OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Transfer Learning and Optimized CNN Based Intrusion Detection System for Internet of Vehicles
Li Yang, Abdallah Shami
ICC 2022 - IEEE International Conference on Communications (2022), pp. 2774-2779
Open Access | Times Cited: 77

Showing 1-25 of 77 citing articles:

Autonomous Vehicles Security: Challenges and Solutions Using Blockchain and Artificial Intelligence
Gueltoum Bendiab, Amina Hameurlaine, Georgios Germanos, et al.
IEEE Transactions on Intelligent Transportation Systems (2023) Vol. 24, Iss. 4, pp. 3614-3637
Closed Access | Times Cited: 74

A Survey on Machine Learning-Based Misbehavior Detection Systems for 5G and Beyond Vehicular Networks
Abdelwahab Boualouache, Thomas Engel
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 2, pp. 1128-1172
Open Access | Times Cited: 60

Security issues in Internet of Vehicles (IoV): A comprehensive survey
Hamideh Taslimasa, Sajjad Dadkhah, Euclides Carlos Pinto Neto, et al.
Internet of Things (2023) Vol. 22, pp. 100809-100809
Closed Access | Times Cited: 57

E-XAI: Evaluating Black-Box Explainable AI Frameworks for Network Intrusion Detection
Osvaldo Arreche, Tanish Guntur, Jack W. Roberts, et al.
IEEE Access (2024) Vol. 12, pp. 23954-23988
Open Access | Times Cited: 21

Vehicle-to-Everything Communication in Intelligent Connected Vehicles: A Survey and Taxonomy
Xinyu Zhang, LI Jun-xian, Jingyi Zhou, et al.
Automotive Innovation (2025)
Open Access | Times Cited: 1

IoT data analytics in dynamic environments: From an automated machine learning perspective
Li Yang, Abdallah Shami
Engineering Applications of Artificial Intelligence (2022) Vol. 116, pp. 105366-105366
Open Access | Times Cited: 48

DTL-IDS: An optimized Intrusion Detection Framework using Deep Transfer Learning and Genetic Algorithm
Shahid Latif, Wadii Boulila, Anis Koubâa, et al.
Journal of Network and Computer Applications (2023) Vol. 221, pp. 103784-103784
Open Access | Times Cited: 38

An Intelligent Intrusion Detection System for Smart Consumer Electronics Network
Danish Javeed, Muhammad Shahid Saeed, Ijaz Ahmad, et al.
IEEE Transactions on Consumer Electronics (2023) Vol. 69, Iss. 4, pp. 906-913
Open Access | Times Cited: 37

Hyperparameter Optimization for 1D-CNN-Based Network Intrusion Detection Using GA and PSO
Dusmurod Kilichev, Wooseong Kim
Mathematics (2023) Vol. 11, Iss. 17, pp. 3724-3724
Open Access | Times Cited: 31

CICIoV2024: Advancing realistic IDS approaches against DoS and spoofing attack in IoV CAN bus
Euclides Carlos Pinto Neto, Hamideh Taslimasa, Sajjad Dadkhah, et al.
Internet of Things (2024) Vol. 26, pp. 101209-101209
Open Access | Times Cited: 14

Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks
Mohammed Almehdhar, Abdullatif Albaseer, Muhammad Asif Khan, et al.
IEEE Open Journal of Vehicular Technology (2024) Vol. 5, pp. 869-906
Open Access | Times Cited: 11

Recent endeavors in machine learning-powered intrusion detection systems for the Internet of Things
D. Manivannan
Journal of Network and Computer Applications (2024) Vol. 229, pp. 103925-103925
Closed Access | Times Cited: 8

A transfer learning-based intrusion detection system for zero-day attack in communication-based train control system
Lu He, Yanan Zhao, Yajing Song, et al.
Cluster Computing (2024) Vol. 27, Iss. 6, pp. 8477-8492
Closed Access | Times Cited: 7

Intrusion Detection Model for Internet of Vehicles Using GRIPCA and OWELM
Kai‐Jun Zhang, Jiayu Yang, Yangfei Shao, et al.
IEEE Access (2024) Vol. 12, pp. 28911-28925
Open Access | Times Cited: 7

The cybersecurity mesh: A comprehensive survey of involved artificial intelligence methods, cryptographic protocols and challenges for future research
Bruno Ramos-Cruz, Javier Andreu-Pérez, Luis Martı́nez
Neurocomputing (2024) Vol. 581, pp. 127427-127427
Open Access | Times Cited: 6

Network-based Intrusion Detection Through Image-based CNN and Transfer Learning
Pedro Horchulhack, Eduardo K. Viegas, Altair O. Santin, et al.
2022 International Wireless Communications and Mobile Computing (IWCMC) (2024), pp. 386-391
Closed Access | Times Cited: 6

A network intrusion detection system based on deep learning in the IoT
Xiao Wang, Lie Dai, Guang Yang
The Journal of Supercomputing (2024) Vol. 80, Iss. 16, pp. 24520-24558
Closed Access | Times Cited: 5

Securing Tomorrow’s Smart Cities: Investigating Software Security in Internet of Vehicles and Deep Learning Technologies
Ridhi Jain, Norbert Tihanyi, Mohamed Amine Ferrag
Lecture notes in intelligent transportation and infrastructure (2025), pp. 365-385
Closed Access

Unravelling Crypto Ransomware: An Extensive Study on Transfer Learning Techniques for Crypto Ransomware Detection
Isha Sood, Varsha Sharma
Communications in computer and information science (2025), pp. 229-244
Closed Access

HiViT-IDS: An Efficient Network Intrusion Detection Method Based on Vision Transformer
Haiyan Zhou, Haojie Zou, Wei Li, et al.
Sensors (2025) Vol. 25, Iss. 6, pp. 1752-1752
Open Access

Tier-Based Optimization for Synthesized Network Intrusion Detection System
Murtaza Ahmed Siddiqi, Wooguil Pak
IEEE Access (2022) Vol. 10, pp. 108530-108544
Open Access | Times Cited: 27

LCCDE: A Decision-Based Ensemble Framework for Intrusion Detection in The Internet of Vehicles
Li Yang, Abdallah Shami, G.C. Stevens, et al.
GLOBECOM 2022 - 2022 IEEE Global Communications Conference (2022), pp. 3545-3550
Open Access | Times Cited: 23

Machine Learning based intrusion detection systems for connected autonomous vehicles: A survey
Jay Nagarajan, Pegah Mansourian, Muhammad Anwar Shahid, et al.
Peer-to-Peer Networking and Applications (2023) Vol. 16, Iss. 5, pp. 2153-2185
Closed Access | Times Cited: 14

An Intelligent Digital Twin Method Based on Spatio-Temporal Feature Fusion for IoT Attack Behavior Identification
Huan Wang, Xiaoqiang Di, Yan Wang, et al.
IEEE Journal on Selected Areas in Communications (2023) Vol. 41, Iss. 11, pp. 3561-3572
Closed Access | Times Cited: 12

Page 1 - Next Page

Scroll to top