
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
TL-CNN-IDS: transfer learning-based intrusion detection system using convolutional neural network
Fengru Yan, Guanghua Zhang, Dongwen Zhang, et al.
The Journal of Supercomputing (2023) Vol. 79, Iss. 15, pp. 17562-17584
Closed Access | Times Cited: 21
Fengru Yan, Guanghua Zhang, Dongwen Zhang, et al.
The Journal of Supercomputing (2023) Vol. 79, Iss. 15, pp. 17562-17584
Closed Access | Times Cited: 21
Showing 21 citing articles:
DTL-IDS: An optimized Intrusion Detection Framework using Deep Transfer Learning and Genetic Algorithm
Shahid Latif, Wadii Boulila, Anis Koubâa, et al.
Journal of Network and Computer Applications (2023) Vol. 221, pp. 103784-103784
Open Access | Times Cited: 40
Shahid Latif, Wadii Boulila, Anis Koubâa, et al.
Journal of Network and Computer Applications (2023) Vol. 221, pp. 103784-103784
Open Access | Times Cited: 40
Hyperparameter Optimization for 1D-CNN-Based Network Intrusion Detection Using GA and PSO
Dusmurod Kilichev, Wooseong Kim
Mathematics (2023) Vol. 11, Iss. 17, pp. 3724-3724
Open Access | Times Cited: 35
Dusmurod Kilichev, Wooseong Kim
Mathematics (2023) Vol. 11, Iss. 17, pp. 3724-3724
Open Access | Times Cited: 35
Securing IoT Networks Against DDoS Attacks: A Hybrid Deep Learning Approach
Noor Ul Ain, Muhammad Sardaraz, Muhammad Tahir, et al.
Sensors (2025) Vol. 25, Iss. 5, pp. 1346-1346
Open Access
Noor Ul Ain, Muhammad Sardaraz, Muhammad Tahir, et al.
Sensors (2025) Vol. 25, Iss. 5, pp. 1346-1346
Open Access
Optimizing vehicle security: A Multiclassification framework using deep transfer learning and metaheuristic-based genetic algorithm optimization
Hamad Naeem, Farhan Ullah, Ondřej Krejcar, et al.
International Journal of Critical Infrastructure Protection (2025), pp. 100745-100745
Closed Access
Hamad Naeem, Farhan Ullah, Ondřej Krejcar, et al.
International Journal of Critical Infrastructure Protection (2025), pp. 100745-100745
Closed Access
HiViT-IDS: An Efficient Network Intrusion Detection Method Based on Vision Transformer
Haiyan Zhou, Haojie Zou, Wei Li, et al.
Sensors (2025) Vol. 25, Iss. 6, pp. 1752-1752
Open Access
Haiyan Zhou, Haojie Zou, Wei Li, et al.
Sensors (2025) Vol. 25, Iss. 6, pp. 1752-1752
Open Access
NFIoT-GATE-DTL IDS: Genetic algorithm-tuned ensemble of deep transfer learning for NetFlow-based intrusion detection system for internet of things
Jing Li, Hewan Chen, Mohd Shahizan Othman, et al.
Engineering Applications of Artificial Intelligence (2025) Vol. 143, pp. 110046-110046
Open Access
Jing Li, Hewan Chen, Mohd Shahizan Othman, et al.
Engineering Applications of Artificial Intelligence (2025) Vol. 143, pp. 110046-110046
Open Access
Detection of DDoS attacks in SDN with Siberian Tiger Optimization algorithm and deep learning
Naseer Hameed Saadoon Al-Sarray, Javad Rahebi, Ayşe Demi̇rhan
Research Square (Research Square) (2024)
Open Access | Times Cited: 3
Naseer Hameed Saadoon Al-Sarray, Javad Rahebi, Ayşe Demi̇rhan
Research Square (Research Square) (2024)
Open Access | Times Cited: 3
Deep learning-empowered intrusion detection framework for the Internet of Medical Things environment
Prashant Giridhar Shambharkar, Nikhil Sharma
Knowledge and Information Systems (2024) Vol. 66, Iss. 10, pp. 6001-6050
Closed Access | Times Cited: 3
Prashant Giridhar Shambharkar, Nikhil Sharma
Knowledge and Information Systems (2024) Vol. 66, Iss. 10, pp. 6001-6050
Closed Access | Times Cited: 3
Early Network Intrusion Detection Enabled by Attention Mechanisms and RNNs
Taki Eddine Toufik Djaidja, Bouziane Brik, Sidi‐Mohammed Senouci, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 7783-7793
Closed Access | Times Cited: 3
Taki Eddine Toufik Djaidja, Bouziane Brik, Sidi‐Mohammed Senouci, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 7783-7793
Closed Access | Times Cited: 3
Ensemble Transfer Learning for Botnet Detection in the Internet of Things
Ali Aalsaud, Shahab Wahhab Kareem, Raghad Zuhair Yousif, et al.
