OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Large‐scale system identification using self‐adaptive penguin search algorithm
Karthikeyan Udaichi, Ravi Chinaveer Nagappan, Miguel García-Torres, et al.
IET Control Theory and Applications (2023) Vol. 17, Iss. 17, pp. 2292-2303
Open Access | Times Cited: 47

Showing 1-25 of 47 citing articles:

Anomaly-Based Intrusion Detection System Using Bidirectional Long Short-Term Memory for Internet of Things
Praveen Kumar, S. Neduncheliyan, Myasar Mundher Adnan, et al.
(2024) Vol. 13, pp. 01-04
Closed Access | Times Cited: 2

A Wi-Fi Network Experience Quality Evaluation Model based on Network Security
Qiuming Peng
(2024), pp. 1-5
Closed Access | Times Cited: 1

The Application of Computer Algorithms in Marketing Data Analysis and Prediction
Pengfei Jiao, Chunxiang Guo
(2024), pp. 1-5
Closed Access | Times Cited: 1

Cluster Head Selection for Single and Multiple data Sinks in Heterogeneous WSN using Wild Horse Optimization
Mohammed I. Habelalmateen, Gotte Ranjith Kumar, B P Nayana, et al.
(2024), pp. 1-5
Closed Access | Times Cited: 1

ResNet110 and Mask Recurrent Convolutional Neural Network Based Detection and Classification of Colorectal Cancer
Laith H. Alzubaidi, Priyanka Kanth, S Suhas, et al.
(2024), pp. 1-4
Closed Access | Times Cited: 1

Evaluation and Optimization of Machine Learning Algorithms in Personalized Marketing
Chunxiang Guo, Pengfei Jiao
(2024) Vol. 10, pp. 1-5
Closed Access | Times Cited: 1

New Energy Optimization Method Based on Multiple Information Fusion and Visualization
Yichi Liu, Fangquan Wu, Yuan Ji, et al.
(2024), pp. 1-5
Closed Access

Automatic Software Vulnerability Analysis through a Multi-Head Attention and Long Short-Term Memory Approach
Jayapal Lande, N P Tejaswini, Hassan M. Al–Jawahry, et al.
(2024), pp. 1-4
Closed Access

Design of Network Data Monitoring and Control System Based on Internet of Things Technology
Xiaolu Zhang, Wuqiang Shen, Lei Cui
(2024), pp. 1-7
Closed Access

Fraud Detection in Credit Card Using Competitive Swarm Optimization with Support Vector Machine
Ashwini Gajakosh, R Archana Reddy, Myasar Mundher Adnan, et al.
(2024), pp. 1-4
Closed Access

Page 1 - Next Page

Scroll to top