
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A real-time and ubiquitous network attack detection based on deep belief network and support vector machine
Hao Zhang, Yongdan Li, Zhihan Lv, et al.
IEEE/CAA Journal of Automatica Sinica (2020) Vol. 7, Iss. 3, pp. 790-799
Closed Access | Times Cited: 139
Hao Zhang, Yongdan Li, Zhihan Lv, et al.
IEEE/CAA Journal of Automatica Sinica (2020) Vol. 7, Iss. 3, pp. 790-799
Closed Access | Times Cited: 139
Showing 1-25 of 139 citing articles:
Big data analysis of the Internet of Things in the digital twins of smart city based on deep learning
Xiaoming Li, Hao Liu, Weixi Wang, et al.
Future Generation Computer Systems (2021) Vol. 128, pp. 167-177
Closed Access | Times Cited: 285
Xiaoming Li, Hao Liu, Weixi Wang, et al.
Future Generation Computer Systems (2021) Vol. 128, pp. 167-177
Closed Access | Times Cited: 285
Cyber security in smart cities: A review of deep learning-based applications and case studies
Dongliang Chen, Paweł Wawrzyński, Zhihan Lv
Sustainable Cities and Society (2020) Vol. 66, pp. 102655-102655
Closed Access | Times Cited: 229
Dongliang Chen, Paweł Wawrzyński, Zhihan Lv
Sustainable Cities and Society (2020) Vol. 66, pp. 102655-102655
Closed Access | Times Cited: 229
Adoption of artificial intelligence in smart cities: A comprehensive review
H.M.K.K.M.B. Herath, Mamta Mittal
International Journal of Information Management Data Insights (2022) Vol. 2, Iss. 1, pp. 100076-100076
Open Access | Times Cited: 197
H.M.K.K.M.B. Herath, Mamta Mittal
International Journal of Information Management Data Insights (2022) Vol. 2, Iss. 1, pp. 100076-100076
Open Access | Times Cited: 197
Semi-Supervised Support Vector Machine for Digital Twins Based Brain Image Fusion
Zhibo Wan, Youqiang Dong, Zengchen Yu, et al.
Frontiers in Neuroscience (2021) Vol. 15
Open Access | Times Cited: 182
Zhibo Wan, Youqiang Dong, Zengchen Yu, et al.
Frontiers in Neuroscience (2021) Vol. 15
Open Access | Times Cited: 182
Deep Learning Algorithms for Cybersecurity Applications: A Technological and Status Review
Priyanka Dixit, Sanjay Silakari
Computer Science Review (2020) Vol. 39, pp. 100317-100317
Closed Access | Times Cited: 179
Priyanka Dixit, Sanjay Silakari
Computer Science Review (2020) Vol. 39, pp. 100317-100317
Closed Access | Times Cited: 179
Towards 6G Internet of Things: Recent advances, use cases, and open challenges
Zakria Qadir, Khoa N. Le, Nasir Saeed, et al.
ICT Express (2022) Vol. 9, Iss. 3, pp. 296-312
Open Access | Times Cited: 159
Zakria Qadir, Khoa N. Le, Nasir Saeed, et al.
ICT Express (2022) Vol. 9, Iss. 3, pp. 296-312
Open Access | Times Cited: 159
Multi-dimensional feature fusion and stacking ensemble mechanism for network intrusion detection
Hao Zhang, Jieling Li, Xi-Meng Liu, et al.
Future Generation Computer Systems (2021) Vol. 122, pp. 130-143
Closed Access | Times Cited: 152
Hao Zhang, Jieling Li, Xi-Meng Liu, et al.
Future Generation Computer Systems (2021) Vol. 122, pp. 130-143
Closed Access | Times Cited: 152
Dual-IDS: A bagging-based gradient boosting decision tree model for network anomaly intrusion detection system
Maya Hilda Lestari Louk, Bayu Adhi Tama
Expert Systems with Applications (2022) Vol. 213, pp. 119030-119030
Closed Access | Times Cited: 134
Maya Hilda Lestari Louk, Bayu Adhi Tama
Expert Systems with Applications (2022) Vol. 213, pp. 119030-119030
Closed Access | Times Cited: 134
Intrusion detection methods based on integrated deep learning model
Zhendong Wang, Yaodi Liu, Daojing He, et al.
Computers & Security (2021) Vol. 103, pp. 102177-102177
Closed Access | Times Cited: 105
Zhendong Wang, Yaodi Liu, Daojing He, et al.
Computers & Security (2021) Vol. 103, pp. 102177-102177
Closed Access | Times Cited: 105
Application of machine learning methods in fault detection and classification of power transmission lines: a survey
Fatemeh Mohammadi Shakiba, S. Mohsen Azizi, MengChu Zhou, et al.
Artificial Intelligence Review (2022) Vol. 56, Iss. 7, pp. 5799-5836
Closed Access | Times Cited: 78
Fatemeh Mohammadi Shakiba, S. Mohsen Azizi, MengChu Zhou, et al.
Artificial Intelligence Review (2022) Vol. 56, Iss. 7, pp. 5799-5836
Closed Access | Times Cited: 78
Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats
Zhiyan Chen, Jinxin Liu, Yu Shen, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 5, pp. 1-37
Open Access | Times Cited: 74
Zhiyan Chen, Jinxin Liu, Yu Shen, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 5, pp. 1-37
Open Access | Times Cited: 74
Enhancing intrusion detection: a hybrid machine and deep learning approach
Muhammad Sajid, Kaleem Razzaq Malik, Ahmad Almogren, et al.
