
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
EfficientNet convolutional neural networks-based Android malware detection
Pooja Yadav, Neeraj Menon, Vinayakumar Ravi, et al.
Computers & Security (2022) Vol. 115, pp. 102622-102622
Closed Access | Times Cited: 102
Pooja Yadav, Neeraj Menon, Vinayakumar Ravi, et al.
Computers & Security (2022) Vol. 115, pp. 102622-102622
Closed Access | Times Cited: 102
Showing 1-25 of 102 citing articles:
Malware Detection Using Memory Analysis Data in Big Data Environment
Murat Dener, Gökçe Ok, Abdullah Orman
Applied Sciences (2022) Vol. 12, Iss. 17, pp. 8604-8604
Open Access | Times Cited: 47
Murat Dener, Gökçe Ok, Abdullah Orman
Applied Sciences (2022) Vol. 12, Iss. 17, pp. 8604-8604
Open Access | Times Cited: 47
DroidEncoder: Malware detection using auto-encoder based feature extractor and machine learning algorithms
Halit Bakır, Rezan Bakır
Computers & Electrical Engineering (2023) Vol. 110, pp. 108804-108804
Closed Access | Times Cited: 36
Halit Bakır, Rezan Bakır
Computers & Electrical Engineering (2023) Vol. 110, pp. 108804-108804
Closed Access | Times Cited: 36
Creating Alert Messages Based on Wild Animal Activity Detection Using Hybrid Deep Neural Networks
B Natarajan, R Elakkiya, R. Bhuvaneswari, et al.
IEEE Access (2023) Vol. 11, pp. 67308-67321
Open Access | Times Cited: 34
B Natarajan, R Elakkiya, R. Bhuvaneswari, et al.
IEEE Access (2023) Vol. 11, pp. 67308-67321
Open Access | Times Cited: 34
An effective end-to-end android malware detection method
Huijuan Zhu, Hua-hui Wei, Liangmin Wang, et al.
Expert Systems with Applications (2023) Vol. 218, pp. 119593-119593
Closed Access | Times Cited: 32
Huijuan Zhu, Hua-hui Wei, Liangmin Wang, et al.
Expert Systems with Applications (2023) Vol. 218, pp. 119593-119593
Closed Access | Times Cited: 32
Development of a deep stacked ensemble with process based volatile memory forensics for platform independent malware detection and classification
Hamad Naeem, Shi Dong, Olorunjube James Falana, et al.
Expert Systems with Applications (2023) Vol. 223, pp. 119952-119952
Closed Access | Times Cited: 32
Hamad Naeem, Shi Dong, Olorunjube James Falana, et al.
Expert Systems with Applications (2023) Vol. 223, pp. 119952-119952
Closed Access | Times Cited: 32
Automated Android Malware Detection Using Optimal Ensemble Learning Approach for Cybersecurity
Hayam Alamro, Wafa Mtouaa, Sumayh S. Aljameel, et al.
IEEE Access (2023) Vol. 11, pp. 72509-72517
Open Access | Times Cited: 25
Hayam Alamro, Wafa Mtouaa, Sumayh S. Aljameel, et al.
IEEE Access (2023) Vol. 11, pp. 72509-72517
Open Access | Times Cited: 25
MalBERTv2: Code Aware BERT-Based Model for Malware Identification
Abir Rahali, Moulay A. Akhloufi
Big Data and Cognitive Computing (2023) Vol. 7, Iss. 2, pp. 60-60
Open Access | Times Cited: 24
Abir Rahali, Moulay A. Akhloufi
Big Data and Cognitive Computing (2023) Vol. 7, Iss. 2, pp. 60-60
Open Access | Times Cited: 24
UAV-Assisted IoT Applications, Cybersecurity Threats, AI-Enabled Solutions, Open Challenges With Future Research Directions
Muhammad Adil, Houbing Song, Spyridon Mastorakis, et al.
IEEE Transactions on Intelligent Vehicles (2023) Vol. 9, Iss. 4, pp. 4583-4605
Closed Access | Times Cited: 21
Muhammad Adil, Houbing Song, Spyridon Mastorakis, et al.
