OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

AUToSen: Deep-Learning-Based Implicit Continuous Authentication Using Smartphone Sensors
Mohammed Abuhamad, Tamer Abuhmed, Aziz Mohaisen, et al.
IEEE Internet of Things Journal (2020) Vol. 7, Iss. 6, pp. 5008-5020
Closed Access | Times Cited: 117

Showing 1-25 of 117 citing articles:

Deep Cybersecurity: A Comprehensive Overview from Neural Network and Deep Learning Perspective
Iqbal H. Sarker
SN Computer Science (2021) Vol. 2, Iss. 3
Open Access | Times Cited: 167

Machine Learning for Wireless Sensor Networks Security: An Overview of Challenges and Issues
Rami Ahmad, Raniyah Wazirali, Tarik Abu-Ain
Sensors (2022) Vol. 22, Iss. 13, pp. 4730-4730
Open Access | Times Cited: 130

A Survey on Zero Trust Architecture: Challenges and Future Trends
Yuanhang He, Daochao Huang, Lei Chen, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-13
Open Access | Times Cited: 103

Sensor-Based Continuous Authentication of Smartphones’ Users Using Behavioral Biometrics: A Contemporary Survey
Mohammed Abuhamad, Ahmed Abusnaina, DaeHun Nyang, et al.
IEEE Internet of Things Journal (2020) Vol. 8, Iss. 1, pp. 65-84
Open Access | Times Cited: 134

Behavioral biometrics & continuous user authentication on mobile devices: A survey
Ioannis Stylios, Spyros Kokolakis, Olga Thanou, et al.
Information Fusion (2020) Vol. 66, pp. 76-99
Closed Access | Times Cited: 80

Deep Learning Approaches for Continuous Authentication Based on Activity Patterns Using Mobile Sensing
Sakorn Mekruksavanich, Anuchit Jitpattanakul
Sensors (2021) Vol. 21, Iss. 22, pp. 7519-7519
Open Access | Times Cited: 74

Mobile behavioral biometrics for passive authentication
Giuseppe Stragapede, Rubén Vera-Rodríguez, Rubén Tolosana, et al.
Pattern Recognition Letters (2022) Vol. 157, pp. 35-41
Open Access | Times Cited: 49

Smart brain tumor diagnosis system utilizing deep convolutional neural networks
Yıldıray Anagün
Multimedia Tools and Applications (2023) Vol. 82, Iss. 28, pp. 44527-44553
Open Access | Times Cited: 32

Automation and Orchestration of Zero Trust Architecture: Potential Solutions and Challenges
Yang Cao, Shiva Raj Pokhrel, Ye Zhu, et al.
Deleted Journal (2024) Vol. 21, Iss. 2, pp. 294-317
Open Access | Times Cited: 8

Sensor-based authentication in smartphone: A systematic review
Moceheb Lazam Shuwandy, A. S. Jouda, M.A. Ahmed, et al.
Journal of Engineering Research (2024)
Open Access | Times Cited: 8

Using recurrent neural networks for continuous authentication through gait analysis
Giacomo Giorgi, Andrea Saracino, Fabio Martinelli
Pattern Recognition Letters (2021) Vol. 147, pp. 157-163
Closed Access | Times Cited: 48

BehavePassDB: Public Database for Mobile Behavioral Biometrics and Benchmark Evaluation
Giuseppe Stragapede, Rubén Vera-Rodríguez, Rubén Tolosana, et al.
Pattern Recognition (2022) Vol. 134, pp. 109089-109089
Open Access | Times Cited: 31

Restricted Boltzmann Machine Assisted Secure Serverless Edge System for Internet of Medical Things
Abdullah Lakhan, Mazin Abed Mohammed, Ahmed N. Rashid, et al.
IEEE Journal of Biomedical and Health Informatics (2022) Vol. 27, Iss. 2, pp. 673-683
Closed Access | Times Cited: 28

Machine learning-based novel continuous authentication system using soft keyboard typing behavior and motion sensor data
Ensar Arif Sağbaş, Serkan Ballı
Neural Computing and Applications (2024) Vol. 36, Iss. 10, pp. 5433-5445
Open Access | Times Cited: 6

Privacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A Review
Luis Hernández–Álvarez, José M. de Fuentes, Lorena González‐Manzano, et al.
Sensors (2020) Vol. 21, Iss. 1, pp. 92-92
Open Access | Times Cited: 40

DAKOTA: Sensor and Touch Screen-Based Continuous Authentication on a Mobile Banking Application
Özlem Durmaz İncel, Seçil Günay, Yasemin Akan, et al.
IEEE Access (2021) Vol. 9, pp. 38943-38960
Open Access | Times Cited: 38

Continuous user authentication on smartphone via behavioral biometrics: a survey
Praveen Kumar Rayani, Suvamoy Changder
Multimedia Tools and Applications (2022) Vol. 82, Iss. 2, pp. 1633-1667
Closed Access | Times Cited: 27

Using Machine Learning for Dynamic Authentication in Telehealth: A Tutorial
Seyed Mehdi Hazrati Fard, Fayez Gebali, Mohammad Mamun
Sensors (2022) Vol. 22, Iss. 19, pp. 7655-7655
Open Access | Times Cited: 26

Deep Learning and Machine Learning, Better Together Than Apart: A Review on Biometrics Mobile Authentication
Sara Kokal, Mounika Vanamala, Rushit Dave
Journal of Cybersecurity and Privacy (2023) Vol. 3, Iss. 2, pp. 227-258
Open Access | Times Cited: 15

A survey on safeguarding critical infrastructures: Attacks, AI security, and future directions
Khushi Jatinkumar Raval, Nilesh Kumar Jadav, Tejal Rathod, et al.
International Journal of Critical Infrastructure Protection (2023) Vol. 44, pp. 100647-100647
Closed Access | Times Cited: 14

Leveraging Machine Learning for Wi-Fi-Based Environmental Continuous Two-Factor Authentication
Ali Abdullah S. AlQahtani, Thamraa Alshayeb, Mahmoud Nabil, et al.
IEEE Access (2024) Vol. 12, pp. 13277-13289
Open Access | Times Cited: 5

A Comprehensive Review on Secure Biometric-Based Continuous Authentication and User Profiling
S. Ayeswarya, K. John Singh
IEEE Access (2024) Vol. 12, pp. 82996-83021
Open Access | Times Cited: 5

DeFFusion: CNN-based Continuous Authentication Using Deep Feature Fusion
Yantao Li, Tao Peng, Shaojiang Deng, et al.
ACM Transactions on Sensor Networks (2021) Vol. 18, Iss. 2, pp. 1-20
Closed Access | Times Cited: 29

Identifying People’s Faces in Smart Banking Systems Using Artificial Neural Networks
Leili Nosrati, Amir Massoud Bidgoli, Hamid Haj Seyyed Javadi
International Journal of Computational Intelligence Systems (2024) Vol. 17, Iss. 1
Open Access | Times Cited: 4

Smart remote sensing network for disaster management: an overview
Rami Ahmad
Telecommunication Systems (2024) Vol. 87, Iss. 1, pp. 213-237
Closed Access | Times Cited: 4

Page 1 - Next Page

Scroll to top