OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Showing 26-50 of 50 citing articles:

Fault diagnosis in semiconductor manufacturing processes using a CNN-based generative adversarial network1
Palanichamy Naveen, S. NithyaSai, Udayamoorthy Venkateshkumar, et al.
Journal of Intelligent & Fuzzy Systems (2023) Vol. 46, Iss. 1, pp. 1789-1800
Closed Access | Times Cited: 2

E-Commerce Product Retrieval Using Knowledge from GPT-4
Firas Rashed Wahsheh, Yazeed Al Moaiad, Yousef A. Baker El‐Ebiary, et al.
(2023), pp. 1-8
Closed Access | Times Cited: 2

An Evaluation and Annotation Methodology for Product Category Matching in E-Commerce Using GPT
Anas Ghassan Kanaan, Firas Rashed Wahsheh, Yousef A. Baker El‐Ebiary, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 2

Navigating the Deception Stack: In-Depth Analysis and Application of Comprehensive Cyber Defense Solutions
Abdelrahman Aly, Mahmoud Fayez, Mirvat Al-Qutt, et al.
International journal of intelligent computing and information sciences/International Journal of Intelligent Computing and Information Sciences (2023) Vol. 23, Iss. 4, pp. 50-65
Open Access | Times Cited: 2

Proposed algorithm base optimization scheme for intrusion detection using feature selection
Imane Laassar, Youssef Hadi
International Journal of Advances in Applied Sciences (2024) Vol. 13, Iss. 1, pp. 24-24
Open Access

A Hybrid Few-Shot Learning Based Intrusion Detection Method for Internet of Vehicles
Yixuan Zhao, Jianming Cui, Ming Liu
Lecture notes in computer science (2024), pp. 207-220
Closed Access

Metaheuristics-Based Hyperparameter Tuning for Convolutional Neural Networks
Tong Van Luyen, Nguyen Van Cuong
Ad Hoc Networks (2024), pp. 41-54
Closed Access

Multi‐objective prairie dog optimization algorithm for IoT‐based intrusion detection
Shubhkirti Sharma, Vijay Kumar, Kamlesh Dutta
Internet Technology Letters (2024)
Closed Access

An Efficient Deep Learningbased Intrusion Detection System for Internet of Things Networks with Hybrid Feature Reduction and Data Balancing Techniques
Hamdullah Karamollaoğlu, İbrahim Alper Doğru, İbrahim Yücedağ
Information Technology And Control (2024) Vol. 53, Iss. 1, pp. 243-261
Open Access

Advanced cyber security using Spectral entity feature selection based on Cyber Crypto Proof Security Protocol (C2PSP)
S. Gopalakrishnan, Karabi Saikia, Ranadheer Reddy Vallem
Deleted Journal (2023), pp. 40-47
Open Access | Times Cited: 1

BP-Model-Based Quench Detection Method for Double-Stator HTS-Excitation Field- Modulation Machine
Yingjie Tan, Xianglin Li, Mingzhe Sang, et al.
IEEE Transactions on Applied Superconductivity (2023) Vol. 33, Iss. 5, pp. 1-7
Closed Access | Times Cited: 1

A Review of the Effectiveness of Management Information System in Decision Making
Hazem Mohammad Al-Kaseasbeh, Firas Rashed Wahsheh, Fatma Susilawati Mohamad, et al.
(2023), pp. 1-7
Closed Access | Times Cited: 1

A Review of Effectiveness and Efficiency Methodology of Decision Support System for Selecting Suppliers
Sharaf Alzoubi, Khalid Thaher Amayreh, Mazen Mohammed Farea, et al.
(2023)
Closed Access | Times Cited: 1

The Lack of E-Commerce Customer Service and After Selling Follow-Up
Anas Ghassan Kanaan, Yousef I. Majdalawi, Mazen Mohammed Farea, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 1

Joint Feature Selection and Classifier Parameter Optimization: A Bio-Inspired Approach
Zeqian Wei, Hui Kang, Hongjuan Li, et al.
Lecture notes in computer science (2023), pp. 3-14
Closed Access

Traffic Intrusion Detection of Medical Consumption Electronics in the Field of Medical Management Based on Integrated Learning
Tianyi Sun, Xinyue Zhang, Xinyi Wang, et al.
IEEE Transactions on Consumer Electronics (2023) Vol. 70, Iss. 1, pp. 1334-1341
Closed Access

STB: synthetic minority oversampling technique for tree-boosting models for imbalanced datasets of intrusion detection systems
Li-Hua Li, Ramli Ahmad, Radius Tanone, et al.
PeerJ Computer Science (2023) Vol. 9, pp. e1580-e1580
Open Access

Using Arduino Iot Modules As A Low Cost Environmental Research Monitoring System
Murad Magableh, Ziyad Marie, Rajina R. Mohamed, et al.
(2023), pp. 1-6
Closed Access

Current Problems and Proposed Solutions for the Electronic Commerce Sector
Hassan Al Wahshat, Riyad Al-Rousan, Wafa Abdulkarem Al-Haithami, et al.
(2023), pp. 1-6
Closed Access

Smart Cyber Intrusion Detection System Using Hyperparameter Tuned Deep Learning with Feature Subset Selection Model
Maysam Reyad Hadi, Ahmed R. Hassan, Ibraheem Hatem Mohammed, et al.
2022 5th International Conference on Engineering Technology and its Applications (IICETA) (2023), pp. 807-813
Closed Access

A New Method Based on Particle Swarm Optimization Algorithm to Improve Statistical Randomness Properties
Eyüp ERÖZ, Erkan Tanyıldızı, Fatih Özkaynak
(2023) Vol. 3, pp. 209-214
Closed Access

E-Learning: A Successful Learning Environment
Fayiz Momani, Amer Hatamleh, Wan Mohd Amir Fazamin Wan Hamzah, et al.
(2023), pp. 1-7
Closed Access

Cloud Computing in Smart Cities: Privacy, Ethical and Social Issues
Abdel Rahman Alkhazali, Ahmad M. Khasawneh, Sharaf Alzoubi, et al.
(2023), pp. 1-7
Closed Access

Previous Page - Page 2

Scroll to top