IEEE Transactions on Intelligent Vehicles (2023) Vol. 9, Iss. 4, pp. 4583-4605
Closed Access | Times Cited: 21
Explainability in AI-based behavioral malware detection systems
Antonio Galli, Valerio La Gatta, Vincenzo Moscato, et al.
Computers & Security (2024) Vol. 141, pp. 103842-103842
Open Access | Times Cited: 13
Antonio Galli, Valerio La Gatta, Vincenzo Moscato, et al.
Computers & Security (2024) Vol. 141, pp. 103842-103842
Open Access | Times Cited: 13
An Enhanced Minimax Loss Function Technique in Generative Adversarial Network for Ransomware Behavior Prediction
Mazen Gazzan, Frederick T. Sheldon
Future Internet (2023) Vol. 15, Iss. 10, pp. 318-318
Open Access | Times Cited: 16
Mazen Gazzan, Frederick T. Sheldon
Future Internet (2023) Vol. 15, Iss. 10, pp. 318-318
Open Access | Times Cited: 16
Prediction model for bearing surface friction coefficient in bolted joints based on GA-BP neural network and experimental data
Wentao Chen, Ying Li, Zhifeng Liu, et al.
Tribology International (2024) Vol. 201, pp. 110217-110217
Closed Access | Times Cited: 6
Wentao Chen, Ying Li, Zhifeng Liu, et al.
Tribology International (2024) Vol. 201, pp. 110217-110217
Closed Access | Times Cited: 6
Intelligent Pattern Recognition Using Equilibrium Optimizer With Deep Learning Model for Android Malware Detection
Mohammed Maray, Mashael Maashi, Haya Mesfer Alshahrani, et al.
IEEE Access (2024) Vol. 12, pp. 24516-24524
Open Access | Times Cited: 5
Mohammed Maray, Mashael Maashi, Haya Mesfer Alshahrani, et al.
IEEE Access (2024) Vol. 12, pp. 24516-24524
Open Access | Times Cited: 5
GSEDroid: GNN-based Android malware detection framework using lightweight semantic embedding
Jintao Gu, Hongliang Zhu, Zewei Han, et al.
Computers & Security (2024) Vol. 140, pp. 103807-103807
Open Access | Times Cited: 5
Jintao Gu, Hongliang Zhu, Zewei Han, et al.
Computers & Security (2024) Vol. 140, pp. 103807-103807
Open Access | Times Cited: 5
FABLDroid: Malware detection based on hybrid analysis with factor analysis and broad learning methods for android applications
Kazım Kiliç, İsmail Atacak, İbrahim Alper Doğru
Engineering Science and Technology an International Journal (2025) Vol. 62, pp. 101945-101945
Open Access
Kazım Kiliç, İsmail Atacak, İbrahim Alper Doğru
Engineering Science and Technology an International Journal (2025) Vol. 62, pp. 101945-101945
Open Access
Grad-CAM based explanations for multiocular disease detection using Xception net
M Raveenthini, R Lavanya, Raúl Benítez
Image and Vision Computing (2025), pp. 105419-105419
Closed Access
M Raveenthini, R Lavanya, Raúl Benítez
Image and Vision Computing (2025), pp. 105419-105419
Closed Access
Advanced Android Malware Detection: Merging Deep Learning and XGBoost Techniques
Esra Kavalcı Yılmaz, Razan Ghanem
Bilişim Teknolojileri Dergisi (2025) Vol. 18, Iss. 1, pp. 45-61
Open Access
Esra Kavalcı Yılmaz, Razan Ghanem
Bilişim Teknolojileri Dergisi (2025) Vol. 18, Iss. 1, pp. 45-61
Open Access
Precise Tomato Ripeness Estimation and Yield Prediction using Transformer Based Segmentation-SegLoRA
Sidharth N Pisharody, Palmani Duraisamy, Aravind Krishnaswamy Rangarajan, et al.
