
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Multivariate Abnormal Detection for Industrial Control Systems Using 1D CNN and GRU
Xin Xie, Bin Wang, Tiancheng Wan, et al.
IEEE Access (2020) Vol. 8, pp. 88348-88359
Open Access | Times Cited: 67
Xin Xie, Bin Wang, Tiancheng Wan, et al.
IEEE Access (2020) Vol. 8, pp. 88348-88359
Open Access | Times Cited: 67
Showing 26-50 of 67 citing articles:
Ship Abnormal Behavior Detection Method Based on Optimized GRU Network
Hongdan Liu, Yan Liu, Bing Li, et al.
Journal of Marine Science and Engineering (2022) Vol. 10, Iss. 2, pp. 249-249
Open Access | Times Cited: 11
Hongdan Liu, Yan Liu, Bing Li, et al.
Journal of Marine Science and Engineering (2022) Vol. 10, Iss. 2, pp. 249-249
Open Access | Times Cited: 11
Comparative analysis of dimensionality reduction techniques for cybersecurity in the SWaT dataset
Mehmet Bozdal, Kadir İleri, Ali Özkahraman
The Journal of Supercomputing (2023) Vol. 80, Iss. 1, pp. 1059-1079
Open Access | Times Cited: 5
Mehmet Bozdal, Kadir İleri, Ali Özkahraman
The Journal of Supercomputing (2023) Vol. 80, Iss. 1, pp. 1059-1079
Open Access | Times Cited: 5
Dual attention-based multi-step ahead prediction enhancement for monitoring systems in industrial processes
Nahyeon An, Seokyoung Hong, Yurim Kim, et al.
Applied Soft Computing (2023) Vol. 147, pp. 110763-110763
Open Access | Times Cited: 5
Nahyeon An, Seokyoung Hong, Yurim Kim, et al.
Applied Soft Computing (2023) Vol. 147, pp. 110763-110763
Open Access | Times Cited: 5
Machine learning and user interface for cyber risk management of water infrastructure
Nataliia Neshenko, Elias Bou‐Harb, Borko Furht, et al.
Risk Analysis (2023) Vol. 44, Iss. 4, pp. 833-849
Closed Access | Times Cited: 5
Nataliia Neshenko, Elias Bou‐Harb, Borko Furht, et al.
Risk Analysis (2023) Vol. 44, Iss. 4, pp. 833-849
Closed Access | Times Cited: 5
Unsupervised abnormal detection using VAE with memory
Xin Xie, Xinlei Li, Bin Wang, et al.
Soft Computing (2022) Vol. 26, Iss. 13, pp. 6219-6231
Closed Access | Times Cited: 8
Xin Xie, Xinlei Li, Bin Wang, et al.
Soft Computing (2022) Vol. 26, Iss. 13, pp. 6219-6231
Closed Access | Times Cited: 8
Improving Deep Learning Based Anomaly Detection on Multivariate Time Series Through Separated Anomaly Scoring
Adam Lundström, Mattias O′Nils, Faisal Z. Qureshi, et al.
IEEE Access (2022) Vol. 10, pp. 108194-108204
Open Access | Times Cited: 8
Adam Lundström, Mattias O′Nils, Faisal Z. Qureshi, et al.
