OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Hyperparameter search based convolution neural network with Bi-LSTM model for intrusion detection system in multimedia big data environment
Irina V. Pustokhina, Denis A. Pustokhin, E. Laxmi Lydia, et al.
Multimedia Tools and Applications (2021) Vol. 81, Iss. 24, pp. 34951-34968
Closed Access | Times Cited: 24

Showing 24 citing articles:

Robust LSTM With Tuned-PSO and Bifold-Attention Mechanism for Analyzing Multivariate Time-Series
Andri Pranolo, Yingchi Mao, Aji Prasetya Wibawa, et al.
IEEE Access (2022) Vol. 10, pp. 78423-78434
Open Access | Times Cited: 37

Ant colony based optimization model for QoS-based task scheduling in cloud computing environment
Neetu Sharma, Sonal, Puneet Garg
Measurement Sensors (2022) Vol. 24, pp. 100531-100531
Closed Access | Times Cited: 32

Network intrusion detection: An optimized deep learning approach using big data analytics
D. Suja Mary, L. Jaya Singh Dhas, A. Deepa, et al.
Expert Systems with Applications (2024) Vol. 251, pp. 123919-123919
Closed Access | Times Cited: 5

Automated door with password-based lock
Monika Dhiman, Rakesh Rajpal, Amrit Kaur Saggu, et al.
AIP conference proceedings (2025) Vol. 3224, pp. 020029-020029
Closed Access

Research on Dung Beetle Optimization Based Stacked Sparse Autoencoder for Network Situation Element Extraction
Yongchao Yang, Pan Zhao
IEEE Access (2024) Vol. 12, pp. 24014-24026
Open Access | Times Cited: 3

Network Intrusion Detection Systems: A Systematic Literature Review o f Hybrid Deep Learning Approaches
Stephen Kahara Wanjau, Geoffrey Mariga Wambugu, Aaron Mogeni Oirere
International Journal of Emerging Science and Engineering (2022) Vol. 10, Iss. 7, pp. 1-16
Open Access | Times Cited: 15

Analysis of Hybrid Deep Learning Models for Efficient Intrusion Detection
Bachu Ganesh, S. Sridevi
(2023)
Closed Access | Times Cited: 8

From linguistic features to their extractions: Understanding the semantics of a concept
Chandni Maggo, Puneet Garg
2022 Fifth International Conference on Computational Intelligence and Communication Technologies (CCICT) (2022), pp. 427-431
Closed Access | Times Cited: 12

A Smart Spotify Assistance and Recommendation System
Keshav Allawadi, Charvi Vij
(2023), pp. 286-291
Closed Access | Times Cited: 4

An Intrusion Detection Approach using Hierarchical Deep Learning-based Butterfly Optimization Algorithm in Big Data Platform
Manoranjithem, S. Dhanasekaran, Anju Asokan, et al.
(2023), pp. 212-216
Closed Access | Times Cited: 2

Optimal Fuzzy Logic Enabled Intrusion Detection for Secure IoT-Cloud燛nvironment
Fatma S. Alrayes, Nuha Alshuqayran, Mohamed K. Nour, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 74, Iss. 3, pp. 6737-6753
Open Access | Times Cited: 3

Optimized deep autoencoder and BiLSTM for intrusion detection in IoTs-Fog computing
Abdullah Alqahtani
Multimedia Tools and Applications (2024)
Closed Access

Forecast of Students’ Mental Health Combining an Artificial Intelligence Technique and Fuzzy Inference System
Lakshmana Kumar Ramasamy, Firoz Khan, Shanmugan Joghee, et al.
(2024) Vol. 28, pp. 85-90
Closed Access

Hyperparameter elegance: fine-tuning text analysis with enhanced genetic algorithm hyperparameter landscape
Gyananjaya Tripathy, Aakanksha Sharaff
Knowledge and Information Systems (2024) Vol. 66, Iss. 11, pp. 6761-6783
Closed Access

Pneumonia Detection Through X-Ray Images Using Convolution Neural Network
Puneet Garg, Akhilesh Kumar Srivastava, Anas Anas, et al.
Advances in medical technologies and clinical practice book series (2023), pp. 201-218
Closed Access | Times Cited: 1

Pneumonia Detection Using Convolution Neural Network
Anas Anas, Bhavye Gupta, Chirag Mishra, et al.
(2023), pp. 48-53
Closed Access | Times Cited: 1

Spotted Hyena Optimizer with Deep Learning Driven Cybersecurity for Social Networks
Anwer Mustafa Hilal, Aisha Hassan Abdalla Hashim, Heba G. Mohamed, et al.
Computer Systems Science and Engineering (2022) Vol. 45, Iss. 2, pp. 2033-2047
Open Access | Times Cited: 2

Feature Selection with Stacked Autoencoder Based Intrusion Detection in Drones Environment
Heba G. Mohamed, Saud S. Alotaibi, Majdy M. Eltahir, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 73, Iss. 3, pp. 5441-5458
Open Access | Times Cited: 1

Human Emotion Recognition using Deep Learning
Anand Prakash Chaudhary, Ankit Mishra, Kumar Dilip, et al.
(2023), pp. 191-197
Closed Access

Symbiotic Organisms Search with Deep Learning Driven Biomedical Osteosarcoma Detection and Classification
Abdullah Basahel, Bohari M. Yamin, Sulafah M. Basahel, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 75, Iss. 1, pp. 133-148
Open Access

Blockchain-based Model for Secure and Trusted IoT System
Rajesh Kumar, Rewa Sharma
(2023), pp. 743-750
Closed Access

Optimal Bottleneck-Driven Deep Belief Network Enabled Malware Classification on IoT-Cloud Environment
Mohammed Maray, Hamed Alqahtani, Saud S. Alotaibi, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 74, Iss. 2, pp. 3101-3115
Open Access

Page 1

Scroll to top