2024), pp. 65-85
Closed Access
Muhammad Ramzan, Hamid Jahankhani
Advanced sciences and technologies for security applications (2024), pp. 65-85
Closed Access
A Region based Salient Stacking Optimized Detector (ReSOD) For an Effective Anomaly Detection and Video Tracking in Surveillance Systems
Areej Alasiry, Mohammed Qayyum
Neurocomputing (2024), pp. 129281-129281
Closed Access
Areej Alasiry, Mohammed Qayyum
Neurocomputing (2024), pp. 129281-129281
Closed Access