OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A multi-objective immune algorithm for intrusion feature selection
Wenhong Wei, Shuo Chen, Qiuzhen Lin, et al.
Applied Soft Computing (2020) Vol. 95, pp. 106522-106522
Open Access | Times Cited: 63

Showing 1-25 of 63 citing articles:

Multi-objective particle swarm optimization with adaptive strategies for feature selection
Fei Han, Wen-Tao Chen, Qing-Hua Ling, et al.
Swarm and Evolutionary Computation (2021) Vol. 62, pp. 100847-100847
Closed Access | Times Cited: 135

Dual-IDS: A bagging-based gradient boosting decision tree model for network anomaly intrusion detection system
Maya Hilda Lestari Louk, Bayu Adhi Tama
Expert Systems with Applications (2022) Vol. 213, pp. 119030-119030
Closed Access | Times Cited: 131

A review of recent approaches on wrapper feature selection for intrusion detection
Javier Maldonado, María Cristina Riff, Bertrand Neveu
Expert Systems with Applications (2022) Vol. 198, pp. 116822-116822
Closed Access | Times Cited: 98

A Feature Selection Based on the Farmland Fertility Algorithm for Improved Intrusion Detection Systems
Touraj Sattari Naseri, Farhad Soleimanian Gharehchopogh
Journal of Network and Systems Management (2022) Vol. 30, Iss. 3
Closed Access | Times Cited: 90

Intrusion detection using multi-objective evolutionary convolutional neural network for Internet of Things in Fog computing
Yi Chen, Qiuzhen Lin, Wenhong Wei, et al.
Knowledge-Based Systems (2022) Vol. 244, pp. 108505-108505
Closed Access | Times Cited: 77

A Survey on Evolutionary Multiobjective Feature Selection in Classification: Approaches, Applications, and Challenges
Ruwang Jiao, Bach Hoai Nguyen, Bing Xue, et al.
IEEE Transactions on Evolutionary Computation (2023) Vol. 28, Iss. 4, pp. 1156-1176
Closed Access | Times Cited: 59

Anomaly-based intrusion detection system in the Internet of Things using a convolutional neural network and multi-objective enhanced Capuchin Search Algorithm
Hossein Asgharzadeh, Ali Ghaffari, Mohammad Masdari, et al.
Journal of Parallel and Distributed Computing (2023) Vol. 175, pp. 1-21
Closed Access | Times Cited: 57

Evolutionary computation for feature selection in classification: A comprehensive survey of solutions, applications and challenges
Xianfang Song, Yong Zhang, Wanqiu Zhang, et al.
Swarm and Evolutionary Computation (2024) Vol. 90, pp. 101661-101661
Closed Access | Times Cited: 16

Artificial intelligence for surface water quality monitoring and assessment: a systematic literature analysis
Joshua O. Ighalo, Adewale George Adeniyi, Gonçalo Marques
Modeling Earth Systems and Environment (2020) Vol. 7, Iss. 2, pp. 669-681
Closed Access | Times Cited: 96

Particle ranking: An Efficient Method for Multi-Objective Particle Swarm Optimization Feature Selection
Abdolreza Rashno, Milad Shafipour, Sadegh Fadaei
Knowledge-Based Systems (2022) Vol. 245, pp. 108640-108640
Closed Access | Times Cited: 38

An Innovative Perceptual Pigeon Galvanized Optimization (PPGO) Based Likelihood Naïve Bayes (LNB) Classification Approach for Network Intrusion Detection System
Shitharth Selvarajan, Pravin R. Kshirsagar, Praveen Kumar Balachandran, et al.
IEEE Access (2022) Vol. 10, pp. 46424-46441
Open Access | Times Cited: 38

A fast intrusion detection system based on swift wrapper feature selection and speedy ensemble classifier
Ezgi Zorarpacı
Engineering Applications of Artificial Intelligence (2024) Vol. 133, pp. 108162-108162
Closed Access | Times Cited: 10

Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review
Shubhkirti Sharma, Vijay Kumar, Kamlesh Dutta
Internet of Things and Cyber-Physical Systems (2024) Vol. 4, pp. 258-267
Open Access | Times Cited: 8

Bitterling fish optimization (BFO) algorithm
Lida Zareian, Javad Rahebi, Mohammad Javad Shayegan
Multimedia Tools and Applications (2024) Vol. 83, Iss. 31, pp. 75893-75926
Open Access | Times Cited: 8

Symmetric uncertainty based decomposition multi-objective immune algorithm for feature selection
Zhengyi Chai, Wangwang Li, Yalun Li
Swarm and Evolutionary Computation (2023) Vol. 78, pp. 101286-101286
Closed Access | Times Cited: 16

An Intrusion Detection System on The Internet of Things Using Deep Learning and Multi-objective Enhanced Gorilla Troops Optimizer
Hossein Asgharzadeh, Ali Ghaffari, Mohammad Masdari, et al.
Journal of Bionic Engineering (2024) Vol. 21, Iss. 5, pp. 2658-2684
Open Access | Times Cited: 5

Particle distance rank feature selection by particle swarm optimization
Milad Shafipour, Abdolreza Rashno, Sadegh Fadaei
Expert Systems with Applications (2021) Vol. 185, pp. 115620-115620
Closed Access | Times Cited: 35

Batch reinforcement learning approach using recursive feature elimination for network intrusion detection
Ankit Sharma, Manjeet Singh
Engineering Applications of Artificial Intelligence (2024) Vol. 136, pp. 109013-109013
Closed Access | Times Cited: 4

A crossover-integrated Marine Predator Algorithm for feature selection in intrusion detection systems within IoT environments
Sharif Naser Makhadmeh, F.M.A. Salam, Mohammed Awad, et al.
Internet of Things (2025), pp. 101536-101536
Closed Access

Intrusion defense: Leveraging ant colony optimization for enhanced multi-optimization in network security
Chetan Gupta, Amit Kumar, Neelesh Kumar Jain
Peer-to-Peer Networking and Applications (2025) Vol. 18, Iss. 2
Closed Access

Multi-objective evolving long–short term memory networks with attention for network intrusion detection
Wenhong Wei, Yi Chen, Qiuzhen Lin, et al.
Applied Soft Computing (2023) Vol. 139, pp. 110216-110216
Closed Access | Times Cited: 11

Non-Dominated Sorting Genetic Algorithm-Based Dynamic Feature Selection for Intrusion Detection System
Abubaker Jumaah Rabash, Mohd Zakree Ahmad Nazri, Azrulhizam Shapi’i, et al.
IEEE Access (2023) Vol. 11, pp. 125080-125093
Open Access | Times Cited: 11

Intelligent intrusion detection through deep autoencoder and stacked long short-term memory
Mehdi Moukhafi, Mouad Tantaoui, Idriss Chana, et al.
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2024) Vol. 14, Iss. 3, pp. 2908-2908
Open Access | Times Cited: 3

Page 1 - Next Page

Scroll to top