OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Cross-Domain Graph Anomaly Detection
Kaize Ding, Kai Shu, Xuan Shan, et al.
IEEE Transactions on Neural Networks and Learning Systems (2021) Vol. 33, Iss. 6, pp. 2406-2415
Closed Access | Times Cited: 27

Showing 1-25 of 27 citing articles:

A Comprehensive Survey on Graph Anomaly Detection With Deep Learning
Xiaoxiao Ma, Jia Wu, Shan Xue, et al.
IEEE Transactions on Knowledge and Data Engineering (2021) Vol. 35, Iss. 12, pp. 12012-12038
Open Access | Times Cited: 400

A Survey of Graph-Based Deep Learning for Anomaly Detection in Distributed Systems
Armin Danesh Pazho, Ghazal Alinezhad Noghre, Arnab A Purkayastha, et al.
IEEE Transactions on Knowledge and Data Engineering (2023) Vol. 36, Iss. 1, pp. 1-20
Open Access | Times Cited: 22

Medicare Fraud Detection Using Graph Analysis: A Comparative Study of Machine Learning and Graph Neural Networks
Yeeun Yoo, Jin-Ho Shin, S.-H. Kyeong
IEEE Access (2023) Vol. 11, pp. 88278-88294
Open Access | Times Cited: 21

BTG: A Bridge to Graph machine learning in telecommunications fraud detection
Xinxin Hu, Hongchang Chen, Shuxin Liu, et al.
Future Generation Computer Systems (2022) Vol. 137, pp. 274-287
Closed Access | Times Cited: 25

Improving Generalizability of Graph Anomaly Detection Models via Data Augmentation
Shuang Zhou, Xiao Huang, Ninghao Liu, et al.
IEEE Transactions on Knowledge and Data Engineering (2023) Vol. 35, Iss. 12, pp. 12721-12735
Open Access | Times Cited: 13

Domain Adaptation for Graph Representation Learning: Challenges, Progress, and Prospects
Boshen Shi, Yongqing Wang, Fangda Guo, et al.
Journal of Computer Science and Technology (2025)
Closed Access

AnoEdgePred: A Novel Method for Detecting Anomalous Edges in Social Networks
Pallavi Raj
IETE Technical Review (2025), pp. 1-17
Closed Access

Artificial Intelligence Algorithms for Treatment of Diabetes
Mudassir Rashid, Mohammad Reza Askari, Canyu Chen, et al.
Algorithms (2022) Vol. 15, Iss. 9, pp. 299-299
Open Access | Times Cited: 20

DualGAD: Dual-bootstrapped self-supervised learning for graph anomaly detection
Hui Tang, Xun Liang, Jun Wang, et al.
Information Sciences (2024) Vol. 668, pp. 120520-120520
Closed Access | Times Cited: 4

A comprehensive survey on GNN-based anomaly detection: taxonomy, methods, and the role of large language models
Ziqi Yuan, Qingyun Sun, Haoyi Zhou, et al.
International Journal of Machine Learning and Cybernetics (2025)
Closed Access

A GNN-Based False Data Detection Scheme for Smart Grids
Junhong Qiu, Xinxin Zhang, Tao Wang, et al.
Algorithms (2025) Vol. 18, Iss. 3, pp. 166-166
Open Access

A Comprehensive Survey on Graph Anomaly Detection with Deep Learning
Xiaoxiao Ma, Jia Wu, Shan Xue, et al.
arXiv (Cornell University) (2021)
Closed Access | Times Cited: 25

Cross-Domain Graph Anomaly Detection via Anomaly-Aware Contrastive Alignment
Qizhou Wang, Guansong Pang, Mahsa Salehi, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2023) Vol. 37, Iss. 4, pp. 4676-4684
Open Access | Times Cited: 8

Adversarial Danger Identification on Temporally Dynamic Graphs
Fuqiang Liu, Jingbo Tian, Luis Miranda-Moreno, et al.
IEEE Transactions on Neural Networks and Learning Systems (2023) Vol. 35, Iss. 4, pp. 4744-4755
Closed Access | Times Cited: 7

Graph-based minimum error entropy Kalman filtering
Kun Zhang, Gang Wang, Yuzheng Zhou, et al.
Signal Processing (2024) Vol. 222, pp. 109535-109535
Closed Access | Times Cited: 2

Detecting malicious reviews and users affecting social reviewing systems: A survey
Christian Esposito, Vincenzo Moscato, Giancarlo Sperlì
Computers & Security (2023) Vol. 133, pp. 103407-103407
Closed Access | Times Cited: 3

Few-shot Message-Enhanced Contrastive Learning for Graph Anomaly Detection
Fan Xu, Nan Wang, Xuezhi Wen, et al.
(2023)
Open Access | Times Cited: 3

Anomalous Node Detection in a Graph Considering Text Features
Yeonju Song, Ki Yong Lee
Studies in computational intelligence (2024), pp. 173-184
Closed Access

Research on Anomaly Detection Methodology Combining Large Language Models
Tingting Zhang, Dengjiang Cai, Lixuan Qiu, et al.
2022 4th International Conference on Communications, Information System and Computer Engineering (CISCE) (2024) Vol. 102, pp. 1013-1017
Closed Access

Cross-Domain Graph Level Anomaly Detection
Zhong Li, Sheng Liang, Jiayang Shi, et al.
IEEE Transactions on Knowledge and Data Engineering (2024) Vol. 36, Iss. 12, pp. 7839-7850
Open Access

Design of an Improved Graph-Based Model for Real-Time Anomaly Detection in Healthcare Using Hybrid CNN-LSTM and Federated Learning
G. Muni Nagamani, Chanumolu Kiran Kumar
Heliyon (2024) Vol. 10, Iss. 24, pp. e41071-e41071
Closed Access

TO-UGDA: target-oriented unsupervised graph domain adaptation
Zhuo Zeng, Jianyu Xie, Zhijie Yang, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access

Graph neural network-based anomaly detection for human cyber physical systems
Chengwen Xue, Limei Lin, Yanze Huang, et al.
Journal of the Chinese Institute of Engineers (2024) Vol. 47, Iss. 8, pp. 977-984
Closed Access

Data‐efficient graph learning: Problems, progress, and prospects
Kaize Ding, Yixin Liu, Chuxu Zhang, et al.
AI Magazine (2024)
Open Access

Towards Fair Graph Anomaly Detection: Problem, Benchmark Datasets, and Evaluation
Neng Kai Nigel Neo, Yeon-Chang Lee, Yiqiao Jin, et al.
(2024), pp. 1752-1762
Open Access

Page 1 - Next Page

Scroll to top