IEEE Access (2022) Vol. 10, pp. 108194-108204
Open Access | Times Cited: 8
Phonocardiography Signals Compression with Deep Convolutional Autoencoder for Telecare Applications
Ying‐Ren Chien, Kai–Chieh Hsu, Hen‐Wai Tsao
Applied Sciences (2020) Vol. 10, Iss. 17, pp. 5842-5842
Open Access | Times Cited: 12
Ying‐Ren Chien, Kai–Chieh Hsu, Hen‐Wai Tsao
Applied Sciences (2020) Vol. 10, Iss. 17, pp. 5842-5842
Open Access | Times Cited: 12
The FPGA Hardware Implementation of the Gated Recurrent Unit Architecture
Zaghloul Saad Zaghloul, Zag ElSayed
SoutheastCon (2021), pp. 1-5
Closed Access | Times Cited: 11
Zaghloul Saad Zaghloul, Zag ElSayed
SoutheastCon (2021), pp. 1-5
Closed Access | Times Cited: 11
MENDEL: Time series anomaly detection using transfer learning for industrial control systems
Jeongyong Park, Bedeuro Kim, Hyoungshick Kim
(2023) Vol. 1, pp. 261-268
Closed Access | Times Cited: 4
Jeongyong Park, Bedeuro Kim, Hyoungshick Kim
(2023) Vol. 1, pp. 261-268
Closed Access | Times Cited: 4
ALGAN: Time Series Anomaly Detection with Adjusted-LSTM GAN
Md Abul Bashar, Richi Nayak
Research Square (Research Square) (2023)
Open Access | Times Cited: 4
Md Abul Bashar, Richi Nayak
Research Square (Research Square) (2023)
Open Access | Times Cited: 4
Research on blockchain abnormal transaction detection technology combining CNN and transformer structure
Zhiqiang Wang, Anfa Ni, Ziqing Tian, et al.
Computers & Electrical Engineering (2024) Vol. 116, pp. 109194-109194
Closed Access | Times Cited: 1
Zhiqiang Wang, Anfa Ni, Ziqing Tian, et al.
Computers & Electrical Engineering (2024) Vol. 116, pp. 109194-109194
Closed Access | Times Cited: 1
Enhancing Critical Infrastructure Security: Unsupervised Learning Approaches for Anomaly Detection
Andrea Pinto, Luis-Carlos Herrera, Yezid Donoso, et al.
International Journal of Computational Intelligence Systems (2024) Vol. 17, Iss. 1
Open Access | Times Cited: 1
Andrea Pinto, Luis-Carlos Herrera, Yezid Donoso, et al.
International Journal of Computational Intelligence Systems (2024) Vol. 17, Iss. 1
Open Access | Times Cited: 1
Learning spatiotemporal features of DSA using 3D CNN and BiConvGRU for ischemic moyamoya disease detection
Tao Hu, Yu Lei, Jiabin Su, et al.
International Journal of Neuroscience (2021) Vol. 133, Iss. 5, pp. 512-522
Closed Access | Times Cited: 10
Tao Hu, Yu Lei, Jiabin Su, et al.
International Journal of Neuroscience (2021) Vol. 133, Iss. 5, pp. 512-522
Closed Access | Times Cited: 10
A Methodology for Evaluating the Robustness of Anomaly Detectors to Adversarial Attacks in Industrial Scenarios
Ángel Luis Perales Gómez, Lorenzo Fernández Maimó, Félix J. García Clemente, et al.
IEEE Access (2022) Vol. 10, pp. 124582-124594
Open Access | Times Cited: 6
Ángel Luis Perales Gómez, Lorenzo Fernández Maimó, Félix J. García Clemente, et al.
IEEE Access (2022) Vol. 10, pp. 124582-124594
Open Access | Times Cited: 6
Unsupervised Process Anomaly Detection Under Industry Constraints in Cyber-Physical Systems Using Convolutional Autoencoder
Christian Goetz, Bernhard G. Humm
Lecture notes in electrical engineering (2023), pp. 659-674
Closed Access | Times Cited: 3
Christian Goetz, Bernhard G. Humm
Lecture notes in electrical engineering (2023), pp. 659-674
Closed Access | Times Cited: 3
Deep Learning for Multivariate Prediction of Building Energy Performance of Residential Buildings
Ibrahim Aliyu, Tai-Won Um, Sang-Joon Lee, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 75, Iss. 3, pp. 5947-5964
Open Access | Times Cited: 3
Ibrahim Aliyu, Tai-Won Um, Sang-Joon Lee, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 75, Iss. 3, pp. 5947-5964
Open Access | Times Cited: 3
Discovering a data interpreted petri net model of industrial control systems for anomaly detection
Mukhtar Hussain, Colin Fidge, Ernest Foo, et al.
