
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Statistical Appliance Inference in the Smart Grid by Machine Learning
Zeki Bilgin, Emrah Tomur, Mehmet Ersoy, et al.
(2019), pp. 1-7
Closed Access | Times Cited: 7
Zeki Bilgin, Emrah Tomur, Mehmet Ersoy, et al.
(2019), pp. 1-7
Closed Access | Times Cited: 7
Showing 7 citing articles:
Vulnerability Prediction From Source Code Using Machine Learning
Zeki Bilgin, Mehmet Ersoy, Elif Üstündağ Soykan, et al.
IEEE Access (2020) Vol. 8, pp. 150672-150684
Open Access | Times Cited: 73
Zeki Bilgin, Mehmet Ersoy, Elif Üstündağ Soykan, et al.
IEEE Access (2020) Vol. 8, pp. 150672-150684
Open Access | Times Cited: 73
Differentially Private Deep Learning for Load Forecasting on Smart Grid
Elif Üstündağ Soykan, Zeki Bilgin, Mehmet Ersoy, et al.
2022 IEEE Globecom Workshops (GC Wkshps) (2019), pp. 1-6
Closed Access | Times Cited: 26
Elif Üstündağ Soykan, Zeki Bilgin, Mehmet Ersoy, et al.
2022 IEEE Globecom Workshops (GC Wkshps) (2019), pp. 1-6
Closed Access | Times Cited: 26
VulnArmor: mitigating software vulnerabilities with code resolution and detection techniques
Parul V. Sindhwad, Prateek Ranka, Siddhi Muni, et al.
International Journal of Information Technology (2024)
Closed Access | Times Cited: 2
Parul V. Sindhwad, Prateek Ranka, Siddhi Muni, et al.
International Journal of Information Technology (2024)
Closed Access | Times Cited: 2
User-centred privacy inference detection for smart home devices
Alexia Dini Kounoudes, Georgia M. Kapitsaki, Ioannis Katakis, et al.
(2021), pp. 210-218
Closed Access | Times Cited: 6
Alexia Dini Kounoudes, Georgia M. Kapitsaki, Ioannis Katakis, et al.
(2021), pp. 210-218
Closed Access | Times Cited: 6
Activity Recognition Protection for IoT Trigger-Action Platforms
Mahmoud Aghvamipanah, Morteza Amini, Cyrille Artho, et al.
(2024), pp. 600-616
Closed Access
Mahmoud Aghvamipanah, Morteza Amini, Cyrille Artho, et al.
(2024), pp. 600-616
Closed Access
Privacy Preserving Demand Side Management Method via Multi-Agent Reinforcement Learning
Feiye Zhang, Qingyu Yang, Dou An
IEEE/CAA Journal of Automatica Sinica (2023) Vol. 10, Iss. 10, pp. 1984-1999
Closed Access | Times Cited: 1
Feiye Zhang, Qingyu Yang, Dou An
IEEE/CAA Journal of Automatica Sinica (2023) Vol. 10, Iss. 10, pp. 1984-1999
Closed Access | Times Cited: 1
Stealthy Attack Detection for Privacy-preserving Real-time Pricing in Smart Grids
Fazong Wu, Xin Wang, Ming Yang, et al.
2022 13th Asian Control Conference (ASCC) (2022), pp. 2012-2017
Closed Access
Fazong Wu, Xin Wang, