OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Machine Learning-Powered Encrypted Network Traffic Analysis: A Comprehensive Survey
Meng Shen, Ke Ye, Xingtong Liu, et al.
IEEE Communications Surveys & Tutorials (2022) Vol. 25, Iss. 1, pp. 791-824
Closed Access | Times Cited: 68

Showing 1-25 of 68 citing articles:

Blockchains for Artificial Intelligence of Things: A Comprehensive Survey
Meng Shen, Aijing Gu, Jiawen Kang, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 16, pp. 14483-14506
Closed Access | Times Cited: 21

Encrypted Network Traffic Analysis and Classification Utilizing Machine Learning
Ibrahim A. Alwhbi, Cliff C. Zou, Reem N. Alharbi
Sensors (2024) Vol. 24, Iss. 11, pp. 3509-3509
Open Access | Times Cited: 7

Graph based encrypted malicious traffic detection with hybrid analysis of multi-view features
Yueping Hong, Qi Li, Yanqing Yang, et al.
Information Sciences (2023) Vol. 644, pp. 119229-119229
Closed Access | Times Cited: 15

A Novel Traffic Classifier With Attention Mechanism for Industrial Internet of Things
Ruijie Zhao, Yiteng Huang, Xianwen Deng, et al.
IEEE Transactions on Industrial Informatics (2023) Vol. 19, Iss. 11, pp. 10799-10810
Closed Access | Times Cited: 13

Detecting Cyber and Physical Attacks Against Mobile Robots Using Machine Learning: An Empirical Study
Levente Nyusti, Sabarathinam Chockalingam, Patrick Bours, et al.
Lecture notes in computer science (2025), pp. 139-157
Closed Access

Certificate-Based Transport Layer Security Encrypted Malicious Traffic Detection in Real-Time Network Environments
Yiran Suo, Jingfeng Xue, Wenjie Guo, et al.
Lecture notes in computer science (2025), pp. 341-350
Closed Access

Behavior-Driven Encrypted Malware Detection with Robust Traffic Representation
Peng Yin, Jizhe Jia, Jing Wang, et al.
Lecture notes in computer science (2025), pp. 111-126
Closed Access

Encrypted Malware Traffic Detection Via Time-Frequency Domain Analysis
Yukai Liu, Jizhe Jia, Jinhe Wu, et al.
Lecture notes in computer science (2025), pp. 98-110
Closed Access

Fine-Grained Encrypted Traffic Classification Using Dual Embedding and Graph Neural Networks
Zhengyang Liu, Qiang Wei, Qisong Song, et al.
Electronics (2025) Vol. 14, Iss. 4, pp. 778-778
Open Access

Multi-modal Multi-task Tiered Expert (M3TTE): An Effective Method for CDN Website Classification
Yulong Zhan, Yang Cai, Gang Xiong, et al.
Lecture notes in computer science (2025), pp. 369-386
Closed Access

Advancing software security: DCodeBERT for automatic vulnerability detection and repair
Ahmed Bensaoud, Jugal Kalita
Journal of Industrial Information Integration (2025), pp. 100834-100834
Closed Access

UAV-Assisted Secure Uplink Communications in Satellite-Supported IoT: Secrecy Fairness Approach
Zhisheng Yin, Nan Cheng, Yunchao Song, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 4, pp. 6904-6915
Closed Access | Times Cited: 12

MetaRockETC: Adaptive Encrypted Traffic Classification in Complex Network Environments via Time Series Analysis and Meta-Learning
Jianjin Zhao, Qi Li, Yueping Hong, et al.
IEEE Transactions on Network and Service Management (2024) Vol. 21, Iss. 2, pp. 2460-2476
Closed Access | Times Cited: 4

L2-BiTCN-CNN: Spatio-temporal features fusion-based multi-classification model for various internet applications identification
Zhiyuan Li, Xiaoping Xu
Computer Networks (2024) Vol. 243, pp. 110298-110298
Closed Access | Times Cited: 3

A Vulnerability Assessment of Open-Source Implementations of Fifth-Generation Core Network Functions
Filippo Dolente, Rosario G. Garroppo, Michele Pagano
Future Internet (2023) Vol. 16, Iss. 1, pp. 1-1
Open Access | Times Cited: 8

PA-iMFL: Communication-Efficient Privacy Amplification Method Against Data Reconstruction Attack in Improved Multilayer Federated Learning
Jianhua Wang, Xiaolin Chang, Jelena Mišić, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 10, pp. 17960-17974
Open Access | Times Cited: 2

Data Augmentation for Traffic Classification
Chao Wang, Alessandro Finamore, Pietro Michiardi, et al.
Lecture notes in computer science (2024), pp. 159-186
Closed Access | Times Cited: 2

Advances in deep learning intrusion detection over encrypted data with privacy preservation: a systematic review
Fatma Hendaoui, Ahlem Ferchichi, Lamia Trabelsi, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 8683-8724
Closed Access | Times Cited: 2

Novel Detection of Hospital Malware Using Network Pattern Analysis
郝品量, Jancy Ling Liu, Wang Lian
(2024)
Open Access | Times Cited: 2

Multi-Task Scenario Encrypted Traffic Classification and Parameter Analysis
Guanyu Wang, Yijun Gu
Sensors (2024) Vol. 24, Iss. 10, pp. 3078-3078
Open Access | Times Cited: 2

A Novel Self-Supervised Framework Based on Masked Autoencoder for Traffic Classification
Ruijie Zhao, Mingwei Zhan, Xianwen Deng, et al.
IEEE/ACM Transactions on Networking (2024) Vol. 32, Iss. 3, pp. 2012-2025
Closed Access | Times Cited: 1

Enhanced Encrypted Traffic Analysis Leveraging Graph Neural Networks and Optimized Feature Dimensionality Reduction
In-Su Jung, Yu-Rae Song, Lelisa Adeba Jilcha, et al.
Symmetry (2024) Vol. 16, Iss. 6, pp. 733-733
Open Access | Times Cited: 1

Breaking the Anonymity of Ethereum Mixing Services Using Graph Feature Learning
Hanbiao Du, Zheng Che, Meng Shen, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 19, pp. 616-631
Open Access | Times Cited: 4

I know I don’t know: an evidential deep learning framework for traffic classification
Shangsen Li, Lailong Luo, Yun Zhou, et al.
Frontiers of Computer Science (2024) Vol. 18, Iss. 5
Closed Access | Times Cited: 1

Deep learning and pre-training technology for encrypted traffic classification: A comprehensive review
Wenqi Dong, Jing Yu, Xinjie Lin, et al.
Neurocomputing (2024) Vol. 617, pp. 128444-128444
Closed Access | Times Cited: 1

Page 1 - Next Page

Scroll to top