
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
DL-AMDet: Deep learning-based malware detector for android
Ahmed R. Nasser, Ahmed Mudheher Hasan, Amjad J. Humaidi
Intelligent Systems with Applications (2023) Vol. 21, pp. 200318-200318
Open Access | Times Cited: 25
Ahmed R. Nasser, Ahmed Mudheher Hasan, Amjad J. Humaidi
Intelligent Systems with Applications (2023) Vol. 21, pp. 200318-200318
Open Access | Times Cited: 25
Showing 25 citing articles:
An Improved Ensemble-Based Cardiovascular Disease Detection System with Chi-Square Feature Selection
Ayad Esho Korial, Ivan Isho Gorial, Amjad J. Humaidi
Computers (2024) Vol. 13, Iss. 6, pp. 126-126
Open Access | Times Cited: 12
Ayad Esho Korial, Ivan Isho Gorial, Amjad J. Humaidi
Computers (2024) Vol. 13, Iss. 6, pp. 126-126
Open Access | Times Cited: 12
Anti-disturbance control design of Exoskeleton Knee robotic system for rehabilitative care
Ayad Q. Al-Dujaili, Alaq F. Hasan, Amjad J. Humaidi, et al.
Heliyon (2024) Vol. 10, Iss. 9, pp. e28911-e28911
Open Access | Times Cited: 10
Ayad Q. Al-Dujaili, Alaq F. Hasan, Amjad J. Humaidi, et al.
Heliyon (2024) Vol. 10, Iss. 9, pp. e28911-e28911
Open Access | Times Cited: 10
Adaptive Integral Sliding Mode Controller (SMC) Design for Vehicle Steer-by-Wire System
Saad Jabbar Abbas, Suha S. Husain, Saba Al-Wais, et al.
SAE International journal of vehicle dynamics, stability, and NVH (2024) Vol. 8, Iss. 3
Closed Access | Times Cited: 8
Saad Jabbar Abbas, Suha S. Husain, Saba Al-Wais, et al.
SAE International journal of vehicle dynamics, stability, and NVH (2024) Vol. 8, Iss. 3
Closed Access | Times Cited: 8
Enhancing Robot Inclusivity in the Built Environment: A Digital Twin-Assisted Assessment of Design Guideline Compliance
Anilkumar Ezhilarasu, J. J. J. Pey, M. A. Viraj J. Muthugala, et al.
Buildings (2024) Vol. 14, Iss. 5, pp. 1193-1193
Open Access | Times Cited: 5
Anilkumar Ezhilarasu, J. J. J. Pey, M. A. Viraj J. Muthugala, et al.
Buildings (2024) Vol. 14, Iss. 5, pp. 1193-1193
Open Access | Times Cited: 5
A modified CNN-IDS Model for Enhancing the Efficacy of Intrusion Detection System
Ruqaya Abdulhasan Abed, Ekhlas Kadhum Hamza, Amjad J. Humaidi
Measurement Sensors (2024) Vol. 35, pp. 101299-101299
Open Access | Times Cited: 5
Ruqaya Abdulhasan Abed, Ekhlas Kadhum Hamza, Amjad J. Humaidi
Measurement Sensors (2024) Vol. 35, pp. 101299-101299
Open Access | Times Cited: 5
Modified Ant Colony Optimization to Improve Energy Consumption of Cruiser Boundary Tour with Internet of Underwater Things
H. A. Mohammed, Mustafa Ibrahim Mansoor, Ahmed R. Nasser, et al.
Computers (2025) Vol. 14, Iss. 2, pp. 74-74
Open Access
H. A. Mohammed, Mustafa Ibrahim Mansoor, Ahmed R. Nasser, et al.
Computers (2025) Vol. 14, Iss. 2, pp. 74-74
Open Access
Advanced Stealth Protection for Android Devices
Govind Suryawanshi, S. C. Patil, Krishna Sharma, et al.
(2025), pp. 1-6
Closed Access
Govind Suryawanshi, S. C. Patil, Krishna Sharma, et al.
