
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
G-IDS: Generative Adversarial Networks Assisted Intrusion Detection System
Md Hasan Shahriar, Nur Imtiazul Haque, Mohammad Ashiqur Rahman, et al.
2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) (2020), pp. 376-385
Open Access | Times Cited: 108
Md Hasan Shahriar, Nur Imtiazul Haque, Mohammad Ashiqur Rahman, et al.
2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) (2020), pp. 376-385
Open Access | Times Cited: 108
Showing 1-25 of 108 citing articles:
An Enhanced AI-Based Network Intrusion Detection System Using Generative Adversarial Networks
Cheol-Hee Park, Jonghoon Lee, Youngsoo Kim, et al.
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 3, pp. 2330-2345
Open Access | Times Cited: 97
Cheol-Hee Park, Jonghoon Lee, Youngsoo Kim, et al.
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 3, pp. 2330-2345
Open Access | Times Cited: 97
IMIDS: An Intelligent Intrusion Detection System against Cyber Threats in IoT
Kim-Hung Le, Minh-Huy Nguyen, Trong-Dat Tran, et al.
Electronics (2022) Vol. 11, Iss. 4, pp. 524-524
Open Access | Times Cited: 70
Kim-Hung Le, Minh-Huy Nguyen, Trong-Dat Tran, et al.
Electronics (2022) Vol. 11, Iss. 4, pp. 524-524
Open Access | Times Cited: 70
Adversarial Machine Learning Attacks against Intrusion Detection Systems: A Survey on Strategies and Defense
Afnan Alotaibi, Murad A. Rassam
Future Internet (2023) Vol. 15, Iss. 2, pp. 62-62
Open Access | Times Cited: 65
Afnan Alotaibi, Murad A. Rassam
Future Internet (2023) Vol. 15, Iss. 2, pp. 62-62
Open Access | Times Cited: 65
A Review of Anomaly Detection Strategies to Detect Threats to Cyber-Physical Systems
Nicholas Jeffrey, Qing Tan, José R. Villar
Electronics (2023) Vol. 12, Iss. 15, pp. 3283-3283
Open Access | Times Cited: 54
Nicholas Jeffrey, Qing Tan, José R. Villar
Electronics (2023) Vol. 12, Iss. 15, pp. 3283-3283
Open Access | Times Cited: 54
EIDM: deep learning model for IoT intrusion detection systems
Omar Elnakib, Eman Shaaban, Mohamed Mahmoud, et al.
The Journal of Supercomputing (2023) Vol. 79, Iss. 12, pp. 13241-13261
Open Access | Times Cited: 48
Omar Elnakib, Eman Shaaban, Mohamed Mahmoud, et al.
The Journal of Supercomputing (2023) Vol. 79, Iss. 12, pp. 13241-13261
Open Access | Times Cited: 48
Cyber-physical systems security: A systematic review
Houda Harkat, Luís M. Camarinha-Matos, João Goês, et al.
Computers & Industrial Engineering (2024) Vol. 188, pp. 109891-109891
Closed Access | Times Cited: 18
Houda Harkat, Luís M. Camarinha-Matos, João Goês, et al.
Computers & Industrial Engineering (2024) Vol. 188, pp. 109891-109891
Closed Access | Times Cited: 18
Enhancing intrusion detection: a hybrid machine and deep learning approach
Muhammad Sajid, Kaleem Razzaq Malik, Ahmad Almogren, et al.
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 17
Muhammad Sajid, Kaleem Razzaq Malik, Ahmad Almogren, et al.
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 17
Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review
Sang-Woong Lee, Haval Mohammed Sidqi, Mokhtar Mohammadi, et al.
Journal of Network and Computer Applications (2021) Vol. 187, pp. 103111-103111
Closed Access | Times Cited: 95
Sang-Woong Lee, Haval Mohammed Sidqi, Mokhtar Mohammadi, et al.
Journal of Network and Computer Applications (2021) Vol. 187, pp. 103111-103111
Closed Access | Times Cited: 95
A Multi-Stage Classification Approach for IoT Intrusion Detection Based on Clustering with Oversampling
Raneem Qaddoura, Ala’ M. Al-Zoubi, Iman Almomani, et al.
