OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A novel fully convolutional neural network approach for detection and classification of attacks on industrial IoT devices in smart manufacturing systems
Mohammad Shahin, F. Frank Chen, Hamed Bouzary, et al.
The International Journal of Advanced Manufacturing Technology (2022) Vol. 123, Iss. 5-6, pp. 2017-2029
Open Access | Times Cited: 34

Showing 1-25 of 34 citing articles:

Using machine learning and deep learning algorithms for downtime minimization in manufacturing systems: an early failure detection diagnostic service
Mohammad Shahin, F. Frank Chen, Ali Hosseinzadeh, et al.
The International Journal of Advanced Manufacturing Technology (2023) Vol. 128, Iss. 9-10, pp. 3857-3883
Open Access | Times Cited: 33

A lightweight IoT intrusion detection model based on improved BERT-of-Theseus
Zhendong Wang, Jingfei Li, Shuxin Yang, et al.
Expert Systems with Applications (2023) Vol. 238, pp. 122045-122045
Closed Access | Times Cited: 30

A smartphone-based application for an early skin disease prognosis: Towards a lean healthcare system via computer-based vision
Mohammad Shahin, F. Frank Chen, Ali Hosseinzadeh, et al.
Advanced Engineering Informatics (2023) Vol. 57, pp. 102036-102036
Closed Access | Times Cited: 29

Harnessing customized AI to create voice of customer via GPT3.5
Mohammad Shahin, F. Frank Chen, Ali Hosseinzadeh
Advanced Engineering Informatics (2024) Vol. 61, pp. 102462-102462
Closed Access | Times Cited: 10

A novel approach to voice of customer extraction using GPT-3.5 Turbo: linking advanced NLP and Lean Six Sigma 4.0
Mohammad Shahin, F. Frank Chen, Ali Hosseinzadeh, et al.
The International Journal of Advanced Manufacturing Technology (2024) Vol. 131, Iss. 7-8, pp. 3615-3630
Open Access | Times Cited: 8

Improving operations through a lean AI paradigm: a view to an AI-aided lean manufacturing via versatile convolutional neural network
Mohammad Shahin, Mazdak Maghanaki, Ali Hosseinzadeh, et al.
The International Journal of Advanced Manufacturing Technology (2024) Vol. 133, Iss. 11-12, pp. 5343-5419
Closed Access | Times Cited: 8

Machine-based identification system via optical character recognition
Mohammad Shahin, F. Frank Chen, Ali Hosseinzadeh
Flexible Services and Manufacturing Journal (2023) Vol. 36, Iss. 2, pp. 453-480
Closed Access | Times Cited: 16

Deploying deep convolutional neural network to the battle against cancer: Towards flexible healthcare systems
Mohammad Shahin, F. Frank Chen, Ali Hosseinzadeh, et al.
Informatics in Medicine Unlocked (2024) Vol. 47, pp. 101494-101494
Open Access | Times Cited: 6

Robotics multi-modal recognition system via computer-based vision
Mohammad Shahin, F. Frank Chen, Ali Hosseinzadeh, et al.
The International Journal of Advanced Manufacturing Technology (2024)
Closed Access | Times Cited: 5

Waste reduction via image classification algorithms: beyond the human eye with an AI-based vision
Mohammad Shahin, F. Frank Chen, Ali Hosseinzadeh, et al.
International Journal of Production Research (2023) Vol. 62, Iss. 9, pp. 3193-3211
Closed Access | Times Cited: 15

Improving the Concrete Crack Detection Process via a Hybrid Visual Transformer Algorithm
Mohammad Shahin, F. Frank Chen, Mazdak Maghanaki, et al.
Sensors (2024) Vol. 24, Iss. 10, pp. 3247-3247
Open Access | Times Cited: 5

Advancing Network Security in Industrial IoT: A Deep Dive into AI-Enabled Intrusion Detection Systems
Mohammad Shahin, Mazdak Maghanaki, Ali Hosseinzadeh, et al.
Advanced Engineering Informatics (2024) Vol. 62, pp. 102685-102685
Closed Access | Times Cited: 5

Network Anomaly Detection Using Quantum Neural Networks on Noisy Quantum Computers
Alon Kukliansky, Marko Orescanin, Chad Bollmann, et al.
IEEE Transactions on Quantum Engineering (2024) Vol. 5, pp. 1-11
Open Access | Times Cited: 4

A predictive maintenance approach in manufacturing systems via AI-based early failure detection
Ali Hosseinzadeh, F. Frank Chen, Mohammad Shahin, et al.
Manufacturing Letters (2023) Vol. 35, pp. 1179-1186
Open Access | Times Cited: 12

DL-SkLSTM approach for cyber security threats detection in 5G enabled IIoT
Anjali Rajak, Rakesh Tripathi
International Journal of Information Technology (2023) Vol. 16, Iss. 1, pp. 13-20
Closed Access | Times Cited: 11

Using Machine Learning and Deep Learning Algorithms for Downtime Minimization in Manufacturing Systems: An Early Failure Detection Diagnostic Service
Mohammad Shahin, F. Frank Chen, Ali Hosseinzadeh, et al.
Research Square (Research Square) (2023)
Open Access | Times Cited: 8

Towards a sustainable future: developing a cybersecurity framework for manufacturing
Adel Alqudhaibi, S. P. Deshpande, Sandeep Jagtap, et al.
Technological Sustainability (2023) Vol. 2, Iss. 4, pp. 372-387
Open Access | Times Cited: 7

Deploying Convolutional Neural Network to reduce waste in production system
Mohammad Shahin, F. Frank Chen, Hamed Bouzary, et al.
Manufacturing Letters (2023) Vol. 35, pp. 1187-1195
Open Access | Times Cited: 5

Enhanced Safety Implementation in 5S+1 via Object Detection Algorithms
Mohammad Shahin, F. Frank Chen, Ali Hosseinzadeh, et al.
Research Square (Research Square) (2022)
Open Access | Times Cited: 8

Evaluating the fidelity of statistical forecasting and predictive intelligence by utilizing a stochastic dataset
Mohammad Shahin, F. Frank Chen, Mazdak Maghanaki, et al.
The International Journal of Advanced Manufacturing Technology (2024)
Closed Access | Times Cited: 1

Adapting the GPT engine for proactive customer insight extraction in product development
Mohammad Shahin, F. Frank Chen, Mazdak Maghanaki, et al.
Manufacturing Letters (2024) Vol. 41, pp. 1376-1385
Closed Access | Times Cited: 1

Waste Reduction via Computer Vision-based Inspection: Towards Lean Systems in Metal Production
Mohammad Shahin, F. Frank Chen, Ali Hosseinzadeh, et al.
Research Square (Research Square) (2023)
Open Access | Times Cited: 3

A Comparative Performance Study of Support Vector Machine, KNN, and Ensemble Classifiers on through-wall human detection Dataset
Jiya Adama Enoch, Ilesanmi B. Oluwafemi, Olulope K. Paul, et al.
(2023)
Closed Access | Times Cited: 3

Transfer Fuzzy Learning enabled Streebog Cryptographic Substitution Permutation based zero trust security in IIOT
Anamika Singh, Rajesh Kumar Dhanaraj, Md. Akkas Ali, et al.
Alexandria Engineering Journal (2023) Vol. 81, pp. 449-459
Open Access | Times Cited: 3

A Novel Transformer-Based Model for Comprehensive Text-Aware Service Composition in Cloud-Based Manufacturing
Hamed Bouzary, F. Frank Chen, Mazdak Maghanaki, et al.
(2023)
Closed Access | Times Cited: 2

Page 1 - Next Page

Scroll to top