OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Enhancing network intrusion detection classifiers using supervised adversarial training
Chuanlong Yin, Yuefei Zhu, Shengli Liu, et al.
The Journal of Supercomputing (2019) Vol. 76, Iss. 9, pp. 6690-6719
Closed Access | Times Cited: 32

Showing 1-25 of 32 citing articles:

Deep Reinforcement Adversarial Learning Against Botnet Evasion Attacks
Giovanni Apruzzese, Mauro Andreolini, Mirco Marchetti, et al.
IEEE Transactions on Network and Service Management (2020) Vol. 17, Iss. 4, pp. 1975-1987
Open Access | Times Cited: 87

A GAN and Feature Selection-Based Oversampling Technique for Intrusion Detection
Xiaodong Liu, Tong Li, Runzi Zhang, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-15
Open Access | Times Cited: 49

A Novel Framework Design of Network Intrusion Detection Based on Machine Learning Techniques
Chongzhen Zhang, Yanli Chen, Yang Meng, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-15
Open Access | Times Cited: 44

Deep reinforcement learning based Evasion Generative Adversarial Network for botnet detection
Rizwan Hamid Randhawa, Nauman Aslam, Mohammad Alauthman, et al.
Future Generation Computer Systems (2023) Vol. 150, pp. 294-302
Open Access | Times Cited: 17

Evaluation of Supervised Machine Learning Algorithms for Multi-class Intrusion Detection Systems
Sanaa Kaddoura, Amal El Arid, Mirna Moukhtar
Lecture notes in networks and systems (2021), pp. 1-16
Closed Access | Times Cited: 16

Strengthening intrusion detection system for adversarial attacks: improved handling of imbalance classification problem
Chutipon Pimsarn, Tossapon Boongoen, Natthakan Iam-On, et al.
Complex & Intelligent Systems (2022) Vol. 8, Iss. 6, pp. 4863-4880
Open Access | Times Cited: 11

Evasion Generative Adversarial Network for Low Data Regimes
Rizwan Hamid Randhawa, Nauman Aslam, Mohammad Alauthman, et al.
IEEE Transactions on Artificial Intelligence (2022) Vol. 4, Iss. 5, pp. 1076-1088
Open Access | Times Cited: 9

A Stable Generative Adversarial Network Architecture for Network Intrusion Detection
Raha Soleymanzadeh, Rasha Kashef
(2022), pp. 9-15
Closed Access | Times Cited: 8

Investigating adversarial attacks against Random Forest-based network attack detection systems
Philippe Owezarski
NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium (2023), pp. 1-6
Open Access | Times Cited: 4

PANACEA: a neural model ensemble for cyber-threat detection
Malik AL-Essa, Giuseppina Andresini, Annalisa Appice, et al.
Machine Learning (2024) Vol. 113, Iss. 8, pp. 5379-5422
Open Access | Times Cited: 1

VINCENT: Cyber-threat detection through vision transformers and knowledge distillation
Luca Rose, Giuseppina Andresini, Annalisa Appice, et al.
Computers & Security (2024) Vol. 144, pp. 103926-103926
Open Access | Times Cited: 1

Evaluating the impact of generative adversarial models on the performance of anomaly intrusion detection
Mohammad Arafah, Iain Phillips, Asma Adnane
IET Networks (2023) Vol. 13, Iss. 1, pp. 28-44
Open Access | Times Cited: 3

XAI to Explore Robustness of Features in Adversarial Training for Cybersecurity
Malik AL-Essa, Giuseppina Andresini, Annalisa Appice, et al.
Lecture notes in computer science (2022), pp. 117-126
Closed Access | Times Cited: 5

Adversarial Machine Learning Attacks and Defenses in Network Intrusion Detection Systems
Amir F. Mukeri, D. P. Gaikwad
International Journal of Wireless and Microwave Technologies (2022) Vol. 12, Iss. 1, pp. 12-21
Open Access | Times Cited: 4

A Spatial-Spectral Classification Method Based on Deep Learning for Controlling Pelagic Fish Landings in Chile
Jorge E. Pezoa, D. Ramírez, Cristofher A. Godoy, et al.
Sensors (2023) Vol. 23, Iss. 21, pp. 8909-8909
Open Access | Times Cited: 2

Feature Selection using the Concept of Peafowl Mating in IDS
Partha Ghosh, Joy Sharma, Nilesh Pandey
International journal of Computer Networks & Communications (2024) Vol. 16, Iss. 1, pp. 51-69
Open Access

A Novel Approach of DDOS Attack Classification with Genetic Algorithm-optimized Spiking Neural Network
Anuradha Pawar, Nidhi Tiwari
International Journal of Computer Network and Information Security (2024) Vol. 16, Iss. 2, pp. 103-116
Open Access

An extreme gradient boost based classification and regression tree for network intrusion detection in IoT
Silpa Chalichalamala, Niranjana Govindan, Ramani Kasarapu
Bulletin of Electrical Engineering and Informatics (2024) Vol. 13, Iss. 3, pp. 1741-1751
Open Access

A Novel Distributed Tree-Based One-Hot Encoding (DTOHE) Technique for Intrusion Detection
K. Abirami, Jasmine Samraj
Lecture notes in electrical engineering (2024), pp. 631-648
Closed Access

A N-binary Classification and Grouping-based Approach to Improve the Performance of Anomaly Detection
Omkar Shende, R. K. Pateriya, Priyanka Verma
Arabian Journal for Science and Engineering (2021) Vol. 47, Iss. 2, pp. 1275-1287
Closed Access | Times Cited: 4

Introduction: imagining transatlantic slavery and abolition
J. R. Oldfield
Patterns of Prejudice (2007) Vol. 41, Iss. 3-4, pp. 239-243
Closed Access | Times Cited: 3

Stealth assessment strategy in distributed systems using optimal deep learning with game based learning
Dineshkumar Rajendran, S. Prasanna
The Journal of Supercomputing (2022) Vol. 78, Iss. 6, pp. 8285-8301
Closed Access | Times Cited: 2

Classification of Adversarial Attacks Using Ensemble Clustering Approach
Pongsakorn Tatongjai, Tossapon Boongoen, Natthakan Iam-On, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 74, Iss. 2, pp. 2479-2498
Open Access | Times Cited: 2

Page 1 - Next Page

Scroll to top