OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

DL-AMDet: Deep learning-based malware detector for android
Ahmed R. Nasser, Ahmed Mudheher Hasan, Amjad J. Humaidi
Intelligent Systems with Applications (2023) Vol. 21, pp. 200318-200318
Open Access | Times Cited: 25

Showing 25 citing articles:

An Improved Ensemble-Based Cardiovascular Disease Detection System with Chi-Square Feature Selection
Ayad Esho Korial, Ivan Isho Gorial, Amjad J. Humaidi
Computers (2024) Vol. 13, Iss. 6, pp. 126-126
Open Access | Times Cited: 12

Anti-disturbance control design of Exoskeleton Knee robotic system for rehabilitative care
Ayad Q. Al-Dujaili, Alaq F. Hasan, Amjad J. Humaidi, et al.
Heliyon (2024) Vol. 10, Iss. 9, pp. e28911-e28911
Open Access | Times Cited: 10

Adaptive Integral Sliding Mode Controller (SMC) Design for Vehicle Steer-by-Wire System
Saad Jabbar Abbas, Suha S. Husain, Saba Al-Wais, et al.
SAE International journal of vehicle dynamics, stability, and NVH (2024) Vol. 8, Iss. 3
Closed Access | Times Cited: 8

Enhancing Robot Inclusivity in the Built Environment: A Digital Twin-Assisted Assessment of Design Guideline Compliance
Anilkumar Ezhilarasu, J. J. J. Pey, M. A. Viraj J. Muthugala, et al.
Buildings (2024) Vol. 14, Iss. 5, pp. 1193-1193
Open Access | Times Cited: 5

A modified CNN-IDS Model for Enhancing the Efficacy of Intrusion Detection System
Ruqaya Abdulhasan Abed, Ekhlas Kadhum Hamza, Amjad J. Humaidi
Measurement Sensors (2024) Vol. 35, pp. 101299-101299
Open Access | Times Cited: 5

Modified Ant Colony Optimization to Improve Energy Consumption of Cruiser Boundary Tour with Internet of Underwater Things
H. A. Mohammed, Mustafa Ibrahim Mansoor, Ahmed R. Nasser, et al.
Computers (2025) Vol. 14, Iss. 2, pp. 74-74
Open Access

Advanced Stealth Protection for Android Devices
Govind Suryawanshi, S. C. Patil, Krishna Sharma, et al.
(2025), pp. 1-6
Closed Access

Synthetic Corpus Generation for Deep Learning-Based Translation of Spanish Sign Language
Marina Perea-Trigo, Celia Botella-López, Miguel Ángel Martínez del Amor, et al.
Sensors (2024) Vol. 24, Iss. 5, pp. 1472-1472
Open Access | Times Cited: 3

Image-based malware detection based on convolution neural network with autoencoder in Industrial Internet of Things using Software Defined Networking Honeypot
Sanjeev Kumar, Anil Kumar
Engineering Applications of Artificial Intelligence (2024) Vol. 133, pp. 108374-108374
Closed Access | Times Cited: 3

Event-Triggered Synchronization of Coupled Neural Networks with Reaction–Diffusion Terms
Abulajiang Aili, Shenglong Chen, Sibao Zhang
Mathematics (2024) Vol. 12, Iss. 9, pp. 1409-1409
Open Access | Times Cited: 2

vDefender: An explainable and introspection-based approach for identifying emerging malware behaviour at hypervisor-layer in virtualization environment
Avantika Gaur, Preeti Mishra, P. Vinod, et al.
Computers & Electrical Engineering (2024) Vol. 120, pp. 109742-109742
Closed Access | Times Cited: 1

Application of Deep Learning Models for Real-Time Automatic Malware Detection
Rommel Gutierrez, William Villegas-Ch, Lorena Naranjo Godoy, et al.
IEEE Access (2024) Vol. 12, pp. 107742-107756
Open Access | Times Cited: 1

Hybrid feature extraction and integrated deep learning for cloud-based malware detection
Pham Sy Nguyen, Tran Nhat Huy, Tong Anh Tuan, et al.
Computers & Security (2024), pp. 104233-104233
Closed Access | Times Cited: 1

MPDroid: A multimodal pre-training Android malware detection method with static and dynamic features
Sanfeng Zhang, Heng Su, Hongxian Liu, et al.
Computers & Security (2024) Vol. 150, pp. 104262-104262
Closed Access | Times Cited: 1

A Comprehensive Review of Cyber-Attacks Targeting IoT Systems and Their Security Measures
Maryam Lazim Mutleg, Ali M. Mahmood, Muna Mohammed Jawad Al-Nayar
International Journal of Safety and Security Engineering (2024) Vol. 14, Iss. 4, pp. 1073-1086
Open Access

MIDC: Medical Image Dataset Cleaning Framework Based on Deep Learning
Sanli Yi, Ziyan Chen
Heliyon (2024) Vol. 10, Iss. 19, pp. e38910-e38910
Open Access

Enhanced photovoltaic system performance through SEPIC converter optimization using hybrid ANN-PSO algorithm with MPPT strategy
Rawia M. Esmil, Ahmed R. Ajel, Mahdi Ferhan Bonnya
AIP conference proceedings (2024) Vol. 3232, pp. 050020-050020
Closed Access

Design and implementation of closed-loop drug management in the pharmaceutical industry
Narges N. Abdulhussein, Alaa K. Al-Azzawi, Ahmed R. Ajel
AIP conference proceedings (2024) Vol. 3232, pp. 040008-040008
Closed Access

A Malware Detection Method Based On Genetic Algorithm Optimized CNN-Senet Network
Yang Zheng, Zhu Hua, Li Zhao, et al.
IEEE Access (2024) Vol. 12, pp. 160052-160063
Open Access

Android traffic malware analysis and detection using ensemble classifier
A. Mohanraj, K. Sivasankari
Ain Shams Engineering Journal (2024), pp. 103134-103134
Open Access

Android Malware Detection Using Learning Techniques: A Review
Sumesh Kharnotia, Bhavna Arora
Lecture notes in networks and systems (2024), pp. 271-283
Closed Access

A brief survey of deep learning methods for android Malware detection
Abdurraheem Joomye, Mee Hong Ling, Kok‐Lim Alvin Yau
International Journal of Systems Assurance Engineering and Management (2024) Vol. 16, Iss. 2, pp. 711-733
Closed Access

ISAnWin: inductive generalized zero-shot learning using deep CNN for malware detection across windows and android platforms
Umm-e-Hani Tayyab, Faiza Babar Khan, Asifullah Khan, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e2604-e2604
Open Access

A Novel Cyber Threat Intelligence (CTI) Framework for Detecting Android Malware: Work on Progress
AndyanKalmer Wijaya, Deris Stiawan, Abdiansah Abdiansah, et al.
(2024), pp. 95-100
Closed Access

Page 1

Scroll to top