Computers and Electronics in Agriculture (2025) Vol. 233, pp. 110172-110172
Closed Access
Sidharth N Pisharody, Palmani Duraisamy, Aravind Krishnaswamy Rangarajan, et al.
Computers and Electronics in Agriculture (2025) Vol. 233, pp. 110172-110172
Closed Access
Towards Multi-view Android Malware Detection Through Image-based Deep Learning
Jhonatan Geremias, Eduardo K. Viegas, Altair O. Santin, et al.
2022 International Wireless Communications and Mobile Computing (IWCMC) (2022), pp. 572-577
Closed Access | Times Cited: 23
Jhonatan Geremias, Eduardo K. Viegas, Altair O. Santin, et al.
2022 International Wireless Communications and Mobile Computing (IWCMC) (2022), pp. 572-577
Closed Access | Times Cited: 23
Android Malware Detection Methods Based on Convolutional Neural Network: A Survey
Longhui Shu, Shi Dong, Huadong Su, et al.
IEEE Transactions on Emerging Topics in Computational Intelligence (2023) Vol. 7, Iss. 5, pp. 1330-1350
Closed Access | Times Cited: 14
Longhui Shu, Shi Dong, Huadong Su, et al.
IEEE Transactions on Emerging Topics in Computational Intelligence (2023) Vol. 7, Iss. 5, pp. 1330-1350
Closed Access | Times Cited: 14
A New Framework for Visual Classification of Multi-Channel Malware Based on Transfer Learning
Zilin Zhao, Shumian Yang, Dawei Zhao
Applied Sciences (2023) Vol. 13, Iss. 4, pp. 2484-2484
Open Access | Times Cited: 13
Zilin Zhao, Shumian Yang, Dawei Zhao
Applied Sciences (2023) Vol. 13, Iss. 4, pp. 2484-2484
Open Access | Times Cited: 13
A Malware Detection and Extraction Method for the Related Information Using the ViT Attention Mechanism on Android Operating System
Jeonggeun Jo, Jaeik Cho, Jongsub Moon
Applied Sciences (2023) Vol. 13, Iss. 11, pp. 6839-6839
Open Access | Times Cited: 13
Jeonggeun Jo, Jaeik Cho, Jongsub Moon
Applied Sciences (2023) Vol. 13, Iss. 11, pp. 6839-6839
Open Access | Times Cited: 13
Obfuscated Malware Detection in IoT Android Applications Using Markov Images and CNN
K. A. Dhanya, P. Vinod, Suleiman Y. Yerima, et al.
IEEE Systems Journal (2023) Vol. 17, Iss. 2, pp. 2756-2766
Open Access | Times Cited: 12
K. A. Dhanya, P. Vinod, Suleiman Y. Yerima, et al.
IEEE Systems Journal (2023) Vol. 17, Iss. 2, pp. 2756-2766
Open Access | Times Cited: 12
Advancing Security in the Industrial Internet of Things Using Deep Progressive Neural Networks
Mehul Sharma, Shrid Pant, Priety Yadav, et al.
Mobile Networks and Applications (2023) Vol. 28, Iss. 2, pp. 782-794
Closed Access | Times Cited: 12
Mehul Sharma, Shrid Pant, Priety Yadav, et al.
Mobile Networks and Applications (2023) Vol. 28, Iss. 2, pp. 782-794
Closed Access | Times Cited: 12
A Survey of Recent Advances in Deep Learning Models for Detecting Malware in Desktop and Mobile Platforms
Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
ACM Computing Surveys (2023) Vol. 56, Iss. 6, pp. 1-41
Closed Access | Times Cited: 12
Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury
ACM Computing Surveys (2023) Vol. 56, Iss. 6, pp. 1-41
Closed Access | Times Cited: 12
Explainable Artificial Intelligence-Based IoT Device Malware Detection Mechanism Using Image Visualization and Fine-Tuned CNN-Based Transfer Learning Model
Hamad Naeem, Bandar Alshammari, Farhan Ullah
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-17
Open Access | Times Cited: 21
Hamad Naeem, Bandar Alshammari, Farhan Ullah
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-17
Open Access | Times Cited: 21