Scalable Computing Practice and Experience (2024) Vol. 25, Iss. 5, pp. 4312-4322
Open Access | Times Cited: 2
Ali Aalsaud, Shahab Wahhab Kareem, Raghad Zuhair Yousif, et al.
Scalable Computing Practice and Experience (2024) Vol. 25, Iss. 5, pp. 4312-4322
Open Access | Times Cited: 2
Enhancing the security in IoT and IIoT networks: An intrusion detection scheme leveraging deep transfer learning
Basharat Ahmad, Zhaoliang Wu, Yongfeng Huang, et al.
Knowledge-Based Systems (2024) Vol. 305, pp. 112614-112614
Closed Access | Times Cited: 2
Basharat Ahmad, Zhaoliang Wu, Yongfeng Huang, et al.
Knowledge-Based Systems (2024) Vol. 305, pp. 112614-112614
Closed Access | Times Cited: 2
Robust intrusion detection for network communication on the Internet of Things: a hybrid machine learning approach
Nasim Soltani, Amir Masoud Rahmani, Mahdi Bohlouli, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 9975-9991
Closed Access
Nasim Soltani, Amir Masoud Rahmani, Mahdi Bohlouli, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 9975-9991
Closed Access
Optimized Deep Transfer Learning with Soft Voting Ensemble for Netflow Intrusion Detection Systems in Internet of Things
Jing Li, Hewan Chen, Shahizan Othman Mohd, et al.
(2024)
Closed Access
Jing Li, Hewan Chen, Shahizan Othman Mohd, et al.
(2024)
Closed Access
MEMFO-KELM: A Deep Learning Approach for Real-Time Intrusion Detection in Cloud Environments
M. Ramanan
IETE Journal of Research (2024) Vol. 70, Iss. 10, pp. 7763-7775
Closed Access
M. Ramanan
IETE Journal of Research (2024) Vol. 70, Iss. 10, pp. 7763-7775
Closed Access
TAM-CNN: An Enhanced Malicious Encrypted Traffic Detection Method with Feature-Threshold Images
longyun liu, Tianqi Sun, Liangbin Yang, et al.
(2024), pp. 171-176
Closed Access
longyun liu, Tianqi Sun, Liangbin Yang, et al.
(2024), pp. 171-176
Closed Access
Fault diagnosis of intelligent substation relay protection system based on transformer architecture and migration training model
Mei Yao, Saisai Ni, Haibo Zhang
Energy Informatics (2024) Vol. 7, Iss. 1
Open Access
Mei Yao, Saisai Ni, Haibo Zhang
Energy Informatics (2024) Vol. 7, Iss. 1
Open Access
Masked contrastive generative adversarial network for defect detection of yarn-dyed fabric
Hongwei Zhang, Zhidong Lü, Xiwei Chen, et al.
The Journal of Supercomputing (2024) Vol. 81, Iss. 1
Closed Access
Hongwei Zhang, Zhidong Lü, Xiwei Chen, et al.
The Journal of Supercomputing (2024) Vol. 81, Iss. 1
Closed Access
A survey of intelligent multimedia forensics for internet of things communications: Approaches, strategies, perspectives, and challenges for a sustainable future
Weiping Ding, Mohamed Abdel‐Basset, Ahmed Abdel-Monem, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 138, pp. 109451-109451
Closed Access
Weiping Ding, Mohamed Abdel‐Basset, Ahmed Abdel-Monem, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 138, pp. 109451-109451
Closed Access
Parallel Optimization Technique to Improve the Performance of Lightweight Intrusion Detection Systems
Quang-Vinh Dang
Lecture notes in networks and systems (2023), pp. 385-397
Closed Access | Times Cited: 1
Quang-Vinh Dang
Lecture notes in networks and systems (2023), pp. 385-397
Closed Access | Times Cited: 1
A Network Intrusion Detection Method for Information Systems Using Federated Learning and Improved Transformer
Qi Zhou, Zhoupu Wang
International Journal on Semantic Web and Information Systems (2023) Vol. 20, Iss. 1, pp. 1-20
Open Access | Times Cited: 1
Qi Zhou, Zhoupu Wang
International Journal on Semantic Web and Information Systems (2023) Vol. 20, Iss. 1, pp. 1-20
Open Access | Times Cited: 1
Applying Modified Convolutional Neural Networks for Detecting Intrusion
Kanin Siritharagul, Sunantha Sodsee
(2023), pp. 446-451
Closed Access
Kanin Siritharagul, Sunantha Sodsee
(2023), pp. 446-451
Closed Access