
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
AI-Powered Vulnerability Detection for Secure Source Code Development
Sampath Rajapaksha, Janaka Senanayake, Harsha Kalutarage, et al.
Lecture notes in computer science (2023), pp. 275-288
Closed Access | Times Cited: 7
Sampath Rajapaksha, Janaka Senanayake, Harsha Kalutarage, et al.
Lecture notes in computer science (2023), pp. 275-288
Closed Access | Times Cited: 7
Showing 7 citing articles:
Defendroid: Real-time Android code vulnerability detection via blockchain federated neural network with XAI
Janaka Senanayake, Harsha Kalutarage, Andrei Petrovski, et al.
Journal of Information Security and Applications (2024) Vol. 82, pp. 103741-103741
Open Access | Times Cited: 5
Janaka Senanayake, Harsha Kalutarage, Andrei Petrovski, et al.
Journal of Information Security and Applications (2024) Vol. 82, pp. 103741-103741
Open Access | Times Cited: 5
Question–Answer Methodology for Vulnerable Source Code Review via Prototype-Based Model-Agnostic Meta-Learning
Pablo Corona-Fraga, Aldo Hernandez-Suarez, Gabriel Sanchez-Perez, et al.
Future Internet (2025) Vol. 17, Iss. 1, pp. 33-33
Open Access
Pablo Corona-Fraga, Aldo Hernandez-Suarez, Gabriel Sanchez-Perez, et al.
Future Internet (2025) Vol. 17, Iss. 1, pp. 33-33
Open Access
AI-Powered Solutions in Computer Science: A Comprehensive COPRAS Evaluation
(2025) Vol. 3, Iss. 1, pp. 70-81
Closed Access
(2025) Vol. 3, Iss. 1, pp. 70-81
Closed Access
Android Code Vulnerabilities Early Detection Using AI-Powered ACVED Plugin
Janaka Senanayake, Harsha Kalutarage, M. Omar Al-Kadri, et al.
Lecture notes in computer science (2023), pp. 339-357
Closed Access | Times Cited: 5
Janaka Senanayake, Harsha Kalutarage, M. Omar Al-Kadri, et al.
Lecture notes in computer science (2023), pp. 339-357
Closed Access | Times Cited: 5
Understanding the Potential of AI-Powered Image Recognition Systems for Real-Time Applications
R. Kamalraj, P. Gajendran, S. Rathika, et al.
(2023), pp. 1-5
Closed Access | Times Cited: 2
R. Kamalraj, P. Gajendran, S. Rathika, et al.
(2023), pp. 1-5
Closed Access | Times Cited: 2
FedREVAN: Real-time DEtection of Vulnerable Android Source Code Through Federated Neural Network with XAI
Janaka Senanayake, Harsha Kalutarage, Andrei Petrovski, et al.
Lecture notes in computer science (2024), pp. 426-441
Closed Access
Janaka Senanayake, Harsha Kalutarage, Andrei Petrovski, et al.
Lecture notes in computer science (2024), pp. 426-441
Closed Access
Enhancing Security Assurance in Software Development: AI-Based Vulnerable Code Detection with Static Analysis
Sampath Rajapaksha, Janaka Senanayake, Harsha Kalutarage, et al.
Lecture notes in computer science (2024), pp. 341-356
Closed Access
Sampath Rajapaksha, Janaka Senanayake, Harsha Kalutarage, et al.
Lecture notes in computer science (2024), pp. 341-356
Closed Access