
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Fully Privacy-Preserving Solution for Anomaly Detection in IoT using Federated Learning and Homomorphic Encryption
Marco Arazzi, Serena Nicolazzo, Antonino Nocera
Information Systems Frontiers (2023)
Open Access | Times Cited: 13
Marco Arazzi, Serena Nicolazzo, Antonino Nocera
Information Systems Frontiers (2023)
Open Access | Times Cited: 13
Showing 13 citing articles:
Privacy-preserving in Blockchain-based Federated Learning systems
Sameera K.M., Serena Nicolazzo, Marco Arazzi, et al.
Computer Communications (2024) Vol. 222, pp. 38-67
Open Access | Times Cited: 15
Sameera K.M., Serena Nicolazzo, Marco Arazzi, et al.
Computer Communications (2024) Vol. 222, pp. 38-67
Open Access | Times Cited: 15
Privacy-Preserving Network Traffic Analysis Using Homomorphic Encryption
Sanjaikanth E Vadakkethil Somanathan Pillai, Kiran Polimetla
(2024), pp. 1-6
Closed Access | Times Cited: 9
Sanjaikanth E Vadakkethil Somanathan Pillai, Kiran Polimetla
(2024), pp. 1-6
Closed Access | Times Cited: 9
Anomaly Detection in Blockchain Networks Using Unsupervised Learning: A Survey
Christos Cholevas, Eftychia Angeli, Zacharoula Sereti, et al.
Algorithms (2024) Vol. 17, Iss. 5, pp. 201-201
Open Access | Times Cited: 9
Christos Cholevas, Eftychia Angeli, Zacharoula Sereti, et al.
Algorithms (2024) Vol. 17, Iss. 5, pp. 201-201
Open Access | Times Cited: 9
Positional Packet Capture for Anomaly Detection in Multitenant Virtual Networks
Daniel Spiekermann
International Journal of Network Management (2025) Vol. 35, Iss. 2
Open Access
Daniel Spiekermann
International Journal of Network Management (2025) Vol. 35, Iss. 2
Open Access
A defense mechanism against label inference attacks in vertical federated learning
Marco Arazzi, Serena Nicolazzo, Antonino Nocera
Neurocomputing (2025), pp. 129476-129476
Open Access
Marco Arazzi, Serena Nicolazzo, Antonino Nocera
Neurocomputing (2025), pp. 129476-129476
Open Access
LSTM-JSO framework for privacy preserving adaptive intrusion detection in federated IoT networks
Shaymaa E. Sorour, Mohammed Aljaafari, Amany Mohamed Shaker, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Shaymaa E. Sorour, Mohammed Aljaafari, Amany Mohamed Shaker, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
A Comprehensive Investigation of Anomaly Detection Methods in Deep Learning and Machine Learning: 2019–2023
Shalini Kumari, Chander Prabha, Asif Karim, et al.
IET Information Security (2024) Vol. 2024, Iss. 1
Open Access | Times Cited: 2
Shalini Kumari, Chander Prabha, Asif Karim, et al.
IET Information Security (2024) Vol. 2024, Iss. 1
Open Access | Times Cited: 2
A deep reinforcement learning approach for security-aware service acquisition in IoT
Marco Arazzi, Serena Nicolazzo, Antonino Nocera
Journal of Information Security and Applications (2024) Vol. 85, pp. 103856-103856
Open Access | Times Cited: 1
Marco Arazzi, Serena Nicolazzo, Antonino Nocera
Journal of Information Security and Applications (2024) Vol. 85, pp. 103856-103856
Open Access | Times Cited: 1
Applying AI in the Area of Automation Systems: Overview and Challenges
Tullio Facchinetti, Howard Li, Antonino Nocera, et al.
2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA) (2024) Vol. 3, pp. 1-8
Closed Access | Times Cited: 1
Tullio Facchinetti, Howard Li, Antonino Nocera, et al.
2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA) (2024) Vol. 3, pp. 1-8
Closed Access | Times Cited: 1
Privacy-Preserving in Blockchain-based Federated Learning Systems
K. M. Sameera, Serena Nicolazzo, Marco Arazzi, et al.
arXiv (Cornell University) (2024)
Open Access
K. M. Sameera, Serena Nicolazzo, Marco Arazzi, et al.
arXiv (Cornell University) (2024)
Open Access
SeCTIS: A framework to Secure CTI Sharing
Dincy R. Arikkat, Mert Cihangiroglu, Mauro Conti, et al.
Future Generation Computer Systems (2024), pp. 107562-107562
Open Access
Dincy R. Arikkat, Mert Cihangiroglu, Mauro Conti, et al.
Future Generation Computer Systems (2024), pp. 107562-107562
Open Access
Privacy-Preserving Federated Learning for Intrusion Detection in IoT Environments: A Survey
Abhishek Vyas, Po‐Ching Lin, Ren‐Hung Hwang, et al.
IEEE Access (2024) Vol. 12, pp. 127018-127050
Open Access
Abhishek Vyas, Po‐Ching Lin, Ren‐Hung Hwang, et al.
IEEE Access (2024) Vol. 12, pp. 127018-127050
Open Access
Chaotic Sparrow Search Algorithm with Deep Learning for Anomaly Detection in Internet of Things
Ibraheem Hatem Mohammed, Bura Vijay Kumar, Bukya Mohan Babu, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 1
Ibraheem Hatem Mohammed, Bura Vijay Kumar, Bukya Mohan Babu, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 1