
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
GPMT: Generating practical malicious traffic based on adversarial attacks with little prior knowledge
Peishuai Sun, Shuhao Li, Jiang Xie, et al.
Computers & Security (2023) Vol. 130, pp. 103257-103257
Closed Access | Times Cited: 4
Peishuai Sun, Shuhao Li, Jiang Xie, et al.
Computers & Security (2023) Vol. 130, pp. 103257-103257
Closed Access | Times Cited: 4
Showing 4 citing articles:
Adversarial Attacks and Defenses in Machine Learning-Empowered Communication Systems and Networks: A Contemporary Survey
Yulong Wang, Tong Sun, Shenghong Li, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 4, pp. 2245-2298
Closed Access | Times Cited: 36
Yulong Wang, Tong Sun, Shenghong Li, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 4, pp. 2245-2298
Closed Access | Times Cited: 36
A Targeted Adversarial Attack Method for Multi-Classification Malicious Traffic Detection
Peishuai Sun, Chengxiang Si, Shuhao Li, et al.
ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2024), pp. 4765-4769
Closed Access | Times Cited: 1
Peishuai Sun, Chengxiang Si, Shuhao Li, et al.
ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2024), pp. 4765-4769
Closed Access | Times Cited: 1
Towards realistic problem-space adversarial attacks against machine learning in network intrusion detection
Marta Catillo, Antonio Pecchia, Antonio Repola, et al.
Proceedings of the 17th International Conference on Availability, Reliability and Security (2024), pp. 1-8
Closed Access | Times Cited: 1
Marta Catillo, Antonio Pecchia, Antonio Repola, et al.
Proceedings of the 17th International Conference on Availability, Reliability and Security (2024), pp. 1-8
Closed Access | Times Cited: 1
An Encrypted Traffic Classification Approach Based on Path Signature Features and LSTM
Y Mei, Nurbol Luktarhan, Guodong Zhao, et al.
Electronics (2024) Vol. 13, Iss. 15, pp. 3060-3060
Open Access
Y Mei, Nurbol Luktarhan, Guodong Zhao, et al.
Electronics (2024) Vol. 13, Iss. 15, pp. 3060-3060
Open Access