
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A novel framework for image-based malware detection with a deep neural network
Yifei Jian, Hongbo Kuang, Chenglong Ren, et al.
Computers & Security (2021) Vol. 109, pp. 102400-102400
Closed Access | Times Cited: 65
Yifei Jian, Hongbo Kuang, Chenglong Ren, et al.
Computers & Security (2021) Vol. 109, pp. 102400-102400
Closed Access | Times Cited: 65
Showing 1-25 of 65 citing articles:
Attention-based LSTM predictive model for the attitude and position of shield machine in tunneling
Qing Kang, Elton J. Chen, Zhongchao Li, et al.
Underground Space (2023) Vol. 13, pp. 335-350
Open Access | Times Cited: 54
Qing Kang, Elton J. Chen, Zhongchao Li, et al.
Underground Space (2023) Vol. 13, pp. 335-350
Open Access | Times Cited: 54
A novel machine learning approach for detecting first-time-appeared malware
Kamran Shaukat, Suhuai Luo, Vijay Varadharajan
Engineering Applications of Artificial Intelligence (2024) Vol. 131, pp. 107801-107801
Open Access | Times Cited: 26
Kamran Shaukat, Suhuai Luo, Vijay Varadharajan
Engineering Applications of Artificial Intelligence (2024) Vol. 131, pp. 107801-107801
Open Access | Times Cited: 26
Efficient Malware Classification by Binary Sequences with One-Dimensional Convolutional Neural Networks
Wei-Cheng Lin, Yi-Ren Yeh
Mathematics (2022) Vol. 10, Iss. 4, pp. 608-608
Open Access | Times Cited: 40
Wei-Cheng Lin, Yi-Ren Yeh
Mathematics (2022) Vol. 10, Iss. 4, pp. 608-608
Open Access | Times Cited: 40
Advances in Malware Analysis and Detection in Cloud Computing Environments: A Review
S. Madhusudhana Rao, Arpit Jain
International Journal of Safety and Security Engineering (2024) Vol. 14, Iss. 1, pp. 225-230
Open Access | Times Cited: 14
S. Madhusudhana Rao, Arpit Jain
International Journal of Safety and Security Engineering (2024) Vol. 14, Iss. 1, pp. 225-230
Open Access | Times Cited: 14
MCTVD: A malware classification method based on three-channel visualization and deep learning
Huaxin Deng, Chun Guo, Guowei Shen, et al.
Computers & Security (2023) Vol. 126, pp. 103084-103084
Closed Access | Times Cited: 21
Huaxin Deng, Chun Guo, Guowei Shen, et al.
Computers & Security (2023) Vol. 126, pp. 103084-103084
Closed Access | Times Cited: 21
IIoT Malware Detection Using Edge Computing and Deep Learning for Cybersecurity in Smart Factories
Ho-myung Kim, Kyungho Lee
Applied Sciences (2022) Vol. 12, Iss. 15, pp. 7679-7679
Open Access | Times Cited: 25
Ho-myung Kim, Kyungho Lee
Applied Sciences (2022) Vol. 12, Iss. 15, pp. 7679-7679
Open Access | Times Cited: 25
MalSPM: Metamorphic malware behavior analysis and classification using sequential pattern mining
M. Saqib Nawaz, Philippe Fournier‐Viger, Menaa Nawaz, et al.
Computers & Security (2022) Vol. 118, pp. 102741-102741
Closed Access | Times Cited: 24
M. Saqib Nawaz, Philippe Fournier‐Viger, Menaa Nawaz, et al.
Computers & Security (2022) Vol. 118, pp. 102741-102741
Closed Access | Times Cited: 24
A New Framework for Visual Classification of Multi-Channel Malware Based on Transfer Learning
Zilin Zhao, Shumian Yang, Dawei Zhao
Applied Sciences (2023) Vol. 13, Iss. 4, pp. 2484-2484
Open Access | Times Cited: 13
Zilin Zhao, Shumian Yang, Dawei Zhao
Applied Sciences (2023) Vol. 13, Iss. 4, pp. 2484-2484
Open Access | Times Cited: 13
Overcoming the lack of labeled data: Training malware detection models using adversarial domain adaptation
Sonam Bhardwaj, Adrian Shuai Li, Mayank Dave, et al.
Computers & Security (2024) Vol. 140, pp. 103769-103769
Closed Access | Times Cited: 5
Sonam Bhardwaj, Adrian Shuai Li, Mayank Dave, et al.
Computers & Security (2024) Vol. 140, pp. 103769-103769
Closed Access | Times Cited: 5
A Survey of Recent Advances in Deep Learning Models for Detecting Malware in Desktop and Mobile Platforms
Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
ACM Computing Surveys (2023) Vol. 56, Iss. 6, pp. 1-41
Closed Access | Times Cited: 12
Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
ACM Computing Surveys (2023) Vol. 56, Iss. 6, pp. 1-41
Closed Access | Times Cited: 12
MSG: Missing-sequence generator for metamorphic malware detection
Rama Krishna Koppanati, Sateesh K. Peddoju
Journal of Information Security and Applications (2025) Vol. 89, pp. 103962-103962
Closed Access
Rama Krishna Koppanati, Sateesh K. Peddoju
Journal of Information Security and Applications (2025) Vol. 89, pp. 103962-103962
Closed Access
SynDroid: An adaptive enhanced Android malware classification method based on CTGAN-SVM
Junhao Li, Junjiang He, Wenshan Li, et al.
Computers & Security (2023) Vol. 137, pp. 103604-103604
Closed Access | Times Cited: 10
Junhao Li, Junjiang He, Wenshan Li, et al.
