
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
SoK: Explainable Machine Learning for Computer Security Applications
Azqa Nadeem, Daniël Vos, Clinton Cao, et al.
(2023), pp. 221-240
Open Access | Times Cited: 27
Azqa Nadeem, Daniël Vos, Clinton Cao, et al.
(2023), pp. 221-240
Open Access | Times Cited: 27
Showing 1-25 of 27 citing articles:
A survey of malware detection using deep learning
Ahmed Bensaoud, Jugal Kalita, Mahmoud Bensaoud
Machine Learning with Applications (2024) Vol. 16, pp. 100546-100546
Open Access | Times Cited: 15
Ahmed Bensaoud, Jugal Kalita, Mahmoud Bensaoud
Machine Learning with Applications (2024) Vol. 16, pp. 100546-100546
Open Access | Times Cited: 15
You Can’t Hide Behind Your Headset: User Profiling in Augmented and Virtual Reality
Pier Paolo Tricomi, Federica Nenna, Luca Pajola, et al.
IEEE Access (2023) Vol. 11, pp. 9859-9875
Open Access | Times Cited: 28
Pier Paolo Tricomi, Federica Nenna, Luca Pajola, et al.
IEEE Access (2023) Vol. 11, pp. 9859-9875
Open Access | Times Cited: 28
Advanced insights through systematic analysis: Mapping future research directions and opportunities for xAI in deep learning and artificial intelligence used in cybersecurity
Marek Pawlicki, Aleksandra Pawlicka, Rafał Kozik, et al.
Neurocomputing (2024) Vol. 590, pp. 127759-127759
Open Access | Times Cited: 13
Marek Pawlicki, Aleksandra Pawlicka, Rafał Kozik, et al.
Neurocomputing (2024) Vol. 590, pp. 127759-127759
Open Access | Times Cited: 13
Exploring The Role of Interpretability in Adversarial Defense Mechanisms based Malware Classification
Assem Radi Alhawari, Sahar Ebadinezhad
(2025), pp. 175-181
Closed Access
Assem Radi Alhawari, Sahar Ebadinezhad
(2025), pp. 175-181
Closed Access
An assessment framework for explainable AI with applications to cybersecurity
Maria Carla Calzarossa, Paolo Giudici, Rasha Zieni
Artificial Intelligence Review (2025) Vol. 58, Iss. 5
Open Access
Maria Carla Calzarossa, Paolo Giudici, Rasha Zieni
Artificial Intelligence Review (2025) Vol. 58, Iss. 5
Open Access
Please Tell Me More: Privacy Impact of Explainability through the Lens of Membership Inference Attack
Han Liu, Yuhao Wu, Zhiyuan Yu, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2024) Vol. 31, pp. 4791-4809
Closed Access | Times Cited: 4
Han Liu, Yuhao Wu, Zhiyuan Yu, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2024) Vol. 31, pp. 4791-4809
Closed Access | Times Cited: 4
Attributions for ML-based ICS Anomaly Detection: From Theory to Practice
Clement Fung, Eric Zeng, Lujo Bauer
(2024)
Open Access | Times Cited: 2
Clement Fung, Eric Zeng, Lujo Bauer
(2024)
Open Access | Times Cited: 2
Interpretability and Transparency of Machine Learning in File Fragment Analysis with Explainable Artificial Intelligence
Razaq Jinad, ABM Rezbaul Islam, Narasimha Shashidhar
Electronics (2024) Vol. 13, Iss. 13, pp. 2438-2438
Open Access | Times Cited: 2
Razaq Jinad, ABM Rezbaul Islam, Narasimha Shashidhar
Electronics (2024) Vol. 13, Iss. 13, pp. 2438-2438
Open Access | Times Cited: 2
Everybody’s Got ML, Tell Me What Else You Have: Practitioners’ Perception of ML-Based Security Tools and Explanations
Jaron Mink, Hadjer Benkraouda, Limin Yang, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2023), pp. 2068-2085
Closed Access | Times Cited: 6
Jaron Mink, Hadjer Benkraouda, Limin Yang, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2023), pp. 2068-2085
Closed Access | Times Cited: 6
MalProtect: Stateful Defense Against Adversarial Query Attacks in ML-Based Malware Detection
Aqib Rashid, José M. Such
IEEE Transactions on Information Forensics and Security (2023) Vol. 18, pp. 4361-4376
Open Access | Times Cited: 4
Aqib Rashid, José M. Such
IEEE Transactions on Information Forensics and Security (2023) Vol. 18, pp. 4361-4376
Open Access | Times Cited: 4
Evaluating Rule-Based Global XAI Malware Detection Methods
Rui Li, Olga Gadyatskaya
Lecture notes in computer science (2023), pp. 3-22
Closed Access | Times Cited: 4
Rui Li, Olga Gadyatskaya
Lecture notes in computer science (2023), pp. 3-22
Closed Access | Times Cited: 4
Can LLMs Understand Computer Networks? Towards a Virtual System Administrator
Denis Donadel, Francesco Marchiori, Luca Pajola, et al.