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 24
Muhammad Sajid, Kaleem Razzaq Malik, Ahmad Almogren, et al.
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 24
Deep belief network based intrusion detection techniques: A survey
Insoo Sohn
Expert Systems with Applications (2020) Vol. 167, pp. 114170-114170
Closed Access | Times Cited: 105
Insoo Sohn
Expert Systems with Applications (2020) Vol. 167, pp. 114170-114170
Closed Access | Times Cited: 105
Network Attacks Detection Methods Based on Deep Learning Techniques: A Survey
Yirui Wu, Dabao Wei, Jun Feng
Security and Communication Networks (2020) Vol. 2020, pp. 1-17
Open Access | Times Cited: 96
Yirui Wu, Dabao Wei, Jun Feng
Security and Communication Networks (2020) Vol. 2020, pp. 1-17
Open Access | Times Cited: 96
A novel automatic classification system based on hybrid unsupervised and supervised machine learning for electrospun nanofibers
Cosimo Ieracitano, Annunziata Paviglianiti, Maurizio Campolo, et al.
IEEE/CAA Journal of Automatica Sinica (2021) Vol. 8, Iss. 1, pp. 64-76
Open Access | Times Cited: 69
Cosimo Ieracitano, Annunziata Paviglianiti, Maurizio Campolo, et al.
IEEE/CAA Journal of Automatica Sinica (2021) Vol. 8, Iss. 1, pp. 64-76
Open Access | Times Cited: 69
Security of Internet of Things (IoT) using federated learning and deep learning — Recent advancements, issues and prospects
Vinay Gugueoth, Sunitha Safavat, Sachin Shetty
ICT Express (2023) Vol. 9, Iss. 5, pp. 941-960
Open Access | Times Cited: 40
Vinay Gugueoth, Sunitha Safavat, Sachin Shetty
ICT Express (2023) Vol. 9, Iss. 5, pp. 941-960
Open Access | Times Cited: 40
A Novel Framework Design of Network Intrusion Detection Based on Machine Learning Techniques
Chongzhen Zhang, Yanli Chen, Yang Meng, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-15
Open Access | Times Cited: 44
Chongzhen Zhang, Yanli Chen, Yang Meng, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-15
Open Access | Times Cited: 44
Prediction model of natural gas pipeline crack evolution based on optimized DCNN-LSTM
Bin Wang, Yanbao Guo, Deguo Wang, et al.
Mechanical Systems and Signal Processing (2022) Vol. 181, pp. 109557-109557
Closed Access | Times Cited: 37
Bin Wang, Yanbao Guo, Deguo Wang, et al.
Mechanical Systems and Signal Processing (2022) Vol. 181, pp. 109557-109557
Closed Access | Times Cited: 37
An Improved Deep Belief Network IDS on IoT-Based Network for Traffic Systems
Rayeesa Malik, Yashwant Singh, Zakir Ahmad Sheikh, et al.
Journal of Advanced Transportation (2022) Vol. 2022, pp. 1-17
Open Access | Times Cited: 31
Rayeesa Malik, Yashwant Singh, Zakir Ahmad Sheikh, et al.
Journal of Advanced Transportation (2022) Vol. 2022, pp. 1-17
Open Access | Times Cited: 31
Optimization of table tennis target detection algorithm guided by multi-scale feature fusion of deep learning
Rong Zhang
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 7
Rong Zhang
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 7
EESNN: Hybrid Deep Learning Empowered Spatial–Temporal Features for Network Intrusion Detection System
Jalaiah Saikam, C. K. Rao
IEEE Access (2024) Vol. 12, pp. 15930-15945
Open Access | Times Cited: 6
Jalaiah Saikam, C. K. Rao
IEEE Access (2024) Vol. 12, pp. 15930-15945
Open Access | Times Cited: 6
Multi-source information fusion-driven corn yield prediction using the Random Forest from the perspective of Agricultural and Forestry Economic Management
Xuziqi Yang, Zekai Hua, Liang Li, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 6
Xuziqi Yang, Zekai Hua, Liang Li, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 6
Deep learning for privacy preservation in autonomous moving platforms enhanced 5G heterogeneous networks
Yulei Wu, Yuxiang Ma, Hong‐Ning Dai, et al.
Computer Networks (2020) Vol. 185, pp. 107743-107743
Open Access | Times Cited: 41
Yulei Wu, Yuxiang Ma, Hong‐Ning Dai, et al.
Computer Networks (2020) Vol. 185, pp. 107743-107743
Open Access | Times Cited: 41
Inductive Representation Learning via CNN for Partially-Unseen Attributed Networks
Zhongying Zhao, Hui Zhou, Liang Qi, et al.
IEEE Transactions on Network Science and Engineering (2021) Vol. 8, Iss. 1, pp. 695-706
Closed Access | Times Cited: 35
Zhongying Zhao, Hui Zhou, Liang Qi, et al.
IEEE Transactions on Network Science and Engineering (2021) Vol. 8, Iss. 1, pp. 695-706
Closed Access | Times Cited: 35
A Systematic Review on Hybrid Intrusion Detection System
Elijah M. Maseno, Zenghui Wang, Hongyan Xing
Security and Communication Networks (2022) Vol. 2022, pp. 1-23
Open Access | Times Cited: 27
Elijah M. Maseno, Zenghui Wang, Hongyan Xing
Security and Communication Networks (2022) Vol. 2022, pp. 1-23
Open Access | Times Cited: 27