OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Multi-scale Learning based Malware Variant Detection using Spatial Pyramid Pooling Network
S. Sriram, R. Vinayakumar, V. Sowmya, et al.
IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (2020), pp. 740-745
Closed Access | Times Cited: 39

Showing 1-25 of 39 citing articles:

PMRSS: Privacy-Preserving Medical Record Searching Scheme for Intelligent Diagnosis in IoT Healthcare
Yi Sun, Jie Liu, Keping Yu, et al.
IEEE Transactions on Industrial Informatics (2021) Vol. 18, Iss. 3, pp. 1981-1990
Closed Access | Times Cited: 170

A New Malware Classification Framework Based on Deep Learning Algorithms
Ömer Aslan, Abdullah Asım Yılmaz
IEEE Access (2021) Vol. 9, pp. 87936-87951
Closed Access | Times Cited: 138

Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats
Zhiyan Chen, Jinxin Liu, Yu Shen, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 5, pp. 1-37
Open Access | Times Cited: 73

A Comprehensive Survey of Convolutions in Deep Learning: Applications, Challenges, and Future Trends
Abolfazl Younesi, Mohsen Ansari, MohammadAmin Fazli, et al.
IEEE Access (2024) Vol. 12, pp. 41180-41218
Open Access | Times Cited: 28

Classification model for accuracy and intrusion detection using machine learning approach
Arushi Agarwal, Purushottam Sharma, Mohammed Alshehri, et al.
PeerJ Computer Science (2021) Vol. 7, pp. e437-e437
Open Access | Times Cited: 66

Lung-GANs: Unsupervised Representation Learning for Lung Disease Classification Using Chest CT and X-Ray Images
Pooja Yadav, Neeraj Menon, Vinayakumar Ravi, et al.
IEEE Transactions on Engineering Management (2021) Vol. 70, Iss. 8, pp. 2774-2786
Closed Access | Times Cited: 61

A Review on Multiscale-Deep-Learning Applications
Elizar Elizar, Mohd Asyraf Zulkifley, Rusdha Muharar, et al.
Sensors (2022) Vol. 22, Iss. 19, pp. 7384-7384
Open Access | Times Cited: 56

Hybrid Malware Detection Based on Bi-LSTM and SPP-Net for Smart IoT
Jueun Jeon, Byeonghui Jeong, Seungyeon Baek, et al.
IEEE Transactions on Industrial Informatics (2021) Vol. 18, Iss. 7, pp. 4830-4837
Closed Access | Times Cited: 39

DURLD: Malicious URL Detection Using Deep Learning-Based Character Level Representations
Sriram Srinivasan, R. Vinayakumar, Ajay Arunachalam, et al.
Springer eBooks (2020), pp. 535-554
Closed Access | Times Cited: 33

Deep-Hook: A trusted deep learning-based framework for unknown malware detection and classification in Linux cloud environments
Tom Landman, Nir Nissim
Neural Networks (2021) Vol. 144, pp. 648-685
Closed Access | Times Cited: 29

Attention‐based convolutional neural network deep learning approach for robust malware classification
Vinayakumar Ravi, Mamoun Alazab
Computational Intelligence (2022) Vol. 39, Iss. 1, pp. 145-168
Closed Access | Times Cited: 19

BHCNet: Neural Network-Based Brain Hemorrhage Classification Using Head CT Scan
Muhammad Faheem Mushtaq, Mobeen Shahroz, Ali M. Aseere, et al.
IEEE Access (2021) Vol. 9, pp. 113901-113916
Open Access | Times Cited: 25

A Proposed New Endpoint Detection and Response With Image-Based Malware Detection System
Tran Hoang Hai, Vu Van Thieu, Tran Thai Duong, et al.
IEEE Access (2023) Vol. 11, pp. 122859-122875
Open Access | Times Cited: 10

Robust Malware Detection using Residual Attention Network
Shamika Ganesan, Vinayakumar Ravi, Moez Krichen, et al.
2023 IEEE International Conference on Consumer Electronics (ICCE) (2021), pp. 1-6
Open Access | Times Cited: 18

HDA-pose: a real-time 2D human pose estimation method based on modified YOLOv8
Chengang Dong, Yuhao Tang, Liyan Zhang
Signal Image and Video Processing (2024) Vol. 18, Iss. 8-9, pp. 5823-5839
Closed Access | Times Cited: 2

Android malware analysis in a nutshell
Iman Almomani, Mohanned Ahmed, Walid El‐Shafai
PLoS ONE (2022) Vol. 17, Iss. 7, pp. e0270647-e0270647
Open Access | Times Cited: 8

Higher efficient YOLOv7: a one-stage method for non-salient object detection
Chengang Dong, Yuhao Tang, Liyan Zhang
Multimedia Tools and Applications (2023) Vol. 83, Iss. 14, pp. 42257-42283
Closed Access | Times Cited: 3

EfficientNet-based Convolutional Neural Networks for Malware Classification
Vasundhara Acharya, Vinayakumar Ravi, Nazeeruddin Mohammad
2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) (2021)
Closed Access | Times Cited: 7

Robust Malware Detection using Residual Attention Network
Shamika Ganesan, R. Vinayakumar, Moez Krichen, et al.
(2020)
Open Access | Times Cited: 4

Lightweight Privacy-Preserving Medical Diagnostic Scheme for Internet of Things Healthcare
Yanghuijie Tang, Ling Xiong, Mingxing He, et al.
Communications in computer and information science (2024), pp. 613-625
Closed Access

Recognition of Mushrooms and Classification of Edible and Toxic Families using Hardware Implementation of CNN Algorithms on an Embedded system
Tarik Bouganssa, Adil Salbi, Samar Aarabi, et al.
Research Journal of Pharmacy and Technology (2024), pp. 860-866
Closed Access

Optir-SBERT: Cross-Architecture Binary Code Similarity Detection Based on Optimized LLVM IR
Yintong Yan, Lu Yu, Taiyan Wang, et al.
(2024), pp. 95-113
Closed Access

Spindle Detection Based on Elastic Time Window and Spatial Pyramid Pooling
Yiting Ou, Fei Wang, Bai Feng, et al.
Journal of Integrative Neuroscience (2024) Vol. 23, Iss. 7
Open Access

Page 1 - Next Page

Scroll to top