
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Machine and deep learning amalgamation for feature extraction in Industrial Internet-of-Things
P. L. S. Jayalaxmi, Rahul Saha, Gulshan Kumar, et al.
Computers & Electrical Engineering (2021) Vol. 97, pp. 107610-107610
Closed Access | Times Cited: 24
P. L. S. Jayalaxmi, Rahul Saha, Gulshan Kumar, et al.
Computers & Electrical Engineering (2021) Vol. 97, pp. 107610-107610
Closed Access | Times Cited: 24
Showing 24 citing articles:
Empowering Cyberattack Identification in IoHT Networks With Neighborhood-Component-Based Improvised Long Short-Term Memory
Manish Kumar, Changjong Kim, Yongseok Son, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 9, pp. 16638-16646
Closed Access | Times Cited: 15
Manish Kumar, Changjong Kim, Yongseok Son, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 9, pp. 16638-16646
Closed Access | Times Cited: 15
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Mohamed Aly Bouke, Azizol Abdullah, Sameer Hamoud ALshatebi, et al.
Microprocessors and Microsystems (2023) Vol. 98, pp. 104823-104823
Closed Access | Times Cited: 33
Mohamed Aly Bouke, Azizol Abdullah, Sameer Hamoud ALshatebi, et al.
Microprocessors and Microsystems (2023) Vol. 98, pp. 104823-104823
Closed Access | Times Cited: 33
Efficient intrusion detection toward IoT networks using cloud–edge collaboration
Run Yang, Hui He, Yixiao Xu, et al.
Computer Networks (2023) Vol. 228, pp. 109724-109724
Closed Access | Times Cited: 29
Run Yang, Hui He, Yixiao Xu, et al.
Computer Networks (2023) Vol. 228, pp. 109724-109724
Closed Access | Times Cited: 29
GA-mADAM-IIoT: A New Lightweight Threats Detection in the Industrial IoT Via Genetic Algorithm with Attention Mechanism and LSTM on Multivariate Time Series Sensor Data
Yakub Kayode Saheed, Adekunle Isaac Omole, Musa Odunayo Sabit
Sensors International (2024) Vol. 6, pp. 100297-100297
Closed Access | Times Cited: 9
Yakub Kayode Saheed, Adekunle Isaac Omole, Musa Odunayo Sabit
Sensors International (2024) Vol. 6, pp. 100297-100297
Closed Access | Times Cited: 9
Enhanced Fault Diagnosis in IoT: Uniting Data Fusion with Deep Multi-Scale Fusion Neural Network
Dinesh Kumar Reddy Basani, Basava Ramanjaneyulu Gudivaka, Rajya Lakshmi Gudivaka, et al.
Internet of Things (2024), pp. 101361-101361
Closed Access | Times Cited: 6
Dinesh Kumar Reddy Basani, Basava Ramanjaneyulu Gudivaka, Rajya Lakshmi Gudivaka, et al.
Internet of Things (2024), pp. 101361-101361
Closed Access | Times Cited: 6
A Survey of Industrial AIoT: Opportunities, Challenges, and Directions
Kamran Sattar Awaisi, Qiang Ye, Srinivas Sampalli
IEEE Access (2024) Vol. 12, pp. 96946-96996
Open Access | Times Cited: 5
Kamran Sattar Awaisi, Qiang Ye, Srinivas Sampalli
IEEE Access (2024) Vol. 12, pp. 96946-96996
Open Access | Times Cited: 5
Cybersecurity Solutions for Industrial Internet of Things–Edge Computing Integration: Challenges, Threats, and Future Directions
Tamara Zhukabayeva, Lazzat Zholshiyeva, Nurdaulet Karabayev, et al.
Sensors (2025) Vol. 25, Iss. 1, pp. 213-213
Open Access
Tamara Zhukabayeva, Lazzat Zholshiyeva, Nurdaulet Karabayev, et al.
Sensors (2025) Vol. 25, Iss. 1, pp. 213-213
Open Access
NFIoT-GATE-DTL IDS: Genetic algorithm-tuned ensemble of deep transfer learning for NetFlow-based intrusion detection system for internet of things
Jing Li, Hewan Chen, Mohd Shahizan Othman, et al.
Engineering Applications of Artificial Intelligence (2025) Vol. 143, pp. 110046-110046
Open Access
Jing Li, Hewan Chen, Mohd Shahizan Othman, et al.
Engineering Applications of Artificial Intelligence (2025) Vol. 143, pp. 110046-110046
Open Access
Optimal Deep Learning Based Intruder Identification in Industrial Internet of Things Environment
Khaled M. Alalayah, Fatma S. Alrayes, Jaber S. Alzahrani, et al.
Computer Systems Science and Engineering (2023) Vol. 46, Iss. 3, pp. 3121-3139
Open Access | Times Cited: 9
Khaled M. Alalayah, Fatma S. Alrayes, Jaber S. Alzahrani, et al.
Computer Systems Science and Engineering (2023) Vol. 46, Iss. 3, pp. 3121-3139
Open Access | Times Cited: 9
Predicting daily solar radiation using a novel hybrid long short-term memory network across four climate regions of China
Liwen Xing, Ningbo Cui, Li Guo, et al.
Computers and Electronics in Agriculture (2023) Vol. 212, pp. 108139-108139
Open Access | Times Cited: 9
Liwen Xing, Ningbo Cui, Li Guo, et al.
Computers and Electronics in Agriculture (2023) Vol. 212, pp. 108139-108139
Open Access | Times Cited: 9
End-to-End Deep Reinforcement Learning Control for HVAC Systems in Office Buildings
Xuyang Zhong, Zhiang Zhang, Ruijun Zhang, et al.
