OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

An efficient XGBoost–DNN-based classification model for network intrusion detection system
D Preethi, Neelu Khare
Neural Computing and Applications (2020) Vol. 32, Iss. 16, pp. 12499-12514
Closed Access | Times Cited: 214

Showing 51-75 of 214 citing articles:

Detection of areas prone to flood-induced landslides risk using certainty factor and its hybridization with FAHP, XGBoost and deep learning neural network
Romulus Costache, Sk Ajim Ali, Farhana Parvin, et al.
Geocarto International (2021) Vol. 37, Iss. 25, pp. 7303-7338
Closed Access | Times Cited: 31

Host-Based Intrusion Detection Model Using Siamese Network
Daekyeong Park, Sang Soo Kim, Hyuk-Jin Kwon, et al.
IEEE Access (2021) Vol. 9, pp. 76614-76623
Open Access | Times Cited: 30

A data-driven modelling and optimization framework for variable-thickness integrally stiffened shells
Hongqing Li, Zengcong Li, Zhizhong Cheng, et al.
Aerospace Science and Technology (2022) Vol. 129, pp. 107839-107839
Closed Access | Times Cited: 21

Contour-enhanced CycleGAN framework for style transfer from scenery photos to Chinese landscape paintings
Xianlin Peng, Shenglin Peng, Qiyao Hu, et al.
Neural Computing and Applications (2022) Vol. 34, Iss. 20, pp. 18075-18096
Closed Access | Times Cited: 20

A Fully Streaming Big Data Framework for Cyber Security Based on Optimized Deep Learning Algorithm
Noha Hussen, Sally M. Elghamrawy, Mofreh Salem, et al.
IEEE Access (2023) Vol. 11, pp. 65675-65688
Open Access | Times Cited: 12

Vibration signal-based defect detection method for railway signal relay using parameter-optimized VMD and ensemble feature selection
Minhao Zhang, Yuan Cao, Yongkui Sun, et al.
Control Engineering Practice (2023) Vol. 139, pp. 105630-105630
Closed Access | Times Cited: 12

Investigating Generalized Performance of Data-Constrained Supervised Machine Learning Models on Novel, Related Samples in Intrusion Detection
Laurens D’hooge, Miel Verkerken, Tim Wauters, et al.
Sensors (2023) Vol. 23, Iss. 4, pp. 1846-1846
Open Access | Times Cited: 11

Machine learning for fatigue lifetime predictions in 3D-printed polylactic acid biomaterials based on interpretable extreme gradient boosting model
Hamid Nasiri, Ali Dadashi, Mohammad Azadi
Materials Today Communications (2024) Vol. 39, pp. 109054-109054
Closed Access | Times Cited: 4

Dual replay memory reinforcement learning framework for minority attack detection
Ankit Sharma, Manjeet Singh
Engineering Applications of Artificial Intelligence (2025) Vol. 144, pp. 110083-110083
Closed Access

Semi-asynchronous federated learning-based privacy-preserving intrusion detection for advanced metering infrastructure
Zhuoqun Xia, Hongmei Zhou, Zhenzhen Hu, et al.
International Journal of Critical Infrastructure Protection (2025) Vol. 49, pp. 100742-100742
Closed Access

Systems classification of air pollutants using Adam optimized CNN with XGBoost feature selection
Satya Prakash, K. Sangeetha
Analog Integrated Circuits and Signal Processing (2025) Vol. 122, Iss. 3
Closed Access

Intrusion defense: Leveraging ant colony optimization for enhanced multi-optimization in network security
Chetan Gupta, Amit Kumar, Neelesh Kumar Jain
Peer-to-Peer Networking and Applications (2025) Vol. 18, Iss. 2
Closed Access

FC-Trans: Deep learning methods for network intrusion detection in big data environments
Yuedi Zhu, Yong Wang, Lin Zhou, et al.
Computers & Security (2025), pp. 104392-104392
Closed Access

Mapping Urban Flood Hazard Using Extreme Gradient Boosting and Random Forest
Maelaynayn El baida, Farid Boushaba, Mimoun Chourak, et al.
Advances in Science, Technology & Innovation/Advances in science, technology & innovation (2025), pp. 3-10
Closed Access

Explainable AI‐Driven Firewall Evaluation: Empowering Cybersecurity Decision‐Making for Optimal Network Defense
Zaheen Fatima, R. Jahir Hussain, Azhar Dilshad, et al.
Security and Privacy (2025) Vol. 8, Iss. 3
Closed Access

Deep Learning-Driven Behavioral Analysis for Real-Time Threat Detection and Classification in Network Traffic
G. Nagaraju, Sridhar Gujjeti, M. Varaprasad Rao, et al.
International Journal of Electrical and Electronics Research (2025) Vol. 13, Iss. 1, pp. 80-88
Open Access

The role of machine and deep learning in modern intrusion detection systems: A comprehensive review
Uday Chandra Akuthota, Lava Bhargava
Computers & Electrical Engineering (2025) Vol. 124, pp. 110318-110318
Closed Access

Analyzing fusion of regularization techniques in the deep learning‐based intrusion detection system
Ankit Thakkar, Ritika Lohiya
International Journal of Intelligent Systems (2021) Vol. 36, Iss. 12, pp. 7340-7388
Open Access | Times Cited: 26

Efficient intrusion detection using multi-player generative adversarial networks (GANs): an ensemble-based deep learning architecture
Raha Soleymanzadeh, Rasha Kashef
Neural Computing and Applications (2023) Vol. 35, Iss. 17, pp. 12545-12563
Closed Access | Times Cited: 10

Preliminary development of machine learning-based error correction model for low-fidelity reactor physics simulation
Muhammad Rizki Oktavian, J. Nistor, J.T. Gruenwald, et al.
Annals of Nuclear Energy (2023) Vol. 187, pp. 109788-109788
Closed Access | Times Cited: 9

Few-shot IoT attack detection based on SSDSAE and adaptive loss weighted meta residual network
Wengang Ma, Liang Ma, Kehong Li, et al.
Information Fusion (2023) Vol. 98, pp. 101853-101853
Closed Access | Times Cited: 9

Forecasting International Stock Market Trends: XGBoost, LSTM, LSTM-XGBoost, and Backtesting XGBoost Models
Hassan Oukhouya, Hamza Kadiri, Khalid El Himdi, et al.
Statistics Optimization & Information Computing (2023) Vol. 12, Iss. 1, pp. 200-209
Open Access | Times Cited: 9

Rapid Forecasting of Cyber Events Using Machine Learning-Enabled Features
Yussuf Ahmed, Muhammad Ajmal Azad, A. Taufiq Asyhari
Information (2024) Vol. 15, Iss. 1, pp. 36-36
Open Access | Times Cited: 3

Deep Learning for Intelligent Demand Response and Smart Grids: A Comprehensive Survey
B. Prabadevi, Quoc‐Viet Pham, Madhusanka Liyanage, et al.
arXiv (Cornell University) (2021)
Open Access | Times Cited: 22

DDoS Attack Detection in Cloud Computing Based on Ensemble Feature Selection and Deep Learning
Yousef Sanjalawe, Turke Althobaiti
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 75, Iss. 2, pp. 3571-3588
Open Access | Times Cited: 8

Scroll to top