OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

GCCAD: Graph Contrastive Learning for Anomaly Detection
Bo Chen, Jing Zhang, Xiaokang Zhang, et al.
IEEE Transactions on Knowledge and Data Engineering (2022), pp. 1-14
Closed Access | Times Cited: 43

Showing 1-25 of 43 citing articles:

Self-supervised anomaly detection in computer vision and beyond: A survey and outlook
Hadi Hojjati, Thi Kieu Khanh Ho, Narges Armanfard
Neural Networks (2024) Vol. 172, pp. 106106-106106
Open Access | Times Cited: 27

A Survey of Graph-Based Deep Learning for Anomaly Detection in Distributed Systems
Armin Danesh Pazho, Ghazal Alinezhad Noghre, Arnab A Purkayastha, et al.
IEEE Transactions on Knowledge and Data Engineering (2023) Vol. 36, Iss. 1, pp. 1-20
Open Access | Times Cited: 20

Graph Anomaly Detection via Diffusion Enhanced Multi-View Contrastive Learning
Xiangjie Kong, Jin Liu, Huan Li, et al.
Knowledge-Based Systems (2025), pp. 113093-113093
Closed Access

Synthesizing global and local perspectives in contrastive learning for graph anomaly detection
Qiqi Yang, Hang Yu, Zhengyang Liu, et al.
Knowledge-Based Systems (2025), pp. 113289-113289
Closed Access

Graph Learning for Anomaly Analytics: Algorithms, Applications, and Challenges
Jing Ren, Feng Xia, Ivan Lee, et al.
ACM Transactions on Intelligent Systems and Technology (2022) Vol. 14, Iss. 2, pp. 1-29
Open Access | Times Cited: 22

Fraud detection on multi-relation graphs via imbalanced and interactive learning
Xiaodi Wang, Zhonglin Liu, Jiamiao Liu, et al.
Information Sciences (2023) Vol. 642, pp. 119153-119153
Closed Access | Times Cited: 15

Improving Generalizability of Graph Anomaly Detection Models via Data Augmentation
Shuang Zhou, Xiao Huang, Ninghao Liu, et al.
IEEE Transactions on Knowledge and Data Engineering (2023) Vol. 35, Iss. 12, pp. 12721-12735
Open Access | Times Cited: 12

Mining Mobile Network Fraudsters with Augmented Graph Neural Networks
Xinxin Hu, Haotian Chen, Hongchang Chen, et al.
Entropy (2023) Vol. 25, Iss. 1, pp. 150-150
Open Access | Times Cited: 9

Graph Contrastive Learning with Personalized Augmentation
Xin Zhang, Qiaoyu Tan, Xiao Huang, et al.
IEEE Transactions on Knowledge and Data Engineering (2024) Vol. 36, Iss. 11, pp. 6305-6316
Open Access | Times Cited: 3

Contrastive graph neural network-based camouflaged fraud detector
Zexuan Deng, Guodong Xin, Yang Liu, et al.
Information Sciences (2022) Vol. 618, pp. 39-52
Closed Access | Times Cited: 12

Multiview Graph Contrastive Learning for Multivariate Time-Series Anomaly Detection in IoT
Shuxin Qin, Lin Chen, Yongcan Luo, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 24, pp. 22401-22414
Closed Access | Times Cited: 5

An Abnormal Account Identification Method by Topology Feature Analysis for Blockchain-Based Transaction Network
Yuyu Yue, Jixin Zhang, Mingwu Zhang, et al.
Electronics (2024) Vol. 13, Iss. 8, pp. 1416-1416
Open Access | Times Cited: 1

CGAD: A Novel Contrastive Learning-Based Framework for Anomaly Detection in Attributed Networks
Yun Wan, Dapeng Zhang, Dong Liu, et al.
Neurocomputing (2024) Vol. 609, pp. 128379-128379
Closed Access | Times Cited: 1

Mitigating adversarial cascades in large graph environments
J. Cunningham, Conrad S. Tucker
Expert Systems with Applications (2024) Vol. 258, pp. 125243-125243
Open Access | Times Cited: 1

Graph Anomaly Detection with Graph Convolutional Networks
Aabid A. Mir, Megat F. Zuhairi, Shahrulniza Musa
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 11
Open Access | Times Cited: 3

Few-shot Message-Enhanced Contrastive Learning for Graph Anomaly Detection
Fan Xu, Nan Wang, Xuezhi Wen, et al.
(2023)
Open Access | Times Cited: 3

Self-Supervised Anomaly Detection in Computer Vision and Beyond: A Survey and Outlook
Hadi Hojjati, Thi Kieu Khanh Ho, Narges Armanfard
arXiv (Cornell University) (2022)
Open Access | Times Cited: 5

Graph Contrastive Learning with Constrained Graph Data Augmentation
Xu Shaowu, Wang Luo, Xibin Jia
Neural Processing Letters (2023) Vol. 55, Iss. 8, pp. 10705-10726
Closed Access | Times Cited: 2

Revisiting Graph Contrastive Learning for Anomaly Detection
Zhiyuan Liu, Chunjie Cao, Fangjian Tao, et al.
Frontiers in artificial intelligence and applications (2023)
Open Access | Times Cited: 2

RustGraph: Robust Anomaly Detection in Dynamic Graphs by Jointly Learning Structural-Temporal Dependency
Jianhao Guo, Siliang Tang, Juncheng Li, et al.
IEEE Transactions on Knowledge and Data Engineering (2023) Vol. 36, Iss. 7, pp. 3472-3485
Closed Access | Times Cited: 2

Multi-modal Social Bot Detection: Learning Homophilic and Heterophilic Connections Adaptively
Shilong Li, Boyu Qiao, Kun Li, et al.
(2023), pp. 3908-3916
Open Access | Times Cited: 2

Discriminative Graph-Level Anomaly Detection via Dual-Students-Teacher Model
Fu Lin, Xuexiong Luo, Jia Wu, et al.
Lecture notes in computer science (2023), pp. 261-276
Closed Access | Times Cited: 2

Representation of Protein Dynamics Disentangled by Time-Structure-Based Prior
Tsuyoshi Ishizone, Yasuhiro Matsunaga, Sotaro Fuchigami, et al.
Journal of Chemical Theory and Computation (2023) Vol. 20, Iss. 1, pp. 436-450
Open Access | Times Cited: 2

Revisiting Attack-caused Structural Distribution Shift in Graph Anomaly Detection
Yuan Gao, Jinghan Li, Xiang Wang, et al.
IEEE Transactions on Knowledge and Data Engineering (2024) Vol. 36, Iss. 9, pp. 4849-4861
Closed Access

SHINE: A Scalable Heterogeneous Inductive Graph Neural Network for Large Imbalanced Datasets
Rafaƫl Van Belle, Jochen De Weerdt
IEEE Transactions on Knowledge and Data Engineering (2024) Vol. 36, Iss. 9, pp. 4904-4915
Closed Access

Page 1 - Next Page

Scroll to top