
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Deep learning-based malicious smart contract detection scheme for internet of things environment
Rajesh Gupta, Mohil Maheshkumar Patel, Arpit Shukla, et al.
Computers & Electrical Engineering (2021) Vol. 97, pp. 107583-107583
Closed Access | Times Cited: 36
Rajesh Gupta, Mohil Maheshkumar Patel, Arpit Shukla, et al.
Computers & Electrical Engineering (2021) Vol. 97, pp. 107583-107583
Closed Access | Times Cited: 36
Showing 1-25 of 36 citing articles:
Ethereum Smart Contract Analysis Tools: A Systematic Review
Satpal Singh Kushwaha, Sandeep Joshi, Dilbag Singh, et al.
IEEE Access (2022) Vol. 10, pp. 57037-57062
Open Access | Times Cited: 82
Satpal Singh Kushwaha, Sandeep Joshi, Dilbag Singh, et al.
IEEE Access (2022) Vol. 10, pp. 57037-57062
Open Access | Times Cited: 82
A Taxonomy of Fake News Classification Techniques: Survey and Implementation Aspects
Dhiren Rohera, Harshal Shethna, Keyur Patel, et al.
IEEE Access (2022) Vol. 10, pp. 30367-30394
Open Access | Times Cited: 52
Dhiren Rohera, Harshal Shethna, Keyur Patel, et al.
IEEE Access (2022) Vol. 10, pp. 30367-30394
Open Access | Times Cited: 52
Deep Learning-Based Malicious Smart Contract and Intrusion Detection System for IoT Environment
Harshit Shah, Dhruvil Shah, Nilesh Kumar Jadav, et al.
Mathematics (2023) Vol. 11, Iss. 2, pp. 418-418
Open Access | Times Cited: 36
Harshit Shah, Dhruvil Shah, Nilesh Kumar Jadav, et al.
Mathematics (2023) Vol. 11, Iss. 2, pp. 418-418
Open Access | Times Cited: 36
Strengthening the Security of Smart Contracts through the Power of Artificial Intelligence
Moez Krichen
Computers (2023) Vol. 12, Iss. 5, pp. 107-107
Open Access | Times Cited: 31
Moez Krichen
Computers (2023) Vol. 12, Iss. 5, pp. 107-107
Open Access | Times Cited: 31
Blockchain Adoption to Secure the Food Industry: Opportunities and Challenges
Sudeep Tanwar, Akshay Parmar, Aparna Kumari, et al.
Sustainability (2022) Vol. 14, Iss. 12, pp. 7036-7036
Open Access | Times Cited: 29
Sudeep Tanwar, Akshay Parmar, Aparna Kumari, et al.
Sustainability (2022) Vol. 14, Iss. 12, pp. 7036-7036
Open Access | Times Cited: 29
Smart Contract Vulnerability Detection Based on Hybrid Attention Mechanism Model
Huaiguang Wu, Hanjie Dong, Yaqiong He, et al.
Applied Sciences (2023) Vol. 13, Iss. 2, pp. 770-770
Open Access | Times Cited: 16
Huaiguang Wu, Hanjie Dong, Yaqiong He, et al.
Applied Sciences (2023) Vol. 13, Iss. 2, pp. 770-770
Open Access | Times Cited: 16
CNN and Bidirectional GRU-Based Heartbeat Sound Classification Architecture for Elderly People
Harshwardhan Yadav, Param Shah, Neel Gandhi, et al.
Mathematics (2023) Vol. 11, Iss. 6, pp. 1365-1365
Open Access | Times Cited: 15
Harshwardhan Yadav, Param Shah, Neel Gandhi, et al.
Mathematics (2023) Vol. 11, Iss. 6, pp. 1365-1365
Open Access | Times Cited: 15
Adoption of Blockchain Technology in Healthcare: Challenges, Solutions, and Comparisons
Dilbag Singh, Suhasini Monga, Sudeep Tanwar, et al.
Applied Sciences (2023) Vol. 13, Iss. 4, pp. 2380-2380
Open Access | Times Cited: 13
Dilbag Singh, Suhasini Monga, Sudeep Tanwar, et al.
Applied Sciences (2023) Vol. 13, Iss. 4, pp. 2380-2380
Open Access | Times Cited: 13
Vulnerability detection in Java source code using a quantum convolutional neural network with self-attentive pooling, deep sequence, and graph-based hybrid feature extraction
Shumaila Hussain, Muhammad Nadeem, Junaid Baber, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 4
Shumaila Hussain, Muhammad Nadeem, Junaid Baber, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 4
Enhancing Smart-Contract Security through Machine Learning: A Survey of Approaches and Techniques
Fan Jiang, Kailin Chao, Jianmao Xiao, et al.
Electronics (2023) Vol. 12, Iss. 9, pp. 2046-2046
Open Access | Times Cited: 12
Fan Jiang, Kailin Chao, Jianmao Xiao, et al.
Electronics (2023) Vol. 12, Iss. 9, pp. 2046-2046
Open Access | Times Cited: 12
Ethereum Smart Contract Vulnerability Detection Model Based on Triplet Loss and BiLSTM
Meiying Wang, Zheyu Xie, Xuefan Wen, et al.
Electronics (2023) Vol. 12, Iss. 10, pp. 2327-2327
Open Access | Times Cited: 10
Meiying Wang, Zheyu Xie, Xuefan Wen, et al.
