
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Multi-scale Learning based Malware Variant Detection using Spatial Pyramid Pooling Network
S. Sriram, R. Vinayakumar, V. Sowmya, et al.
IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (2020), pp. 740-745
Closed Access | Times Cited: 39
S. Sriram, R. Vinayakumar, V. Sowmya, et al.
IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (2020), pp. 740-745
Closed Access | Times Cited: 39
Showing 1-25 of 39 citing articles:
PMRSS: Privacy-Preserving Medical Record Searching Scheme for Intelligent Diagnosis in IoT Healthcare
Yi Sun, Jie Liu, Keping Yu, et al.
IEEE Transactions on Industrial Informatics (2021) Vol. 18, Iss. 3, pp. 1981-1990
Closed Access | Times Cited: 170
Yi Sun, Jie Liu, Keping Yu, et al.
IEEE Transactions on Industrial Informatics (2021) Vol. 18, Iss. 3, pp. 1981-1990
Closed Access | Times Cited: 170
A New Malware Classification Framework Based on Deep Learning Algorithms
Ömer Aslan, Abdullah Asım Yılmaz
IEEE Access (2021) Vol. 9, pp. 87936-87951
Closed Access | Times Cited: 138
Ömer Aslan, Abdullah Asım Yılmaz
IEEE Access (2021) Vol. 9, pp. 87936-87951
Closed Access | Times Cited: 138
Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats
Zhiyan Chen, Jinxin Liu, Yu Shen, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 5, pp. 1-37
Open Access | Times Cited: 73
Zhiyan Chen, Jinxin Liu, Yu Shen, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 5, pp. 1-37
Open Access | Times Cited: 73
A Comprehensive Survey of Convolutions in Deep Learning: Applications, Challenges, and Future Trends
Abolfazl Younesi, Mohsen Ansari, MohammadAmin Fazli, et al.
IEEE Access (2024) Vol. 12, pp. 41180-41218
Open Access | Times Cited: 28
Abolfazl Younesi, Mohsen Ansari, MohammadAmin Fazli, et al.
IEEE Access (2024) Vol. 12, pp. 41180-41218
Open Access | Times Cited: 28
Classification model for accuracy and intrusion detection using machine learning approach
Arushi Agarwal, Purushottam Sharma, Mohammed Alshehri, et al.
PeerJ Computer Science (2021) Vol. 7, pp. e437-e437
Open Access | Times Cited: 66
Arushi Agarwal, Purushottam Sharma, Mohammed Alshehri, et al.
PeerJ Computer Science (2021) Vol. 7, pp. e437-e437
Open Access | Times Cited: 66
Lung-GANs: Unsupervised Representation Learning for Lung Disease Classification Using Chest CT and X-Ray Images
Pooja Yadav, Neeraj Menon, Vinayakumar Ravi, et al.
IEEE Transactions on Engineering Management (2021) Vol. 70, Iss. 8, pp. 2774-2786
Closed Access | Times Cited: 61
Pooja Yadav, Neeraj Menon, Vinayakumar Ravi, et al.
IEEE Transactions on Engineering Management (2021) Vol. 70, Iss. 8, pp. 2774-2786
Closed Access | Times Cited: 61
A Review on Multiscale-Deep-Learning Applications
Elizar Elizar, Mohd Asyraf Zulkifley, Rusdha Muharar, et al.
Sensors (2022) Vol. 22, Iss. 19, pp. 7384-7384
Open Access | Times Cited: 56
Elizar Elizar, Mohd Asyraf Zulkifley, Rusdha Muharar, et al.
Sensors (2022) Vol. 22, Iss. 19, pp. 7384-7384
Open Access | Times Cited: 56
Improved Neural Network with Spatial Pyramid Pooling and Online Datasets Preprocessing for Underwater Target Detection Based on Side Scan Sonar Imagery
Jinrui Li, Libin Chen, Shen Jian, et al.
Remote Sensing (2023) Vol. 15, Iss. 2, pp. 440-440
Open Access | Times Cited: 32
Jinrui Li, Libin Chen, Shen Jian, et al.
Remote Sensing (2023) Vol. 15, Iss. 2, pp. 440-440
Open Access | Times Cited: 32
Hybrid Malware Detection Based on Bi-LSTM and SPP-Net for Smart IoT
Jueun Jeon, Byeonghui Jeong, Seungyeon Baek, et al.
IEEE Transactions on Industrial Informatics (2021) Vol. 18, Iss. 7, pp. 4830-4837
Closed Access | Times Cited: 39
Jueun Jeon, Byeonghui Jeong, Seungyeon Baek, et al.
IEEE Transactions on Industrial Informatics (2021) Vol. 18, Iss. 7, pp. 4830-4837
Closed Access | Times Cited: 39
A Novel U-Shaped Hybrid Segmentation Approach to Imbalanced Medical Image Using Receptive Field Enhancement and Adaptive Weighted Loss Function
Mahdi Zarrin, Haniyeh Nikkhah, Mohammad Nourian
(2025)
Closed Access
Mahdi Zarrin, Haniyeh Nikkhah, Mohammad Nourian
(2025)
Closed Access
DURLD: Malicious URL Detection Using Deep Learning-Based Character Level Representations
Sriram Srinivasan, R. Vinayakumar, Ajay Arunachalam, et al.
Springer eBooks (2020), pp. 535-554
Closed Access | Times Cited: 33
Sriram Srinivasan, R. Vinayakumar, Ajay Arunachalam, et al.