Applied Sciences (2021) Vol. 11, Iss. 7, pp. 3022-3022
Open Access | Times Cited: 74
Raneem Qaddoura, Ala’ M. Al-Zoubi, Iman Almomani, et al.
Applied Sciences (2021) Vol. 11, Iss. 7, pp. 3022-3022
Open Access | Times Cited: 74
Generative Deep Learning to Detect Cyberattacks for the IoT-23 Dataset
Nada Abdalgawad, Ali Reza Sajun, Yara Kaddoura, et al.
IEEE Access (2021) Vol. 10, pp. 6430-6441
Open Access | Times Cited: 74
Nada Abdalgawad, Ali Reza Sajun, Yara Kaddoura, et al.
IEEE Access (2021) Vol. 10, pp. 6430-6441
Open Access | Times Cited: 74
Applications of Generative Adversarial Networks in Anomaly Detection: A Systematic Literature Review
Mikael Sabuhi, Ming Zhou, Cor‐Paul Bezemer, et al.
IEEE Access (2021) Vol. 9, pp. 161003-161029
Open Access | Times Cited: 70
Mikael Sabuhi, Ming Zhou, Cor‐Paul Bezemer, et al.
IEEE Access (2021) Vol. 9, pp. 161003-161029
Open Access | Times Cited: 70
Anomaly Detection in Industrial IoT Using Distributional Reinforcement Learning and Generative Adversarial Networks
Hafsa Benaddi, Mohammed Jouhari, Khalil Ibrahimi, et al.
Sensors (2022) Vol. 22, Iss. 21, pp. 8085-8085
Open Access | Times Cited: 38
Hafsa Benaddi, Mohammed Jouhari, Khalil Ibrahimi, et al.
Sensors (2022) Vol. 22, Iss. 21, pp. 8085-8085
Open Access | Times Cited: 38
A Systematic and Comprehensive Survey of Recent Advances in Intrusion Detection Systems Using Machine Learning: Deep Learning, Datasets, and Attack Taxonomy
Asadullah Momand, Sana Ullah Jan, Naeem Ramzan
Journal of Sensors (2023) Vol. 2023, pp. 1-18
Open Access | Times Cited: 23
Asadullah Momand, Sana Ullah Jan, Naeem Ramzan
Journal of Sensors (2023) Vol. 2023, pp. 1-18
Open Access | Times Cited: 23
Hybrid Chain: Blockchain Enabled Framework for Bi-Level Intrusion Detection and Graph-Based Mitigation for Security Provisioning in Edge Assisted IoT Environment
Ahmed A. M. Sharadqh, Hazem Hatamleh, As’ad Mahmoud As’ad Alnaser, et al.
IEEE Access (2023) Vol. 11, pp. 27433-27449
Open Access | Times Cited: 23
Ahmed A. M. Sharadqh, Hazem Hatamleh, As’ad Mahmoud As’ad Alnaser, et al.
IEEE Access (2023) Vol. 11, pp. 27433-27449
Open Access | Times Cited: 23
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
Sneha Padhiar, Ritesh Patel
Smart innovation, systems and technologies (2023), pp. 265-270
Closed Access | Times Cited: 22
Sneha Padhiar, Ritesh Patel
Smart innovation, systems and technologies (2023), pp. 265-270
Closed Access | Times Cited: 22
A Review of Generative Models in Generating Synthetic Attack Data for Cybersecurity
Garima Agrawal, Amardeep Kaur, Sowmya Myneni
Electronics (2024) Vol. 13, Iss. 2, pp. 322-322
Open Access | Times Cited: 14
Garima Agrawal, Amardeep Kaur, Sowmya Myneni
Electronics (2024) Vol. 13, Iss. 2, pp. 322-322
Open Access | Times Cited: 14
At the Dawn of Generative AI Era: A Tutorial-cum-Survey on New Frontiers in 6G Wireless Intelligence
Abdulkadir Çelik, Ahmed M. Eltawil
IEEE Open Journal of the Communications Society (2024) Vol. 5, pp. 2433-2489
Open Access | Times Cited: 10
Abdulkadir Çelik, Ahmed M. Eltawil
IEEE Open Journal of the Communications Society (2024) Vol. 5, pp. 2433-2489
Open Access | Times Cited: 10
Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems
Akm Iqtidar Newaz, Nur Imtiazul Haque, Amit Kumar Sikder, et al.