(2024) Vol. 35, pp. 1-10
Closed Access | Times Cited: 1
Denis Donadel, Francesco Marchiori, Luca Pajola, et al.
(2024) Vol. 35, pp. 1-10
Closed Access | Times Cited: 1
The survey on the dual nature of xAI challenges in intrusion detection and their potential for AI innovation
Marek Pawlicki, Aleksandra Pawlicka, Rafał Kozik, et al.
Artificial Intelligence Review (2024) Vol. 57, Iss. 12
Open Access | Times Cited: 1
Marek Pawlicki, Aleksandra Pawlicka, Rafał Kozik, et al.
Artificial Intelligence Review (2024) Vol. 57, Iss. 12
Open Access | Times Cited: 1
Adversarial Examples on XAI-Enabled DT for Smart Healthcare Systems
Niddal Imam
Sensors (2024) Vol. 24, Iss. 21, pp. 6891-6891
Open Access | Times Cited: 1
Niddal Imam
Sensors (2024) Vol. 24, Iss. 21, pp. 6891-6891
Open Access | Times Cited: 1
Machine Learning for Blockchain: Literature Review and Open Research Questions
Luyao Zhang
(2023)
Open Access | Times Cited: 3
Luyao Zhang
(2023)
Open Access | Times Cited: 3
DETONAR-Light: An IoT Network Intrusion Detection Using DETONAR without a Sniffer Network
Victoria Bull, Niclas Finne, Andrea Agiollo, et al.
Lecture notes in computer science (2024), pp. 198-213
Closed Access
Victoria Bull, Niclas Finne, Andrea Agiollo, et al.
Lecture notes in computer science (2024), pp. 198-213
Closed Access
Explaining Explainable Ai, with Applications to Phishing Detection
Maria Carla Calzarossa, Paolo Giudici Stefano Department of Economics Management, Rasha Zieni
(2024)
Closed Access
Maria Carla Calzarossa, Paolo Giudici Stefano Department of Economics Management, Rasha Zieni
(2024)
Closed Access
Explainability Guided Adversarial Evasion Attacks on Malware Detectors
Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam, et al.
(2024), pp. 1-9
Open Access
Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam, et al.
(2024), pp. 1-9
Open Access
Bad Design Smells in Benchmark NIDS Datasets
R. Flood, Gints Engelen, David Aspinall, et al.
(2024), pp. 658-675
Open Access
R. Flood, Gints Engelen, David Aspinall, et al.
(2024), pp. 658-675
Open Access
Position: The Explainability Paradox - Challenges for XAI in Malware Detection and Analysis
Li Rui, Olga Gadyatskaya
(2024), pp. 554-561
Closed Access
Li Rui, Olga Gadyatskaya
(2024), pp. 554-561
Closed Access
Machine Learning on Blockchain (MLOB): A New Paradigm for Computational Security in Engineering
Zhiming Dong, Weisheng Lu
Engineering (2024)
Open Access
Zhiming Dong, Weisheng Lu
Engineering (2024)
Open Access
Towards Transparent Intrusion Detection: A Coherence-Based Framework in Explainable AI Integrating Large Language Models
Areej Alnahdi, Sashank Narain
(2024), pp. 87-96
Closed Access
Areej Alnahdi, Sashank Narain
(2024), pp. 87-96
Closed Access
Rethinking the Trigger-injecting Position in Graph Backdoor Attack
Jing Xu, Gorka Abad, Stjepan Picek
2022 International Joint Conference on Neural Networks (IJCNN) (2023), pp. 1-8
Open Access | Times Cited: 1
Jing Xu, Gorka Abad, Stjepan Picek
2022 International Joint Conference on Neural Networks (IJCNN) (2023), pp. 1-8
Open Access | Times Cited: 1
Federated Explainability for Network Anomaly Characterization
Xabier Sáez-de-Cámara, José Luis Flores, Cristóbal Arellano, et al.
(2023), pp. 346-365
Open Access
Xabier Sáez-de-Cámara, José Luis Flores, Cristóbal Arellano, et al.
(2023), pp. 346-365
Open Access
The 12th Player: Explainable Artificial Intelligence (XAI) in Football: Conceptualisation, Applications, Challenges and Future Directions
Andria Procopiou, Andriani Piki
(2023), pp. 213-220
Open Access
Andria Procopiou, Andriani Piki
(2023), pp. 213-220
Open Access