
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Survey on Machine Learning-Based Misbehavior Detection Systems for 5G and Beyond Vehicular Networks
Abdelwahab Boualouache, Thomas Engel
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 2, pp. 1128-1172
Open Access | Times Cited: 60
Abdelwahab Boualouache, Thomas Engel
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 2, pp. 1128-1172
Open Access | Times Cited: 60
Showing 26-50 of 60 citing articles:
A Survey on Privacy-Preserving Electronic Toll Collection Schemes for Intelligent Transportation Systems
Amirhossein Adavoudi Jolfaei, Abdelwahab Boualouache, Andy Rupp, et al.
IEEE Transactions on Intelligent Transportation Systems (2023) Vol. 24, Iss. 9, pp. 8945-8962
Closed Access | Times Cited: 5
Amirhossein Adavoudi Jolfaei, Abdelwahab Boualouache, Andy Rupp, et al.
IEEE Transactions on Intelligent Transportation Systems (2023) Vol. 24, Iss. 9, pp. 8945-8962
Closed Access | Times Cited: 5
FLID: Intrusion Attack and Defense Mechanism for Federated Learning Empowered Connected Autonomous Vehicles (CAVs) Application
Md Zarif Hossain, Ahmed Imteaj, Saika Zaman, et al.
(2023), pp. 1-8
Closed Access | Times Cited: 5
Md Zarif Hossain, Ahmed Imteaj, Saika Zaman, et al.
(2023), pp. 1-8
Closed Access | Times Cited: 5
Securing 5G Positioning via Zero Trust Architecture
Razy Youhana Adam, Weizhi Meng
Lecture notes in computer science (2024), pp. 563-578
Closed Access | Times Cited: 1
Razy Youhana Adam, Weizhi Meng
Lecture notes in computer science (2024), pp. 563-578
Closed Access | Times Cited: 1
Novel Intelligent BSM Falsification Attack Detection System Using Trusted Neighbor Vehicle Approach in IoV
Hussaini Aliyu Idris, Kazunori Ueda, Bassem Mokhtar, et al.
International Journal of Computing (2024), pp. 116-125
Open Access | Times Cited: 1
Hussaini Aliyu Idris, Kazunori Ueda, Bassem Mokhtar, et al.
International Journal of Computing (2024), pp. 116-125
Open Access | Times Cited: 1
Reinforcement learning based blockchain model for revoking unauthorized access in Virtualized Network Functions ‐based Internet of Things Mobile Edge Computing
C. T. Kalaivani, R. Renugadevi, Jeffin Gracewell, et al.
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 5
Closed Access | Times Cited: 1
C. T. Kalaivani, R. Renugadevi, Jeffin Gracewell, et al.
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 5
Closed Access | Times Cited: 1
A Superalignment Framework in Autonomous Driving with Large Language Models
Xiangrui Kong, Thomas Bräunl, Marco Fahmi, et al.
2022 IEEE Intelligent Vehicles Symposium (IV) (2024), pp. 1715-1720
Open Access | Times Cited: 1
Xiangrui Kong, Thomas Bräunl, Marco Fahmi, et al.
2022 IEEE Intelligent Vehicles Symposium (IV) (2024), pp. 1715-1720
Open Access | Times Cited: 1
Misbehavior detection system with semi-supervised federated learning
Edy Kristianto, Po‐Ching Lin, Ren‐Hung Hwang
Vehicular Communications (2023) Vol. 41, pp. 100597-100597
Closed Access | Times Cited: 3
Edy Kristianto, Po‐Ching Lin, Ren‐Hung Hwang
Vehicular Communications (2023) Vol. 41, pp. 100597-100597
Closed Access | Times Cited: 3
DDoS Attacks Mitigation in 5G-V2X Networks: A Reinforcement Learning-Based Approach
Badre Bousalem, Mohamed Anis Sakka, Vinicius F. Silva, et al.
(2023), pp. 1-5
Open Access | Times Cited: 3
Badre Bousalem, Mohamed Anis Sakka, Vinicius F. Silva, et al.
(2023), pp. 1-5
Open Access | Times Cited: 3
Assessing the Impact of Attacks on an Automotive Ethernet Time Synchronization Testbed
Mahdi Fotouhi, Alessio Buscemi, Abdelwahab Boualouache, et al.
(2023), pp. 223-230
Open Access | Times Cited: 2
Mahdi Fotouhi, Alessio Buscemi, Abdelwahab Boualouache, et al.
(2023), pp. 223-230
Open Access | Times Cited: 2
A Lightweight 5G-V2X Intra-Slice Intrusion Detection System Using Knowledge Distillation
Shajjad Hossain, Abdelwahab Boualouache, Bouziane Brik, et al.
ICC 2022 - IEEE International Conference on Communications (2023), pp. 1112-1117
Open Access | Times Cited: 2
Shajjad Hossain, Abdelwahab Boualouache, Bouziane Brik, et al.
ICC 2022 - IEEE International Conference on Communications (2023), pp. 1112-1117
Open Access | Times Cited: 2
Effective preprocessing and feature analysis on Twitter data for Fake news detection using RWS algorithm
M Santhoshkumar, V. Divya
ICST Transactions on Scalable Information Systems (2024) Vol. 11, Iss. 5
Open Access
M Santhoshkumar, V. Divya
ICST Transactions on Scalable Information Systems (2024) Vol. 11, Iss. 5
Open Access
Time-efficient detection of false position attack in 5G and beyond vehicular networks
Taki Eddine Toufik Djaidja, Bouziane Brik, Abdelwahab Boualouache, et al.
Computer Networks (2024) Vol. 247, pp. 110461-110461
Closed Access
Taki Eddine Toufik Djaidja, Bouziane Brik, Abdelwahab Boualouache, et al.