Electronics (2023) Vol. 12, Iss. 10, pp. 2327-2327
Open Access | Times Cited: 10
OpenSCV: an open hierarchical taxonomy for smart contract vulnerabilities
Fernando Richter Vidal, Naghmeh Ivaki, Nuno Laranjeiro
Empirical Software Engineering (2024) Vol. 29, Iss. 4
Open Access | Times Cited: 3
Fernando Richter Vidal, Naghmeh Ivaki, Nuno Laranjeiro
Empirical Software Engineering (2024) Vol. 29, Iss. 4
Open Access | Times Cited: 3
Smart contract vulnerability detection based on a semantic code structure and a self-designed neural network
Xiaojun Ren, Yongtang Wu, Jiaqing Li, et al.
Computers & Electrical Engineering (2023) Vol. 109, pp. 108766-108766
Closed Access | Times Cited: 8
Xiaojun Ren, Yongtang Wu, Jiaqing Li, et al.
Computers & Electrical Engineering (2023) Vol. 109, pp. 108766-108766
Closed Access | Times Cited: 8
DL4SC: a novel deep learning-based vulnerability detection framework for smart contracts
Yang Liu, Chao Wang, Yan Ma
Automated Software Engineering (2024) Vol. 31, Iss. 1
Closed Access | Times Cited: 2
Yang Liu, Chao Wang, Yan Ma
Automated Software Engineering (2024) Vol. 31, Iss. 1
Closed Access | Times Cited: 2
Vulnerability detection techniques for smart contracts: A systematic literature review
Fernando Richter Vidal, Naghmeh Ivaki, Nuno Laranjeiro
Journal of Systems and Software (2024) Vol. 217, pp. 112160-112160
Open Access | Times Cited: 2
Fernando Richter Vidal, Naghmeh Ivaki, Nuno Laranjeiro
Journal of Systems and Software (2024) Vol. 217, pp. 112160-112160
Open Access | Times Cited: 2
“Vulnerabilities in Smart Contracts: A Detailed Survey of Detection and Mitigation Methodologies”
Nayantara K Kumar, Niranjan V Honnungar, M Sharwari Prakash, et al.
(2024) Vol. 3, pp. 1-7
Closed Access | Times Cited: 1
Nayantara K Kumar, Niranjan V Honnungar, M Sharwari Prakash, et al.
(2024) Vol. 3, pp. 1-7
Closed Access | Times Cited: 1
Exploring security and privacy enhancement technologies in the Internet of Things: A comprehensive review
Md. Ataullah, Naveen Chauhan
Security and Privacy (2024) Vol. 7, Iss. 6
Closed Access | Times Cited: 1
Md. Ataullah, Naveen Chauhan
Security and Privacy (2024) Vol. 7, Iss. 6
Closed Access | Times Cited: 1
A Review on Deep Anomaly Detection in Blockchain
Oussama Mounnan, Otman Manad, Larbi Boubchir, et al.
Blockchain Research and Applications (2024), pp. 100227-100227
Open Access | Times Cited: 1
Oussama Mounnan, Otman Manad, Larbi Boubchir, et al.
Blockchain Research and Applications (2024), pp. 100227-100227
Open Access | Times Cited: 1
Detecting Smart Contract Vulnerabilities with Combined Binary and Multiclass Classification
Anzhelika Mezina, Aleksandr Ometov
Cryptography (2023) Vol. 7, Iss. 3, pp. 34-34
Open Access | Times Cited: 4
Anzhelika Mezina, Aleksandr Ometov
Cryptography (2023) Vol. 7, Iss. 3, pp. 34-34
Open Access | Times Cited: 4
Detection and Analysis of Ethereum Energy Smart Contracts
Bahareh Lashkari, Petr Musı́lek
Applied Sciences (2023) Vol. 13, Iss. 10, pp. 6027-6027
Open Access | Times Cited: 2
Bahareh Lashkari, Petr Musı́lek
Applied Sciences (2023) Vol. 13, Iss. 10, pp. 6027-6027
Open Access | Times Cited: 2
A Comprehensive Survey Integrating Scientometric Analysis and ML approaches for Data Protection
Haseeba Yaseen, Syed Imtiyaz Hassan
Research Square (Research Square) (2024)
Open Access
Haseeba Yaseen, Syed Imtiyaz Hassan
Research Square (Research Square) (2024)
Open Access
Securing Smart Contracts in Fog Computing: Machine Learning-Based Attack Detection for Registration and Resource Access Granting
Tahmina Ehsan, Muhammad Usman Sana, Muhammad Usman Ali, et al.
IEEE Access (2024) Vol. 12, pp. 42802-42815
Open Access
Tahmina Ehsan, Muhammad Usman Sana, Muhammad Usman Ali, et al.
IEEE Access (2024) Vol. 12, pp. 42802-42815
Open Access
Securing IoT Environment by Deploying Federated Deep Learning Models
Saleh Alghamdi, Aiiad Albeshri
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 4
Open Access
Saleh Alghamdi, Aiiad Albeshri
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 4
Open Access
AI and Smart Consumer Contracts
Pınar Çağlayan Aksoy
Cambridge University Press eBooks (2024), pp. 99-115
Closed Access
Pınar Çağlayan Aksoy
Cambridge University Press eBooks (2024), pp. 99-115
Closed Access