Designs (2022) Vol. 6, Iss. 3, pp. 52-52
Open Access | Times Cited: 14
Xuyang Zhong, Zhiang Zhang, Ruijun Zhang, et al.
Designs (2022) Vol. 6, Iss. 3, pp. 52-52
Open Access | Times Cited: 14
Machine Learning-Based DDoS Attack Detection on SDN-Based SCADA Systems
Esra SÖĞÜT, Adem Tekerek, O. Ayhan Erdem
Gazi Journal of Engineering Sciences (2024) Vol. 9, Iss. 3, pp. 596-611
Open Access | Times Cited: 1
Esra SÖĞÜT, Adem Tekerek, O. Ayhan Erdem
Gazi Journal of Engineering Sciences (2024) Vol. 9, Iss. 3, pp. 596-611
Open Access | Times Cited: 1
A look into smart factory for Industrial IoT driven by SDN technology: A comprehensive survey of taxonomy, architectures, issues and future research orientations
Nteziriza Nkerabahizi Josbert, Min Wei, Ping Wang, et al.
Journal of King Saud University - Computer and Information Sciences (2024) Vol. 36, Iss. 5, pp. 102069-102069
Open Access | Times Cited: 1
Nteziriza Nkerabahizi Josbert, Min Wei, Ping Wang, et al.
Journal of King Saud University - Computer and Information Sciences (2024) Vol. 36, Iss. 5, pp. 102069-102069
Open Access | Times Cited: 1
Chiral Metasurface Multifocal Lens in the Terahertz Band Based on Deep Learning
Jingjing Wang, Sixue Chen, Yihang Qiu, et al.
Micromachines (2023) Vol. 14, Iss. 10, pp. 1925-1925
Open Access | Times Cited: 4
Jingjing Wang, Sixue Chen, Yihang Qiu, et al.
Micromachines (2023) Vol. 14, Iss. 10, pp. 1925-1925
Open Access | Times Cited: 4
Optimizing interlaminar toughening of carbon-based filler/polymer nanocomposites by machine learning
Chenglin Han, Hongxing Zhao, Tianzhi Yang, et al.
Polymer Testing (2023) Vol. 128, pp. 108222-108222
Open Access | Times Cited: 2
Chenglin Han, Hongxing Zhao, Tianzhi Yang, et al.
Polymer Testing (2023) Vol. 128, pp. 108222-108222
Open Access | Times Cited: 2
Unsupervised Optimal Anomaly Detection Model Selection in Power Data
Guangrong Yu, Qinsheng Yang, Yongjin Zhu, et al.
2021 China Automation Congress (CAC) (2022), pp. 5661-5666
Closed Access | Times Cited: 3
Guangrong Yu, Qinsheng Yang, Yongjin Zhu, et al.
2021 China Automation Congress (CAC) (2022), pp. 5661-5666
Closed Access | Times Cited: 3
Quantum intrusion detection system using outlier analysis
Tae Hoon Kim, S. Madhavi
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access
Tae Hoon Kim, S. Madhavi
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access
Optimized Deep Transfer Learning with Soft Voting Ensemble for Netflow Intrusion Detection Systems in Internet of Things
Jing Li, Hewan Chen, Shahizan Othman Mohd, et al.
(2024)
Closed Access
Jing Li, Hewan Chen, Shahizan Othman Mohd, et al.
(2024)
Closed Access
Analysis of the Dissemination Topology Network and Inheritance of Chinese Folk Music Culture based on the Deep Retrieval Algorithm of Internet Information
Liqun Wu, Chengzhen Li
2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS) (2022), pp. 681-685
Closed Access | Times Cited: 1
Liqun Wu, Chengzhen Li
2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS) (2022), pp. 681-685
Closed Access | Times Cited: 1
Intelligent Predictive Maintenance for Industrial Internet of Things (IIoT) Using Machine Learning Approach
Umesh W. Hore, D. G. Wakde
Springer eBooks (2023), pp. 897-913
Closed Access
Umesh W. Hore, D. G. Wakde
Springer eBooks (2023), pp. 897-913
Closed Access
AI Enabled Human and Machine Activity Monitoring in Industrial IoT Systems
Anindita Saha, Jayita Saha, Manjarini Mallik, et al.
Springer eBooks (2023), pp. 29-54
Closed Access
Anindita Saha, Jayita Saha, Manjarini Mallik, et al.
Springer eBooks (2023), pp. 29-54
Closed Access
A comprehensive analysis of hybrid machine learning algorithms for securing IoT data
Jisha Jose, J. E. Judith
AIP conference proceedings (2023) Vol. 2921, pp. 020001-020001
Closed Access
Jisha Jose, J. E. Judith
AIP conference proceedings (2023) Vol. 2921, pp. 020001-020001
Closed Access
Introduction to the special section on securing IoT-based critical infrastructure (VSI-cei)
Imran Razzak, Peter Eklund, Guandong Xu
Computers & Electrical Engineering (2022) Vol. 101, pp. 108118-108118
Closed Access
Imran Razzak, Peter Eklund, Guandong Xu
Computers & Electrical Engineering (2022) Vol. 101, pp. 108118-108118
Closed Access
Geo-Location Method for Images of Damaged Roads
Wenbo Zhang, Jue Qu, Wei Wang, et al.
Electronics (2022) Vol. 11, Iss. 16, pp. 2530-2530
Open Access
Wenbo Zhang, Jue Qu, Wei Wang, et al.
Electronics (2022) Vol. 11, Iss. 16, pp. 2530-2530
Open Access