OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Artificial intelligence enabled cyber security defense for smart cities: A novel attack detection framework based on the MDATA model
Yan Jia, Zhaoquan Gu, Lei Du, et al.
Knowledge-Based Systems (2023) Vol. 276, pp. 110781-110781
Closed Access | Times Cited: 40

Showing 1-25 of 40 citing articles:

Artificial Intelligence in Smart Cities—Applications, Barriers, and Future Directions: A Review
Radosław Wolniak, Kinga Stecuła
Smart Cities (2024) Vol. 7, Iss. 3, pp. 1346-1389
Open Access | Times Cited: 32

Smart infrastructure design: Machine learning solutions for securing modern cities
Wei Shuhan, Yu Chengzhi, Liao Xiaoxiao, et al.
Sustainable Cities and Society (2024) Vol. 107, pp. 105439-105439
Closed Access | Times Cited: 6

ARCS: Adaptive Reinforcement Learning Framework for Automated Cybersecurity Incident Response Strategy Optimization
Shaolei Ren, Jianjing Jin, Qi Cao, et al.
Applied Sciences (2025) Vol. 15, Iss. 2, pp. 951-951
Open Access

Graph attention contrastive learning with missing modality for multimodal recommendation
Wenqian Zhao, Kai Yang, Peijin Ding, et al.
Knowledge-Based Systems (2025), pp. 113035-113035
Closed Access

Graph–Regularized Consensus Learning and Diversity Representation for unsupervised multi-view feature selection
Suwa Xu, Xijiong Xie, Zhiwen Cao
Knowledge-Based Systems (2025), pp. 113043-113043
Closed Access

IReGNN: Implicit review-enhanced graph neural network for explainable recommendation
Qingbo Hao, Chundong Wang, Yingyuan Xiao, et al.
Knowledge-Based Systems (2025) Vol. 311, pp. 113113-113113
Closed Access

TVC Former: A transformer-based long-term multivariate time series forecasting method using time-variable coupling correlation graph
Zhenyu Liu, Yuan Feng, Hui Liu, et al.
Knowledge-Based Systems (2025), pp. 113147-113147
Closed Access

Semantic relation-aware graph attention network with noise augmented layer-wise contrastive learning for recommendation
Jianfang Liu, Wei Wang, Baolin Yi, et al.
Knowledge-Based Systems (2025), pp. 113217-113217
Closed Access

Enhancing Cybersecurity Defenses: A Comprehensive Exploration of Applied Artificial Intelligence Strategies
Balaram Yadav Kasula, Pawan Whig
Lecture notes in networks and systems (2025), pp. 43-55
Closed Access

Artificial intelligence-driven security framework for internet of things-enhanced digital twin networks
Samuel D. Okegbile, Ishaya Gambo
Internet of Things (2025), pp. 101564-101564
Closed Access

Securing tomorrow’s urban frontiers: A holistic approach to cybersecurity in smart cities
Amaresh Jha, Ananya Jha
Information System and Smart City (2024) Vol. 3, Iss. 1
Open Access | Times Cited: 3

Billiard based optimization with deep learning driven anomaly detection in internet of things assisted sustainable smart cities
P. Manickam, M. Girija, Sailesh Sathish, et al.
Alexandria Engineering Journal (2023) Vol. 83, pp. 102-112
Open Access | Times Cited: 8

A multi-step attack identification and correlation method based on multi-information fusion
Niandong Liao, Jiaxun Wang, Jiayu Guan, et al.
Computers & Electrical Engineering (2024) Vol. 117, pp. 109249-109249
Closed Access | Times Cited: 2

A Review of Hybrid Cyber Threats Modelling and Detection Using Artificial Intelligence in IIoT
Yifan Liu, Shancang Li, Xinheng Wang, et al.
Computer Modeling in Engineering & Sciences (2024) Vol. 140, Iss. 2, pp. 1233-1261
Open Access | Times Cited: 2

IPAttributor: Cyber Attacker Attribution with Threat Intelligence-Enriched Intrusion Data
Xiayu Xiang, Hao Liu, Liyi Zeng, et al.
Mathematics (2024) Vol. 12, Iss. 9, pp. 1364-1364
Open Access | Times Cited: 2

Hybrid quantum architecture for smart city security
Vita Santa Barletta, Danilo Caivano, Mirko De Vincentiis, et al.
Journal of Systems and Software (2024) Vol. 217, pp. 112161-112161
Open Access | Times Cited: 2

AGCN-Domain: Detecting Malicious Domains with Graph Convolutional Network and Attention Mechanism
Xi Luo, Yixin Li, Hongyuan Cheng, et al.
Mathematics (2024) Vol. 12, Iss. 5, pp. 640-640
Open Access | Times Cited: 1

Hack me if you can: Aggregating autoencoders for countering persistent access threats within highly imbalanced data
Sidahmed Benabderrahmane, Ngoc T. Hoang, Petko Valtchev, et al.
Future Generation Computer Systems (2024) Vol. 160, pp. 926-941
Open Access | Times Cited: 1

Unsupervised feature selection based on bipartite graph and low-redundant regularization
Longyan Xiang, Hongmei Chen, Tengyu Yin, et al.
Knowledge-Based Systems (2024) Vol. 302, pp. 112379-112379
Closed Access | Times Cited: 1

Contrastive learning for fair graph representations via counterfactual graph augmentation
Chengyu Li, Debo Cheng, Guixian Zhang, et al.
Knowledge-Based Systems (2024) Vol. 305, pp. 112635-112635
Closed Access | Times Cited: 1

Towards a conceptual framework for AI-driven anomaly detection in smart city IoT networks for enhanced cybersecurity
H. Zeng, Manal Yunis, Ayman Khalil, et al.
Journal of Innovation & Knowledge (2024) Vol. 9, Iss. 4, pp. 100601-100601
Open Access | Times Cited: 1

Hierarchical Pattern-Based Complex Query of Temporal Knowledge Graph
Lin Zhu, Heng Zhang, Luyi Bai
Knowledge-Based Systems (2023) Vol. 284, pp. 111301-111301
Closed Access | Times Cited: 3

Android Malware Detection Based on Hypergraph Neural Networks
Dehua Zhang, Xiangbo Wu, Erlu He, et al.
Applied Sciences (2023) Vol. 13, Iss. 23, pp. 12629-12629
Open Access | Times Cited: 2

Security analysis and monitoring assessment of networked printers: A report
Quanbo Pan, Shengbao Li, Na Li, et al.
Electronics Letters (2024) Vol. 60, Iss. 3
Open Access

Research on the Simulation Method of HTTP Traffic Based on GAN
Chenglin Yang, Dongliang Xu, Xiao Ma
Applied Sciences (2024) Vol. 14, Iss. 5, pp. 2121-2121
Open Access

Page 1 - Next Page

Scroll to top