(2025), pp. 1-6
Closed Access
Synthetic Corpus Generation for Deep Learning-Based Translation of Spanish Sign Language
Marina Perea-Trigo, Celia Botella-López, Miguel Ángel Martínez del Amor, et al.
Sensors (2024) Vol. 24, Iss. 5, pp. 1472-1472
Open Access | Times Cited: 3
Marina Perea-Trigo, Celia Botella-López, Miguel Ángel Martínez del Amor, et al.
Sensors (2024) Vol. 24, Iss. 5, pp. 1472-1472
Open Access | Times Cited: 3
Image-based malware detection based on convolution neural network with autoencoder in Industrial Internet of Things using Software Defined Networking Honeypot
Sanjeev Kumar, Anil Kumar
Engineering Applications of Artificial Intelligence (2024) Vol. 133, pp. 108374-108374
Closed Access | Times Cited: 3
Sanjeev Kumar, Anil Kumar
Engineering Applications of Artificial Intelligence (2024) Vol. 133, pp. 108374-108374
Closed Access | Times Cited: 3
Event-Triggered Synchronization of Coupled Neural Networks with Reaction–Diffusion Terms
Abulajiang Aili, Shenglong Chen, Sibao Zhang
Mathematics (2024) Vol. 12, Iss. 9, pp. 1409-1409
Open Access | Times Cited: 2
Abulajiang Aili, Shenglong Chen, Sibao Zhang
Mathematics (2024) Vol. 12, Iss. 9, pp. 1409-1409
Open Access | Times Cited: 2
vDefender: An explainable and introspection-based approach for identifying emerging malware behaviour at hypervisor-layer in virtualization environment
Avantika Gaur, Preeti Mishra, P. Vinod, et al.
Computers & Electrical Engineering (2024) Vol. 120, pp. 109742-109742
Closed Access | Times Cited: 1
Avantika Gaur, Preeti Mishra, P. Vinod, et al.
Computers & Electrical Engineering (2024) Vol. 120, pp. 109742-109742
Closed Access | Times Cited: 1
Application of Deep Learning Models for Real-Time Automatic Malware Detection
Rommel Gutierrez, William Villegas-Ch, Lorena Naranjo Godoy, et al.
IEEE Access (2024) Vol. 12, pp. 107742-107756
Open Access | Times Cited: 1
Rommel Gutierrez, William Villegas-Ch, Lorena Naranjo Godoy, et al.
IEEE Access (2024) Vol. 12, pp. 107742-107756
Open Access | Times Cited: 1
Hybrid feature extraction and integrated deep learning for cloud-based malware detection
Pham Sy Nguyen, Tran Nhat Huy, Tong Anh Tuan, et al.
Computers & Security (2024), pp. 104233-104233
Closed Access | Times Cited: 1
Pham Sy Nguyen, Tran Nhat Huy, Tong Anh Tuan, et al.
Computers & Security (2024), pp. 104233-104233
Closed Access | Times Cited: 1
MPDroid: A multimodal pre-training Android malware detection method with static and dynamic features
Sanfeng Zhang, Heng Su, Hongxian Liu, et al.
Computers & Security (2024) Vol. 150, pp. 104262-104262
Closed Access | Times Cited: 1
Sanfeng Zhang, Heng Su, Hongxian Liu, et al.
