OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Model Based on Convolutional Neural Network for Online Transaction Fraud Detection
Zhaohui Zhang, Xinxin Zhou, Xiaobo Zhang, et al.
Security and Communication Networks (2018) Vol. 2018, pp. 1-9
Open Access | Times Cited: 114

Showing 1-25 of 114 citing articles:

Deep Learning for Anomaly Detection: A Survey
Raghavendra Chalapathy, Sanjay Chawla
arXiv (Cornell University) (2019)
Open Access | Times Cited: 1179

Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study
Mohamed Amine Ferrag, Λέανδρος Μαγλαράς, Sotiris Moschoyiannis, et al.
Journal of Information Security and Applications (2019) Vol. 50, pp. 102419-102419
Open Access | Times Cited: 747

Financial Fraud: A Review of Anomaly Detection Techniques and Recent Advances
Waleed Hilal, S. Andrew Gadsden, John Yawney
Expert Systems with Applications (2021) Vol. 193, pp. 116429-116429
Open Access | Times Cited: 267

Cyber security in smart cities: A review of deep learning-based applications and case studies
Dongliang Chen, Paweł Wawrzyński, Zhihan Lv
Sustainable Cities and Society (2020) Vol. 66, pp. 102655-102655
Closed Access | Times Cited: 231

Anomalous Example Detection in Deep Learning: A Survey
Saikiran Bulusu, Bhavya Kailkhura, Bo Li, et al.
IEEE Access (2020) Vol. 8, pp. 132330-132347
Open Access | Times Cited: 156

Deep Learning for Anomaly Detection
Ruoying Wang, Kexin Nie, Tie Wang, et al.
(2020)
Closed Access | Times Cited: 73

Intrusion Detection System After Data Augmentation Schemes Based on the VAE and CVAE
Chang Liu, Ruslan Antypenko, Iryna Sushko, et al.
IEEE Transactions on Reliability (2022) Vol. 71, Iss. 2, pp. 1000-1010
Closed Access | Times Cited: 54

A Novel Ensemble Belief Rule-Based Model for Online Payment Fraud Detection
Fan Yang, Guanxiang Hu, Hailong Zhu
Applied Sciences (2025) Vol. 15, Iss. 3, pp. 1555-1555
Open Access | Times Cited: 1

A Smart Approach for Intrusion Detection and Prevention System in Mobile Ad Hoc Networks Against Security Attacks
M. Islabudeen, M. K. Kavitha Devi
Wireless Personal Communications (2020) Vol. 112, Iss. 1, pp. 193-224
Closed Access | Times Cited: 68

Deep learning support for intelligent transportation systems
Juan Antonio Guerrero Ibáñez, Juan Contreras‐Castillo, Sherali Zeadally
Transactions on Emerging Telecommunications Technologies (2020) Vol. 32, Iss. 3
Closed Access | Times Cited: 60

Anomaly Detection Using XGBoost Ensemble of Deep Neural Network Models
I. Sumaiya Thaseen, Aswani Kumar Cherukuri, Babu Poorva, et al.
Cybernetics and Information Technologies (2021) Vol. 21, Iss. 3, pp. 175-188
Open Access | Times Cited: 52

A bio-inspired hybrid deep learning model for network intrusion detection
MD Moizuddin, M. Victor Jose
Knowledge-Based Systems (2021) Vol. 238, pp. 107894-107894
Closed Access | Times Cited: 42

Explainable Artificial Intelligence for Smart City Application: A Secure and Trusted Platform
M. Humayun Kabir, Khondokar Fida Hasan, Mohammad Kamrul Hasan, et al.
Studies in computational intelligence (2022), pp. 241-263
Closed Access | Times Cited: 36

Deep Learning Techniques for Cyber Security Intrusion Detection : A Detailed Analysis
Mohamed Amine Ferrag, Λέανδρος Μαγλαράς, Helge Janicke, et al.
Electronic workshops in computing (2019)
Open Access | Times Cited: 54

Eager pruning
Jiaqi Zhang, Xiangru Chen, Mingcong Song, et al.
(2019), pp. 292-303
Open Access | Times Cited: 48

Financial Fraud Detection Approach Based on Firefly Optimization Algorithm and Support Vector Machine
Ajeet Singh, Anurag Jain, Seblewongel Esseynew Biable
Applied Computational Intelligence and Soft Computing (2022) Vol. 2022, pp. 1-10
Open Access | Times Cited: 26

Efficient Anomaly Detection Using Self-Supervised Multi-Cue Tasks
Loic Jezequel, Ngoc‐Son Vu, Jean Beaudet, et al.
IEEE Transactions on Image Processing (2023) Vol. 32, pp. 807-821
Open Access | Times Cited: 15

Enhancing Financial Fraud Detection through Addressing Class Imbalance Using Hybrid SMOTE-GAN Techniques
Patience Chew Yee Cheah, Yue Yang, Boon Giin Lee
International Journal of Financial Studies (2023) Vol. 11, Iss. 3, pp. 110-110
Open Access | Times Cited: 14

Credit Card Fraud Detection Using Improved Deep Learning Models
Sumaya S. Sulaiman, Ibraheem Nadher Ibraheem, Sarab M. Hameed
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 78, Iss. 1, pp. 1049-1069
Open Access | Times Cited: 5

Adaptive Anomaly Detection Framework Model Objects in Cyberspace
Hasan Alkahtani, Theyazn H. H. Aldhyani, Mohammed Al‐Yaari
Applied Bionics and Biomechanics (2020) Vol. 2020, pp. 1-14
Open Access | Times Cited: 37

Apache Spark and Deep Learning Models for High-Performance Network Intrusion Detection Using CSE-CIC-IDS2018
Abdulnaser A. Hagar, Bharti W. Gawali
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-11
Open Access | Times Cited: 21

Anomalous Instance Detection in Deep Learning: A Survey.
Saikiran Bulusu, Bhavya Kailkhura, Bo Li, et al.
arXiv (Cornell University) (2020)
Closed Access | Times Cited: 31

Beyond Birthday Bound Secure MAC in Faulty Nonce Model
Avijit Dutta, Mridul Nandi, Suprita Talnikar
Lecture notes in computer science (2019), pp. 437-466
Closed Access | Times Cited: 30

Deep Learning and Implementations in Banking
Hossein Hassani, Xu Huang, Emmanuel Sirimal Silva, et al.
Annals of Data Science (2020) Vol. 7, Iss. 3, pp. 433-446
Open Access | Times Cited: 29

A novel approach to detect fraud in Ethereum transactions using stacking
Abdul Quadir, Santhanakrishnan Narayanan, H. Sabireen, et al.
Expert Systems (2023) Vol. 40, Iss. 7
Closed Access | Times Cited: 10

Page 1 - Next Page

Scroll to top