Expert Systems with Applications (2023) Vol. 230, pp. 120511-120511
Open Access | Times Cited: 3
Mukhtar Hussain, Colin Fidge, Ernest Foo, et al.
Expert Systems with Applications (2023) Vol. 230, pp. 120511-120511
Open Access | Times Cited: 3
Network-based Anomaly Detection for SCADA Systems : Traffic Generation and Modeling
Chih‐Yuan Lin
Linköping studies in science and technology. Dissertations (2022)
Open Access | Times Cited: 5
Chih‐Yuan Lin
Linköping studies in science and technology. Dissertations (2022)
Open Access | Times Cited: 5
Intrusion Detection for Water Distribution Systems based on an Hybrid Particle Swarm Optimization with Back Propagation Neural Network
Oyeniyi Akeem Alimi, Khmaies Ouahada, Adnan M. Abu‐Mahfouz, et al.
(2021), pp. 1-5
Closed Access | Times Cited: 6
Oyeniyi Akeem Alimi, Khmaies Ouahada, Adnan M. Abu‐Mahfouz, et al.
(2021), pp. 1-5
Closed Access | Times Cited: 6
An Automated Detection of DDoS Attack in Cloud Using Optimized Weighted Fused Features and Hybrid DBN-GRU Architecture
Ahamed Ali S, Moorthy Agoramoorthy, Y. Justindhas
Cybernetics & Systems (2023) Vol. 55, Iss. 7, pp. 1469-1510
Closed Access | Times Cited: 2
Ahamed Ali S, Moorthy Agoramoorthy, Y. Justindhas
Cybernetics & Systems (2023) Vol. 55, Iss. 7, pp. 1469-1510
Closed Access | Times Cited: 2
Method for Detecting Industrial Defects in Intelligent Manufacturing Using Deep Learning
Bowen Yu, Chun-li Xie
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 78, Iss. 1, pp. 1329-1343
Open Access
Bowen Yu, Chun-li Xie
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 78, Iss. 1, pp. 1329-1343
Open Access
Detecting Cyber Attacks in Industrial Control Systems Using Duration-aware Representation Learning
Bin Lan, Shun‐Zheng Yu
(2024) Vol. 38, pp. 379-386
Closed Access
Bin Lan, Shun‐Zheng Yu
(2024) Vol. 38, pp. 379-386
Closed Access
Model based anomaly detection in cyber physical power systems
Ahmed Mutar Awad, Khattab M. Ali Alheeti, Abdul Kream A. H. Najem
AIP conference proceedings (2024) Vol. 3207, pp. 070001-070001
Closed Access
Ahmed Mutar Awad, Khattab M. Ali Alheeti, Abdul Kream A. H. Najem
AIP conference proceedings (2024) Vol. 3207, pp. 070001-070001
Closed Access
Optimization of inventory management through computer vision and machine learning technologies
William Villegas-Ch, Alexandra Maldonado Navarro, Santiago Sánchez-Viteri
Intelligent Systems with Applications (2024), pp. 200438-200438
Open Access
William Villegas-Ch, Alexandra Maldonado Navarro, Santiago Sánchez-Viteri
Intelligent Systems with Applications (2024), pp. 200438-200438
Open Access
Electric Vehicle Motor Fault Detection with Improved Recurrent 1D Convolutional Neural Network
Prashant Kumar, P Kumar, Ashish Kumar Sinha, et al.
Mathematics (2024) Vol. 12, Iss. 19, pp. 3012-3012
Open Access
Prashant Kumar, P Kumar, Ashish Kumar Sinha, et al.
Mathematics (2024) Vol. 12, Iss. 19, pp. 3012-3012
Open Access