OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Deep Learning-Based Intrusion Detection Systems: A Systematic Review
Jan Lánský, Saqib Ali, Mokhtar Mohammadi, et al.
IEEE Access (2021) Vol. 9, pp. 101574-101599
Open Access | Times Cited: 159

Showing 1-25 of 159 citing articles:

Deep transfer learning for intrusion detection in industrial control networks: A comprehensive review
Hamza Kheddar, Yassine Himeur, Ali Ismail Awad
Journal of Network and Computer Applications (2023) Vol. 220, pp. 103760-103760
Open Access | Times Cited: 45

A Survey of Deep Learning Technologies for Intrusion Detection in Internet of Things
Han Liao, Mohd Zamri Murah, Mohammad Kamrul Hasan, et al.
IEEE Access (2024) Vol. 12, pp. 4745-4761
Open Access | Times Cited: 17

Signature-based intrusion detection using machine learning and deep learning approaches empowered with fuzzy clustering
Usama Ahmed, Mohammad Nazir, Amna Sarwar, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access | Times Cited: 2

TAD: Transfer learning-based multi-adversarial detection of evasion attacks against network intrusion detection systems
Islam Debicha, Richard Bauwens, Thibault Debatty, et al.
Future Generation Computer Systems (2022) Vol. 138, pp. 185-197
Open Access | Times Cited: 38

Res-TranBiLSTM: An intelligent approach for intrusion detection in the Internet of Things
Shiyu Wang, Wenxiang Xu, Yiwen Liu
Computer Networks (2023) Vol. 235, pp. 109982-109982
Open Access | Times Cited: 35

Robust detection of unknown DoS/DDoS attacks in IoT networks using a hybrid learning model
Xuan-Ha Nguyen, Kim-Hung Le
Internet of Things (2023) Vol. 23, pp. 100851-100851
Closed Access | Times Cited: 34

A lightweight intrusion detection method for IoT based on deep learning and dynamic quantization
Zhendong Wang, Hui Chen, Shuxin Yang, et al.
PeerJ Computer Science (2023) Vol. 9, pp. e1569-e1569
Open Access | Times Cited: 29

Machine Learning: Models, Challenges, and Research Directions
Tala Talaei Khoei, Naima Kaabouch
Future Internet (2023) Vol. 15, Iss. 10, pp. 332-332
Open Access | Times Cited: 25

Securing Mobile Edge Computing Using Hybrid Deep Learning Method
Olusola Adeniyi, Ali Safaa Sadiq, Prashant Pillai, et al.
Computers (2024) Vol. 13, Iss. 1, pp. 25-25
Open Access | Times Cited: 8

Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network
Kousik Barik, Sanjay Misra, Luis Fernández Sanz
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 2353-2376
Open Access | Times Cited: 8

ResInceptNet-SA: A Network Traffic Intrusion Detection Model Fusing Feature Selection and Balanced Datasets
Guorui Liu, Tianlin Zhang, Hualin Dai, et al.
Applied Sciences (2025) Vol. 15, Iss. 2, pp. 956-956
Open Access | Times Cited: 1

Overview on Intrusion Detection Systems for Computers Networking Security
Lorenzo Diana, Pierpaolo Dini, Davide Paolini
Computers (2025) Vol. 14, Iss. 3, pp. 87-87
Open Access | Times Cited: 1

Training fuzzy deep neural network with honey badger algorithm for intrusion detection in cloud environment
Deepak Kumar Jain, Weiping Ding, Ketan Kotecha
International Journal of Machine Learning and Cybernetics (2023) Vol. 14, Iss. 6, pp. 2221-2237
Closed Access | Times Cited: 20

A Lightweight and Efficient IoT Intrusion Detection Method Based on Feature Grouping
Mingshu He, Yuanming Huang, Xinlei Wang, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 2, pp. 2935-2949
Closed Access | Times Cited: 19

Hybrid Strategy Improved Sparrow Search Algorithm in the Field of Intrusion Detection
Tao Liu, Meng Xueqiang
IEEE Access (2023) Vol. 11, pp. 32134-32151
Open Access | Times Cited: 18

Intrusion detection systems for IoT based on bio-inspired and machine learning techniques: a systematic review of the literature
Rafika Saadouni, Chirihane Gherbi, Zibouda Aliouat, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 8655-8681
Closed Access | Times Cited: 7

A lightweight optimized intrusion detection system using machine learning for edge-based IIoT security
Ravi Shekhar Tiwari, D. Lakshmi, Tapan Kumar Das, et al.
Telecommunication Systems (2024) Vol. 87, Iss. 3, pp. 605-624
Closed Access | Times Cited: 6

FL-MGVN: Federated learning for anomaly detection using mixed gaussian variational self-encoding network
Dongmin Wu, Yi Deng, Mingyong Li
Information Processing & Management (2021) Vol. 59, Iss. 2, pp. 102839-102839
Closed Access | Times Cited: 39

Review on Intrusion Detection System (IDS) for Network Security using Machine Learning Algorithms
Nusrath Unnisa A, Manjula Yerva, M Z Kurian
International Research Journal on Advanced Science Hub (2022) Vol. 4, Iss. 03, pp. 67-74
Open Access | Times Cited: 27

Deep Transfer Learning Applications in Intrusion Detection Systems: A Comprehensive Review
Hamza Kheddar, Yassine Himeur, Ali Ismail Awad
arXiv (Cornell University) (2023)
Open Access | Times Cited: 14

Multi-task learning for IoT traffic classification: A comparative analysis of deep autoencoders
Huiyao Dong, Igor Kotenko
Future Generation Computer Systems (2024) Vol. 158, pp. 242-254
Closed Access | Times Cited: 4

Deep Learning-driven Methods for Network-based Intrusion Detection Systems: A Systematic Review
Ramya Chinnasamy, Malliga Subramanian, Sathishkumar Veerappampalayam Easwaramoorthy, et al.
ICT Express (2025)
Open Access

Intrusion Anomaly Detection with Multi-transformer
W. F. Mader, Bin Wen, Wenlong Liu, et al.
Communications in computer and information science (2025), pp. 3-16
Closed Access

Role of artificial neural networks in fortifying cybersecurity: A review
Avantika Yadav, Vishesh Aggarwal, Sulabh Bansal
AIP conference proceedings (2025) Vol. 3253, pp. 030004-030004
Closed Access

Intrusion Detection System for IoT Security
Sudeshna Das, Abhishek Majumder
Lecture notes in networks and systems (2025), pp. 389-399
Closed Access

Page 1 - Next Page

Scroll to top