Computers & Security (2024) Vol. 150, pp. 104262-104262
Closed Access | Times Cited: 1
A Comprehensive Review of Cyber-Attacks Targeting IoT Systems and Their Security Measures
Maryam Lazim Mutleg, Ali M. Mahmood, Muna Mohammed Jawad Al-Nayar
International Journal of Safety and Security Engineering (2024) Vol. 14, Iss. 4, pp. 1073-1086
Open Access
Maryam Lazim Mutleg, Ali M. Mahmood, Muna Mohammed Jawad Al-Nayar
International Journal of Safety and Security Engineering (2024) Vol. 14, Iss. 4, pp. 1073-1086
Open Access
MIDC: Medical Image Dataset Cleaning Framework Based on Deep Learning
Sanli Yi, Ziyan Chen
Heliyon (2024) Vol. 10, Iss. 19, pp. e38910-e38910
Open Access
Sanli Yi, Ziyan Chen
Heliyon (2024) Vol. 10, Iss. 19, pp. e38910-e38910
Open Access
Enhanced photovoltaic system performance through SEPIC converter optimization using hybrid ANN-PSO algorithm with MPPT strategy
Rawia M. Esmil, Ahmed R. Ajel, Mahdi Ferhan Bonnya
AIP conference proceedings (2024) Vol. 3232, pp. 050020-050020
Closed Access
Rawia M. Esmil, Ahmed R. Ajel, Mahdi Ferhan Bonnya
AIP conference proceedings (2024) Vol. 3232, pp. 050020-050020
Closed Access
Design and implementation of closed-loop drug management in the pharmaceutical industry
Narges N. Abdulhussein, Alaa K. Al-Azzawi, Ahmed R. Ajel
AIP conference proceedings (2024) Vol. 3232, pp. 040008-040008
Closed Access
Narges N. Abdulhussein, Alaa K. Al-Azzawi, Ahmed R. Ajel
AIP conference proceedings (2024) Vol. 3232, pp. 040008-040008
Closed Access
A Malware Detection Method Based On Genetic Algorithm Optimized CNN-Senet Network
Yang Zheng, Zhu Hua, Li Zhao, et al.
IEEE Access (2024) Vol. 12, pp. 160052-160063
Open Access
Yang Zheng, Zhu Hua, Li Zhao, et al.
IEEE Access (2024) Vol. 12, pp. 160052-160063
Open Access
Android traffic malware analysis and detection using ensemble classifier
A. Mohanraj, K. Sivasankari
Ain Shams Engineering Journal (2024), pp. 103134-103134
Open Access
A. Mohanraj, K. Sivasankari
Ain Shams Engineering Journal (2024), pp. 103134-103134
Open Access
Optimizing Machine Learning Models with Data-level Approximate Computing: The Role of Diverse Sampling, Precision Scaling, Quantization and Feature Selection Strategies
Ayad Dalloo, Amjad J. Humaidi
Results in Engineering (2024), pp. 103451-103451
Open Access
Ayad Dalloo, Amjad J. Humaidi
Results in Engineering (2024), pp. 103451-103451
Open Access
Android Malware Detection Using Learning Techniques: A Review
Sumesh Kharnotia, Bhavna Arora
Lecture notes in networks and systems (2024), pp. 271-283
Closed Access
Sumesh Kharnotia, Bhavna Arora
Lecture notes in networks and systems (2024), pp. 271-283
Closed Access
A brief survey of deep learning methods for android Malware detection
Abdurraheem Joomye, Mee Hong Ling, Kok‐Lim Alvin Yau
International Journal of Systems Assurance Engineering and Management (2024) Vol. 16, Iss. 2, pp. 711-733
Closed Access
Abdurraheem Joomye, Mee Hong Ling, Kok‐Lim Alvin Yau
International Journal of Systems Assurance Engineering and Management (2024) Vol. 16, Iss. 2, pp. 711-733
Closed Access
ISAnWin: inductive generalized zero-shot learning using deep CNN for malware detection across windows and android platforms
Umm-e-Hani Tayyab, Faiza Babar Khan, Asifullah Khan, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e2604-e2604
Open Access
Umm-e-Hani Tayyab, Faiza Babar Khan, Asifullah Khan, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e2604-e2604
Open Access
A Novel Cyber Threat Intelligence (CTI) Framework for Detecting Android Malware: Work on Progress
AndyanKalmer Wijaya, Deris Stiawan, Abdiansah Abdiansah, et al.
(2024), pp. 95-100
Closed Access
AndyanKalmer Wijaya, Deris Stiawan, Abdiansah Abdiansah, et al.
(2024), pp. 95-100
Closed Access