Springer eBooks (2020), pp. 535-554
Closed Access | Times Cited: 33
Deep-Hook: A trusted deep learning-based framework for unknown malware detection and classification in Linux cloud environments
Tom Landman, Nir Nissim
Neural Networks (2021) Vol. 144, pp. 648-685
Closed Access | Times Cited: 29
Tom Landman, Nir Nissim
Neural Networks (2021) Vol. 144, pp. 648-685
Closed Access | Times Cited: 29
Attention‐based convolutional neural network deep learning approach for robust malware classification
Vinayakumar Ravi, Mamoun Alazab
Computational Intelligence (2022) Vol. 39, Iss. 1, pp. 145-168
Closed Access | Times Cited: 19
Vinayakumar Ravi, Mamoun Alazab
Computational Intelligence (2022) Vol. 39, Iss. 1, pp. 145-168
Closed Access | Times Cited: 19
BHCNet: Neural Network-Based Brain Hemorrhage Classification Using Head CT Scan
Muhammad Faheem Mushtaq, Mobeen Shahroz, Ali M. Aseere, et al.
IEEE Access (2021) Vol. 9, pp. 113901-113916
Open Access | Times Cited: 25
Muhammad Faheem Mushtaq, Mobeen Shahroz, Ali M. Aseere, et al.
IEEE Access (2021) Vol. 9, pp. 113901-113916
Open Access | Times Cited: 25
A Proposed New Endpoint Detection and Response With Image-Based Malware Detection System
Tran Hoang Hai, Vu Van Thieu, Tran Thai Duong, et al.
IEEE Access (2023) Vol. 11, pp. 122859-122875
Open Access | Times Cited: 10
Tran Hoang Hai, Vu Van Thieu, Tran Thai Duong, et al.
IEEE Access (2023) Vol. 11, pp. 122859-122875
Open Access | Times Cited: 10
Robust Malware Detection using Residual Attention Network
Shamika Ganesan, Vinayakumar Ravi, Moez Krichen, et al.
2023 IEEE International Conference on Consumer Electronics (ICCE) (2021), pp. 1-6
Open Access | Times Cited: 18
Shamika Ganesan, Vinayakumar Ravi, Moez Krichen, et al.
2023 IEEE International Conference on Consumer Electronics (ICCE) (2021), pp. 1-6
Open Access | Times Cited: 18
HDA-pose: a real-time 2D human pose estimation method based on modified YOLOv8
Chengang Dong, Yuhao Tang, Liyan Zhang
Signal Image and Video Processing (2024) Vol. 18, Iss. 8-9, pp. 5823-5839
Closed Access | Times Cited: 2
Chengang Dong, Yuhao Tang, Liyan Zhang
Signal Image and Video Processing (2024) Vol. 18, Iss. 8-9, pp. 5823-5839
Closed Access | Times Cited: 2
Android malware analysis in a nutshell
Iman Almomani, Mohanned Ahmed, Walid El‐Shafai
PLoS ONE (2022) Vol. 17, Iss. 7, pp. e0270647-e0270647
Open Access | Times Cited: 8
Iman Almomani, Mohanned Ahmed, Walid El‐Shafai
PLoS ONE (2022) Vol. 17, Iss. 7, pp. e0270647-e0270647
Open Access | Times Cited: 8
Higher efficient YOLOv7: a one-stage method for non-salient object detection
Chengang Dong, Yuhao Tang, Liyan Zhang
Multimedia Tools and Applications (2023) Vol. 83, Iss. 14, pp. 42257-42283
Closed Access | Times Cited: 3
Chengang Dong, Yuhao Tang, Liyan Zhang
Multimedia Tools and Applications (2023) Vol. 83, Iss. 14, pp. 42257-42283
Closed Access | Times Cited: 3
EfficientNet-based Convolutional Neural Networks for Malware Classification
Vasundhara Acharya, Vinayakumar Ravi, Nazeeruddin Mohammad
2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) (2021)
Closed Access | Times Cited: 7
Vasundhara Acharya, Vinayakumar Ravi, Nazeeruddin Mohammad
2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) (2021)
Closed Access | Times Cited: 7
Robust Malware Detection using Residual Attention Network
Shamika Ganesan, R. Vinayakumar, Moez Krichen, et al.
(2020)
Open Access | Times Cited: 4
Shamika Ganesan, R. Vinayakumar, Moez Krichen, et al.
(2020)
Open Access | Times Cited: 4
Lightweight Privacy-Preserving Medical Diagnostic Scheme for Internet of Things Healthcare
Yanghuijie Tang, Ling Xiong, Mingxing He, et al.
Communications in computer and information science (2024), pp. 613-625
Closed Access
Yanghuijie Tang, Ling Xiong, Mingxing He, et al.
Communications in computer and information science (2024), pp. 613-625
Closed Access
Recognition of Mushrooms and Classification of Edible and Toxic Families using Hardware Implementation of CNN Algorithms on an Embedded system
Tarik Bouganssa, Adil Salbi, Samar Aarabi, et al.
Research Journal of Pharmacy and Technology (2024), pp. 860-866
Closed Access
Tarik Bouganssa, Adil Salbi, Samar Aarabi, et al.
Research Journal of Pharmacy and Technology (2024), pp. 860-866
Closed Access
Optir-SBERT: Cross-Architecture Binary Code Similarity Detection Based on Optimized LLVM IR
Yintong Yan, Lu Yu, Taiyan Wang, et al.
(2024), pp. 95-113
Closed Access
Yintong Yan, Lu Yu, Taiyan Wang, et al.
(2024), pp. 95-113
Closed Access
Spindle Detection Based on Elastic Time Window and Spatial Pyramid Pooling
Yiting Ou, Fei Wang, Bai Feng, et al.
Journal of Integrative Neuroscience (2024) Vol. 23, Iss. 7
Open Access
Yiting Ou, Fei Wang, Bai Feng, et al.
Journal of Integrative Neuroscience (2024) Vol. 23, Iss. 7
Open Access