OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Few-shot IoT attack detection based on SSDSAE and adaptive loss weighted meta residual network
Wengang Ma, Liang Ma, Kehong Li, et al.
Information Fusion (2023) Vol. 98, pp. 101853-101853
Closed Access | Times Cited: 10

Showing 10 citing articles:

A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges
Tinshu Sasi, Arash Habibi Lashkari, Rongxing Lu, et al.
Journal of Information and Intelligence (2023) Vol. 2, Iss. 6, pp. 455-513
Open Access | Times Cited: 33

HAE-HRL: A network intrusion detection system utilizing a novel autoencoder and a hybrid enhanced LSTM-CNN-based residual network
Yankun Xue, Chunying Kang, Hongcheng Yu
Computers & Security (2025), pp. 104328-104328
Closed Access | Times Cited: 1

Classification of Multiclass DDOS Attack Detection Using Bayesian Weighted Random Forest Optimized With Gazelle Optimization Algorithm
R. Barona, E. Babu Raj
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 4
Closed Access

Deep Shallow network with LSTM for detecting attacks in IoT networks and preserving privacy based on Adaptive hybrid encryption algorithm
Dhruv Mahajan, A. Jeyasekar
Expert Systems with Applications (2025), pp. 128050-128050
Closed Access

TemporalHAN: Hierarchical attention-based heterogeneous temporal network embedding
Xian Mo, Binyuan Wan, Rui Tang
Engineering Applications of Artificial Intelligence (2024) Vol. 133, pp. 108376-108376
Closed Access | Times Cited: 2

Multi-source refined adversarial domain adaptation with transfer complementarity infusion for IoT intrusion detection under limited samples
Kehong Li, Wengang Ma, Duan Huawei, et al.
Expert Systems with Applications (2024) Vol. 254, pp. 124352-124352
Closed Access | Times Cited: 1

Machine learning-based attack detection for the Internet of Things
Dawit Dejene Bikila, Jan Čapek
Future Generation Computer Systems (2024), pp. 107630-107630
Closed Access | Times Cited: 1

Machine Learning-Based Attack Detection for the Internet of Things
Dawit Dejene Bikila, Jan Čapek
(2024)
Closed Access

Examining IoT in the Angle of Security with Counter measures – A Study
R. Parameswari, Dhanwanth Rao Varala Balaji
Salud Ciencia y Tecnología - Serie de Conferencias (2024) Vol. 3
Closed Access

A Comparative Analysis of Medical IoT Device Attacks Using Machine Learning Models
Mubashir Mohsin, Akinul Islam Jony
Malaysian Journal of Science and Advanced Technology (2024), pp. 429-439
Open Access

Deep Learning-Based Network Intrusion Detection Systems: A Systematic Literature Review
Leonard L. Mutembei, Makhamisa Senekane, Terence L. van Zyl
Communications in computer and information science (2024), pp. 207-234
Closed Access

Page 1

Scroll to top