OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Machine Learning With Variational AutoEncoder for Imbalanced Datasets in Intrusion Detection
Ying‐Dar Lin, Ziqiang Liu, Ren‐Hung Hwang, et al.
IEEE Access (2022) Vol. 10, pp. 15247-15260
Open Access | Times Cited: 30

Showing 1-25 of 30 citing articles:

Cyber Threats Detection in Smart Environments Using SDN-Enabled DNN-LSTM Hybrid Framework
Mohammad Al Razib, Danish Javeed, Muhammad Taimoor Khan, et al.
IEEE Access (2022) Vol. 10, pp. 53015-53026
Open Access | Times Cited: 82

ResInceptNet-SA: A Network Traffic Intrusion Detection Model Fusing Feature Selection and Balanced Datasets
Guorui Liu, Tianlin Zhang, Hualin Dai, et al.
Applied Sciences (2025) Vol. 15, Iss. 2, pp. 956-956
Open Access | Times Cited: 1

Applying Generative Machine Learning to Intrusion Detection: A Systematic Mapping Study and Review
James Halvorsen, Clemente Izurieta, Haipeng Cai, et al.
ACM Computing Surveys (2024) Vol. 56, Iss. 10, pp. 1-33
Open Access | Times Cited: 5

Dual-Stream Based Scene Text Manipulation Detection Method
Jiefu Chen, Guofeng Yi
Communications in computer and information science (2025), pp. 186-194
Closed Access

User behaviour based insider threat detection model using an LSTM integrated RF model
S Maheswaran, L. Rajasekar, Ziaul Haque Choudhury, et al.
Network Computation in Neural Systems (2025), pp. 1-38
Closed Access

Addressing data scarcity in ML-based failure-cause identification in optical networks through generative models
M. J. R. Healy, Andreas Baum, Francesco Musumeci
Optical Fiber Technology (2025) Vol. 90, pp. 104137-104137
Closed Access

Enhancing Intrusion Detection by Using Machine Learning
Abdul Rahman Khan, Parma Nand, Bharat Bhushan, et al.
Lecture notes in networks and systems (2025), pp. 699-712
Closed Access

A survey: contribution of ML & DL to the detection & prevention of botnet attacks
Yassine El Yamani, Youssef Baddi, Najib El Kamoun
Journal of Reliable Intelligent Environments (2024) Vol. 10, Iss. 4, pp. 431-448
Closed Access | Times Cited: 3

M2GDL: Multi-manifold guided dictionary learning based oversampling and data validation for highly imbalanced classification problems
Tayyebe Feizi, Mohammad Hossein Moattar, Hamid Tabatabaee
Information Sciences (2024) Vol. 682, pp. 121280-121280
Closed Access | Times Cited: 3

Network Intrusion Detection using Auto-encoder Neural Networks and MLP
Talla Yashwanth, K. Ashwini, Gandla Shiva Chaithanya, et al.
(2024), pp. 1-6
Closed Access | Times Cited: 2

Focal Causal Temporal Convolutional Neural Networks: Advancing IIoT Security with Efficient Detection of Rare Cyber-Attacks
Meysam Miryahyaei, Mehdi Fartash, Javad Akbari Torkestani
Sensors (2024) Vol. 24, Iss. 19, pp. 6335-6335
Open Access | Times Cited: 2

A multi-manifold learning based instance weighting and under-sampling for imbalanced data classification problems
Tayyebe Feizi, Mohammad Hossein Moattar, Hamid Tabatabaee
Journal Of Big Data (2023) Vol. 10, Iss. 1
Open Access | Times Cited: 4

B-DT Model: A Derivative Ensemble Method to Improve Performance of Intrusion Detection System
Amarudin Amarudin, Ridi Ferdiana, Widyawan Widyawan
Journal of Advances in Information Technology (2024) Vol. 15, Iss. 1, pp. 87-103
Open Access | Times Cited: 1

Proactive ransomware prevention in pervasive IoMT via hybrid machine learning
Usman Tariq, Bilal Tariq
Indonesian Journal of Electrical Engineering and Computer Science (2024) Vol. 34, Iss. 2, pp. 970-970
Open Access | Times Cited: 1

An optimal and secure environment for intrusion detection using hybrid optimization based ResNet 101-C model
S. Nikkath Bushra, Nalini Subramanian, A. Chandrasekar
Peer-to-Peer Networking and Applications (2023) Vol. 16, Iss. 5, pp. 2307-2324
Closed Access | Times Cited: 3

Enhancing IoT-Botnet Detection using Variational Auto-encoder and Cost-Sensitive Learning: A Deep Learning Approach for Imbalanced Datasets
Hassan Wasswa, Timothy Lynar, Hussein A. Abbass
2017 IEEE Region 10 Symposium (TENSYMP) (2023), pp. 1-6
Closed Access | Times Cited: 3

Impact of Latent Space Dimension on IoT Botnet Detection Performance: VAE-Encoder Versus ViT-Encoder
Hassan Wasswa, Aziida Nanyonga, Timothy Lynar
(2024), pp. 1-6
Closed Access

Sine Cosine Algorithm with Optimal Convolutional Autoencoder for Intrusion Detection and Classification Model
K. Hemavathi, R. Latha
International Journal of Science and Research (IJSR) (2024) Vol. 13, Iss. 5, pp. 518-527
Open Access

Anomaly Detection in 5G using Variational Autoencoders
Amanul Islam, Sang–Yoon Chang, Jinoh Kim, et al.
(2024), pp. 1-6
Closed Access

Sine Cosine Algorithm Based on Optimal Convolutional Autoencoder for Intrusion Detection and Classification Models
Shifferaw Taye, Wilczewski Patil
Journal of Research in Science and Engineering (2024) Vol. 6, Iss. 10, pp. 53-62
Open Access

Machine Learning-Based Intrusion Detection of Imbalanced Traffic on the Network: A Review
S. V. Sugin, M. Kanchana
Lecture notes in electrical engineering (2023), pp. 741-753
Closed Access | Times Cited: 1

Operation State Recognition of Renewable Energy Unit Based on SSAE and Improved KNN Algorithm
Linjun Shi, Tao Dai, Wenjie Lao, et al.
IEEE Access (2023) Vol. 11, pp. 74191-74200
Open Access | Times Cited: 1

Studying Imbalanced Learning for Anomaly-Based Intelligent IDS for Mission-Critical Internet of Things
Ghada Abdelmoumin, Danda B. Rawat, Abdul Rahman
Journal of Cybersecurity and Privacy (2023) Vol. 3, Iss. 4, pp. 706-743
Open Access | Times Cited: 1

Empirical Evaluation of Autoencoder Models for Anomaly Detection in Packet-based NIDS
Soumyadeep Hore, QUOC HUNG NGUYEN, Yulun Xu, et al.
(2023), pp. 1-8
Open Access | Times Cited: 1

Multiple Operational Status Classification Based on One-Versus-One SVM in FDM 3D Printer
Yebon Lee, Sujeong Baek
IFIP advances in information and communication technology (2022), pp. 219-226
Closed Access | Times Cited: 2

Page 1 - Next Page

Scroll to top