OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Encrypted traffic classification based on Gaussian mixture models and Hidden Markov Models
Zhongjiang Yao, Jingguo Ge, Yulei Wu, et al.
Journal of Network and Computer Applications (2020) Vol. 166, pp. 102711-102711
Closed Access | Times Cited: 51

Showing 1-25 of 51 citing articles:

DISTILLER: Encrypted traffic classification via multimodal multitask deep learning
Giuseppe Aceto, Domenico Ciuonzo, Antonio Montieri, et al.
Journal of Network and Computer Applications (2021) Vol. 183-184, pp. 102985-102985
Closed Access | Times Cited: 134

Tree-RNN: Tree structural recurrent neural network for network traffic classification
Xinming Ren, Huaxi Gu, Wenting Wei
Expert Systems with Applications (2020) Vol. 167, pp. 114363-114363
Closed Access | Times Cited: 84

MATEC: A lightweight neural network for online encrypted traffic classification
Jin Cheng, Yulei Wu, E Yuepeng, et al.
Computer Networks (2021) Vol. 199, pp. 108472-108472
Closed Access | Times Cited: 50

ICLSTM: Encrypted Traffic Service Identification Based on Inception-LSTM Neural Network
Bei Lu, Nurbol Luktarhan, Chao Ding, et al.
Symmetry (2021) Vol. 13, Iss. 6, pp. 1080-1080
Open Access | Times Cited: 36

CLD-Net: A Network Combining CNN and LSTM for Internet Encrypted Traffic Classification
Xinyi Hu, Chunxiang Gu, Fushan Wei
Security and Communication Networks (2021) Vol. 2021, pp. 1-15
Open Access | Times Cited: 33

Online multimedia traffic classification from the QoS perspective using deep learning
Zheng Wu, Yuning Dong, Xiaohui Qiu, et al.
Computer Networks (2022) Vol. 204, pp. 108716-108716
Closed Access | Times Cited: 22

A clustering-based approach for classifying data streams using graph matching
Yuxin Du, Mingshu He, Xiaojuan Wang
Journal Of Big Data (2025) Vol. 12, Iss. 1
Open Access

A double-layer fault diagnosis strategy for electric vehicle batteries based on Gaussian mixture model
Shuhui Wang, Zhenpo Wang, Ximing Cheng, et al.
Energy (2023) Vol. 281, pp. 128318-128318
Closed Access | Times Cited: 12

Real-Time Encrypted Traffic Classification via Lightweight Neural Networks
Jin Cheng, Runkang He, E Yuepeng, et al.
GLOBECOM 2022 - 2022 IEEE Global Communications Conference (2020)
Closed Access | Times Cited: 24

CapBad: Content-Agnostic, Payload-Based Anomaly Detector for Industrial Control Protocols
Jun Cai, Qi Wang, Jianzhen Luo, et al.
IEEE Internet of Things Journal (2021) Vol. 9, Iss. 14, pp. 12542-12554
Closed Access | Times Cited: 20

A Robust DNS Flood Attack Detection with a Hybrid Deeper Learning Model
Ömer KASIM
Computers & Electrical Engineering (2022) Vol. 100, pp. 107883-107883
Closed Access | Times Cited: 11

Is Encrypted ClientHello a Challenge for Traffic Classification?
Danil Shamsimukhametov, Anton Kurapov, Mikhail Liubogoshchev, et al.
IEEE Access (2022) Vol. 10, pp. 77883-77897
Open Access | Times Cited: 10

A new dynamic security defense system based on TCP_REPAIR and deep learning
Jianxun Tang, Mingsong Chen, Haoyu Chen, et al.
Journal of Cloud Computing Advances Systems and Applications (2023) Vol. 12, Iss. 1
Open Access | Times Cited: 5

PFFN: Periodic Feature-Folding Deep Neural Network for Traffic Condition Forecasting
Tiange Wang, Zijun Zhang, Kwok‐Leung Tsui
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 2, pp. 3108-3120
Closed Access | Times Cited: 5

Encrypt DNS Traffic: Automated Feature Learning Method for Detecting DNS Tunnels
Shuai Ding, Daoqing Zhang, Jingguo Ge, et al.
(2021), pp. 352-359
Closed Access | Times Cited: 12

Base Station handover Based on User Trajectory Prediction in 5G Networks
Yuxiang Ma, Xuefei Chen, Lei Zhang
(2021), pp. 1476-1482
Closed Access | Times Cited: 11

Encrypted 5G Over- The- Top Voice Traffic Identification Based on Deep Learning
Zhuang Qiao, Liuqun Zhai, Shunliang Zhang, et al.
2022 IEEE Symposium on Computers and Communications (ISCC) (2021), pp. 1-7
Closed Access | Times Cited: 10

Diagnosis method based on hidden Markov model and Weibull mixture model for mechanical faults of in-wheel motors
Hongtao Xue, Bingchen Liu, Dianyong Ding, et al.
Measurement Science and Technology (2022) Vol. 33, Iss. 11, pp. 114002-114002
Closed Access | Times Cited: 7

High-performance Network Traffic Classification Based on Graph Neural Network
Bo Pang, Yongquan Fu, Siyuan Ren, et al.
2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) (2023)
Closed Access | Times Cited: 3

AI-driven data security and privacy
Zheng Yan, Willy Susilo, Elisa Bertino, et al.
Journal of Network and Computer Applications (2020) Vol. 172, pp. 102842-102842
Closed Access | Times Cited: 8

Transfer Learning for Encrypted Malicious Traffic Detection Based on Efficientnet
Surong Zhang, Youjun Bu, Bo Chen, et al.
(2021), pp. 72-76
Closed Access | Times Cited: 7

Malware Classification with GMM-HMM Models
Jing Zhao, Samanvitha Basole, Mark Stamp
(2021), pp. 753-762
Open Access | Times Cited: 6

A VPN-Encrypted Traffic Identification Method Based on Ensemble Learning
Jie Cao, Xing-Liang Yuan, Ying Cui, et al.
Applied Sciences (2022) Vol. 12, Iss. 13, pp. 6434-6434
Open Access | Times Cited: 3

CM-UTC: A Cost-sensitive Matrix based Method for Unknown Encrypted Traffic Classification
Zhiyuan Gao, Jinguo Li, Liangliang Wang, et al.
The Computer Journal (2024) Vol. 67, Iss. 7, pp. 2441-2452
Closed Access

TLS fingerprint for encrypted malicious traffic detection with attributed graph kernel
Linxiao Yu, Jun Tao, Yifan Xu, et al.
Computer Networks (2024) Vol. 247, pp. 110475-110475
Closed Access

Page 1 - Next Page

Scroll to top