OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

TL-CNN-IDS: transfer learning-based intrusion detection system using convolutional neural network
Fengru Yan, Guanghua Zhang, Dongwen Zhang, et al.
The Journal of Supercomputing (2023) Vol. 79, Iss. 15, pp. 17562-17584
Closed Access | Times Cited: 21

Showing 21 citing articles:

DTL-IDS: An optimized Intrusion Detection Framework using Deep Transfer Learning and Genetic Algorithm
Shahid Latif, Wadii Boulila, Anis Koubâa, et al.
Journal of Network and Computer Applications (2023) Vol. 221, pp. 103784-103784
Open Access | Times Cited: 40

Hyperparameter Optimization for 1D-CNN-Based Network Intrusion Detection Using GA and PSO
Dusmurod Kilichev, Wooseong Kim
Mathematics (2023) Vol. 11, Iss. 17, pp. 3724-3724
Open Access | Times Cited: 35

Securing IoT Networks Against DDoS Attacks: A Hybrid Deep Learning Approach
Noor Ul Ain, Muhammad Sardaraz, Muhammad Tahir, et al.
Sensors (2025) Vol. 25, Iss. 5, pp. 1346-1346
Open Access

Optimizing vehicle security: A Multiclassification framework using deep transfer learning and metaheuristic-based genetic algorithm optimization
Hamad Naeem, Farhan Ullah, Ondřej Krejcar, et al.
International Journal of Critical Infrastructure Protection (2025), pp. 100745-100745
Closed Access

HiViT-IDS: An Efficient Network Intrusion Detection Method Based on Vision Transformer
Haiyan Zhou, Haojie Zou, Wei Li, et al.
Sensors (2025) Vol. 25, Iss. 6, pp. 1752-1752
Open Access

NFIoT-GATE-DTL IDS: Genetic algorithm-tuned ensemble of deep transfer learning for NetFlow-based intrusion detection system for internet of things
Jing Li, Hewan Chen, Mohd Shahizan Othman, et al.
Engineering Applications of Artificial Intelligence (2025) Vol. 143, pp. 110046-110046
Open Access

Detection of DDoS attacks in SDN with Siberian Tiger Optimization algorithm and deep learning
Naseer Hameed Saadoon Al-Sarray, Javad Rahebi, Ayşe Demi̇rhan
Research Square (Research Square) (2024)
Open Access | Times Cited: 3

Deep learning-empowered intrusion detection framework for the Internet of Medical Things environment
Prashant Giridhar Shambharkar, Nikhil Sharma
Knowledge and Information Systems (2024) Vol. 66, Iss. 10, pp. 6001-6050
Closed Access | Times Cited: 3

Early Network Intrusion Detection Enabled by Attention Mechanisms and RNNs
Taki Eddine Toufik Djaidja, Bouziane Brik, Sidi‐Mohammed Senouci, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 7783-7793
Closed Access | Times Cited: 3

Ensemble Transfer Learning for Botnet Detection in the Internet of Things
Ali Aalsaud, Shahab Wahhab Kareem, Raghad Zuhair Yousif, et al.
Scalable Computing Practice and Experience (2024) Vol. 25, Iss. 5, pp. 4312-4322
Open Access | Times Cited: 2

Enhancing the security in IoT and IIoT networks: An intrusion detection scheme leveraging deep transfer learning
Basharat Ahmad, Zhaoliang Wu, Yongfeng Huang, et al.
Knowledge-Based Systems (2024) Vol. 305, pp. 112614-112614
Closed Access | Times Cited: 2

Robust intrusion detection for network communication on the Internet of Things: a hybrid machine learning approach
Nasim Soltani, Amir Masoud Rahmani, Mahdi Bohlouli, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 9975-9991
Closed Access

MEMFO-KELM: A Deep Learning Approach for Real-Time Intrusion Detection in Cloud Environments
M. Ramanan
IETE Journal of Research (2024) Vol. 70, Iss. 10, pp. 7763-7775
Closed Access

TAM-CNN: An Enhanced Malicious Encrypted Traffic Detection Method with Feature-Threshold Images
longyun liu, Tianqi Sun, Liangbin Yang, et al.
(2024), pp. 171-176
Closed Access

Masked contrastive generative adversarial network for defect detection of yarn-dyed fabric
Hongwei Zhang, Zhidong Lü, Xiwei Chen, et al.
The Journal of Supercomputing (2024) Vol. 81, Iss. 1
Closed Access

A survey of intelligent multimedia forensics for internet of things communications: Approaches, strategies, perspectives, and challenges for a sustainable future
Weiping Ding, Mohamed Abdel‐Basset, Ahmed Abdel-Monem, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 138, pp. 109451-109451
Closed Access

Parallel Optimization Technique to Improve the Performance of Lightweight Intrusion Detection Systems
Quang-Vinh Dang
Lecture notes in networks and systems (2023), pp. 385-397
Closed Access | Times Cited: 1

A Network Intrusion Detection Method for Information Systems Using Federated Learning and Improved Transformer
Qi Zhou, Zhoupu Wang
International Journal on Semantic Web and Information Systems (2023) Vol. 20, Iss. 1, pp. 1-20
Open Access | Times Cited: 1

Applying Modified Convolutional Neural Networks for Detecting Intrusion
Kanin Siritharagul, Sunantha Sodsee
(2023), pp. 446-451
Closed Access

Page 1

Scroll to top