GLOBECOM 2022 - 2022 IEEE Global Communications Conference (2020)
Open Access | Times Cited: 68
Akm Iqtidar Newaz, Nur Imtiazul Haque, Amit Kumar Sikder, et al.
GLOBECOM 2022 - 2022 IEEE Global Communications Conference (2020)
Open Access | Times Cited: 68
A Survey on Machine-Learning Based Security Design for Cyber-Physical Systems
Sangjun Kim, Kyung‐Joon Park
Applied Sciences (2021) Vol. 11, Iss. 12, pp. 5458-5458
Open Access | Times Cited: 46
Sangjun Kim, Kyung‐Joon Park
Applied Sciences (2021) Vol. 11, Iss. 12, pp. 5458-5458
Open Access | Times Cited: 46
A multi-task based deep learning approach for intrusion detection
Qigang Liu, Deming Wang, Yuhang Jia, et al.
Knowledge-Based Systems (2021) Vol. 238, pp. 107852-107852
Closed Access | Times Cited: 46
Qigang Liu, Deming Wang, Yuhang Jia, et al.
Knowledge-Based Systems (2021) Vol. 238, pp. 107852-107852
Closed Access | Times Cited: 46
An unsupervised generative adversarial network based-host intrusion detection system for internet of things devices
Idriss Idrissi, Mostafa Azizi, Omar Moussaoui
Indonesian Journal of Electrical Engineering and Computer Science (2022) Vol. 25, Iss. 2, pp. 1140-1140
Open Access | Times Cited: 29
Idriss Idrissi, Mostafa Azizi, Omar Moussaoui
Indonesian Journal of Electrical Engineering and Computer Science (2022) Vol. 25, Iss. 2, pp. 1140-1140
Open Access | Times Cited: 29
StockGAN: robust stock price prediction using GAN algorithm
Mohammad Diqi, Marselina Endah Hiswati, Adri Saputra Nur
International Journal of Information Technology (2022) Vol. 14, Iss. 5, pp. 2309-2315
Closed Access | Times Cited: 29
Mohammad Diqi, Marselina Endah Hiswati, Adri Saputra Nur
International Journal of Information Technology (2022) Vol. 14, Iss. 5, pp. 2309-2315
Closed Access | Times Cited: 29
Development of a Machine-Learning Intrusion Detection System and Testing of Its Performance Using a Generative Adversarial Network
Andrei-Grigore Mari, Daniel Zinca, Virgil Dobrotă
Sensors (2023) Vol. 23, Iss. 3, pp. 1315-1315
Open Access | Times Cited: 18
Andrei-Grigore Mari, Daniel Zinca, Virgil Dobrotă
Sensors (2023) Vol. 23, Iss. 3, pp. 1315-1315
Open Access | Times Cited: 18
Enhancing network intrusion detection: a dual-ensemble approach with CTGAN-balanced data and weak classifiers
Mohammad Reza Abbaszadeh Bavil Soflaei, Arash Salehpour, Karim Samadzamini
The Journal of Supercomputing (2024) Vol. 80, Iss. 11, pp. 16301-16333
Closed Access | Times Cited: 7
Mohammad Reza Abbaszadeh Bavil Soflaei, Arash Salehpour, Karim Samadzamini
The Journal of Supercomputing (2024) Vol. 80, Iss. 11, pp. 16301-16333
Closed Access | Times Cited: 7
Model-agnostic generation-enhanced technology for few-shot intrusion detection
Junpeng He, Lingfeng Yao, Xiong Li, et al.
Applied Intelligence (2024) Vol. 54, Iss. 4, pp. 3181-3204
Closed Access | Times Cited: 6
Junpeng He, Lingfeng Yao, Xiong Li, et al.
Applied Intelligence (2024) Vol. 54, Iss. 4, pp. 3181-3204
Closed Access | Times Cited: 6