Computer Networks (2024) Vol. 247, pp. 110461-110461
Closed Access
Machine Learning Based Misbehavior Detection System for False Data Injection Attack in Internet of Vehicles Using Neighbor Public Transport Vehicle Approach
Hussaini Aliyu Idris, Kazunori Ueda, Bassem Mokhtar, et al.
International Journal of Computer Networks And Applications (2024) Vol. 11, Iss. 2, pp. 140-140
Open Access
Hussaini Aliyu Idris, Kazunori Ueda, Bassem Mokhtar, et al.
International Journal of Computer Networks And Applications (2024) Vol. 11, Iss. 2, pp. 140-140
Open Access
Investigation of Security Threat Datasets for Intra- and Inter-Vehicular Environments
Achref Haddaji, Samiha Ayed, Lamia Chaari Fourati, et al.
Sensors (2024) Vol. 24, Iss. 11, pp. 3431-3431
Open Access
Achref Haddaji, Samiha Ayed, Lamia Chaari Fourati, et al.
Sensors (2024) Vol. 24, Iss. 11, pp. 3431-3431
Open Access
Suspicious activities detection using spatial–temporal features based on vision transformer and recurrent neural network
Saba Hameed, Javeria Amin, Muhammad Almas Anjum, et al.
Journal of Ambient Intelligence and Humanized Computing (2024) Vol. 15, Iss. 9, pp. 3379-3391
Closed Access
Saba Hameed, Javeria Amin, Muhammad Almas Anjum, et al.
Journal of Ambient Intelligence and Humanized Computing (2024) Vol. 15, Iss. 9, pp. 3379-3391
Closed Access
Integrating Machine Learning Models into the Linux Kernel: Opportunities and Challenges
Jorge Gallego-Madrid, Irene Bru-Santa, Ramón Sánchez-Iborra, et al.
Communications in computer and information science (2024), pp. 209-219
Closed Access
Jorge Gallego-Madrid, Irene Bru-Santa, Ramón Sánchez-Iborra, et al.
Communications in computer and information science (2024), pp. 209-219
Closed Access
Overview of Vehicular Resource Allocation: Review and Future Directions
Raouia Bouabdallah, Fairouz Fakhfakh, Faten Fakhfakh
Lecture notes in networks and systems (2024), pp. 267-276
Closed Access
Raouia Bouabdallah, Fairouz Fakhfakh, Faten Fakhfakh
Lecture notes in networks and systems (2024), pp. 267-276
Closed Access
Anomaly Detection in 5G using Variational Autoencoders
Amanul Islam, Sang‐Yoon Chang, Jinoh Kim, et al.
(2024), pp. 1-6
Closed Access
Amanul Islam, Sang‐Yoon Chang, Jinoh Kim, et al.
(2024), pp. 1-6
Closed Access
AACS: A Secure Attribute Based Data Access Control for Cloud-Aided Internet of Vehicles Using SGX
Wei Wei, Saiyu Qi, Xu Yang, et al.
IEEE Transactions on Vehicular Technology (2024) Vol. 74, Iss. 2, pp. 2032-2047
Closed Access
Wei Wei, Saiyu Qi, Xu Yang, et al.
IEEE Transactions on Vehicular Technology (2024) Vol. 74, Iss. 2, pp. 2032-2047
Closed Access
A Fuzzy-Based Greedy Behaviour Attack Detection Approach in VANETs
Tayssir Ismail, Nasreddine Hajlaoui, Haifa Touati, et al.
SN Computer Science (2024) Vol. 5, Iss. 7
Closed Access
Tayssir Ismail, Nasreddine Hajlaoui, Haifa Touati, et al.
SN Computer Science (2024) Vol. 5, Iss. 7
Closed Access
Enhancing V2X Security Through Combined Rule-Based and DL-Based Local Misbehavior Detection in Roadside Units
Seung‐Young Park, Dong‐Hyun Kim, Seokwoo Lee
IEEE Open Journal of Intelligent Transportation Systems (2024) Vol. 5, pp. 656-668
Open Access
Seung‐Young Park, Dong‐Hyun Kim, Seokwoo Lee
IEEE Open Journal of Intelligent Transportation Systems (2024) Vol. 5, pp. 656-668
Open Access
IoVST: An anomaly detection method for IoV based on spatiotemporal feature fusion
Jinhui Cao, Xiaoqiang Di, Jinqing Li, et al.
Future Generation Computer Systems (2024), pp. 107636-107636
Closed Access
Jinhui Cao, Xiaoqiang Di, Jinqing Li, et al.
Future Generation Computer Systems (2024), pp. 107636-107636
Closed Access
A Survey on Deep Learning in Edge-Cloud Collaboration: Model Partitioning, Privacy Preservation, and Prospects
Xichen Zhang, Roozbeh Razavi–Far, Haruna Isah, et al.
(2024)
Closed Access
Xichen Zhang, Roozbeh Razavi–Far, Haruna Isah, et al.
(2024)
Closed Access
Enhancing 5G Security Using Hybrid Learning Approach for Malware Detection and Classification
E. Murugavalli, K. Rajeswari, V. Vinoth Thyagarajan, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 113-142
Closed Access
E. Murugavalli, K. Rajeswari, V. Vinoth Thyagarajan, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 113-142
Closed Access
Towards 6G vehicular networks: Vision, technologies, and open challenges
Ping Lang, Daxin Tian, Xu Han, et al.
Computer Networks (2024), pp. 110916-110916
Closed Access
Ping Lang, Daxin Tian, Xu Han, et al.
Computer Networks (2024), pp. 110916-110916
Closed Access