Computers & Security (2023) Vol. 137, pp. 103604-103604
Closed Access | Times Cited: 10
Simulation application of virtual robots and artificial intelligence based on deep learning in enterprise financial systems
Wenjing Chen
Entertainment Computing (2024) Vol. 52, pp. 100772-100772
Closed Access | Times Cited: 3
Wenjing Chen
Entertainment Computing (2024) Vol. 52, pp. 100772-100772
Closed Access | Times Cited: 3
BHMDC: A byte and hex n-gram based malware detection and classification method
Yonghe Tang, Xuyan Qi, Jing Jing, et al.
Computers & Security (2023) Vol. 128, pp. 103118-103118
Closed Access | Times Cited: 8
Yonghe Tang, Xuyan Qi, Jing Jing, et al.
Computers & Security (2023) Vol. 128, pp. 103118-103118
Closed Access | Times Cited: 8
An Efficient Boosting-Based Windows Malware Family Classification System Using Multi-Features Fusion
Zhiguo Chen, Xuanyu Ren
Applied Sciences (2023) Vol. 13, Iss. 6, pp. 4060-4060
Open Access | Times Cited: 8
Zhiguo Chen, Xuanyu Ren
Applied Sciences (2023) Vol. 13, Iss. 6, pp. 4060-4060
Open Access | Times Cited: 8
IMCLNet: A lightweight deep neural network for Image-based Malware Classification
Binghui Zou, Chunjie Cao, Fangjian Tao, et al.
Journal of Information Security and Applications (2022) Vol. 70, pp. 103313-103313
Closed Access | Times Cited: 13
Binghui Zou, Chunjie Cao, Fangjian Tao, et al.
Journal of Information Security and Applications (2022) Vol. 70, pp. 103313-103313
Closed Access | Times Cited: 13
A Hybrid Attention Network for Malware Detection Based on Multi-Feature Aligned and Fusion
Xing Yang, Denghui Yang, Yizhou Li
Electronics (2023) Vol. 12, Iss. 3, pp. 713-713
Open Access | Times Cited: 7
Xing Yang, Denghui Yang, Yizhou Li
Electronics (2023) Vol. 12, Iss. 3, pp. 713-713
Open Access | Times Cited: 7
Tri-channel visualised malicious code classification based on improved ResNet
Sicong Li, Jian Wang, Yafei Song, et al.
Applied Intelligence (2024) Vol. 54, Iss. 23, pp. 12453-12475
Open Access | Times Cited: 2
Sicong Li, Jian Wang, Yafei Song, et al.
Applied Intelligence (2024) Vol. 54, Iss. 23, pp. 12453-12475
Open Access | Times Cited: 2
Design and Analysis of Machine Learning Based Technique for Malware Identification and Classification of Portable Document Format Files
Sultan S. Alshamrani
Security and Communication Networks (2022) Vol. 2022, pp. 1-10
Open Access | Times Cited: 9
Sultan S. Alshamrani
Security and Communication Networks (2022) Vol. 2022, pp. 1-10
Open Access | Times Cited: 9
Separating Malicious from Benign Software Using Deep Learning Algorithm
Ömer Aslan
Electronics (2023) Vol. 12, Iss. 8, pp. 1861-1861
Open Access | Times Cited: 5
Ömer Aslan
Electronics (2023) Vol. 12, Iss. 8, pp. 1861-1861
Open Access | Times Cited: 5
Deep learning vs. adversarial noise: a battle in malware image analysis
K. A. Asmitha, Vinod Puthuvath, K. A. Rafidha Rehiman, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 9191-9220
Closed Access | Times Cited: 1
K. A. Asmitha, Vinod Puthuvath, K. A. Rafidha Rehiman, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 9191-9220
Closed Access | Times Cited: 1
MalRed: An innovative approach for detecting malware using the red channel analysis of color images
Syed Shakir Hameed Shah, Norziana Jamil, Atta ur Rehman Khan, et al.
Egyptian Informatics Journal (2024) Vol. 26, pp. 100478-100478
Open Access | Times Cited: 1
Syed Shakir Hameed Shah, Norziana Jamil, Atta ur Rehman Khan, et al.
Egyptian Informatics Journal (2024) Vol. 26, pp. 100478-100478
Open Access | Times Cited: 1
Enhanced Image-Based Malware Classification Using Snake Optimization Algorithm With Deep Convolutional Neural Network
Salahaldeen Duraibi
IEEE Access (2024) Vol. 12, pp. 95047-95057
Open Access | Times Cited: 1
Salahaldeen Duraibi
IEEE Access (2024) Vol. 12, pp. 95047-95057
Open Access | Times Cited: 1
Performance evaluation of deep neural network on malware detection: visual feature approach
V. Anandhi, P. Vinod, Varun G. Menon, et al.
Cluster Computing (2022) Vol. 25, Iss. 6, pp. 4601-4615
Open Access | Times Cited: 6
V. Anandhi, P. Vinod, Varun G. Menon, et al.
Cluster Computing (2022) Vol. 25, Iss. 6, pp. 4601-4615
Open Access | Times Cited: 6
BejaGNN: behavior-based Java malware detection via graph neural network
Pengbin Feng, Li Yang, Di Lu, et al.
The Journal of Supercomputing (2023) Vol. 79, Iss. 14, pp. 15390-15414
Open Access | Times Cited: 3
Pengbin Feng, Li Yang, Di Lu, et al.
The Journal of Supercomputing (2023) Vol. 79, Iss. 14, pp. 15390-15414
Open Access | Times Cited: 3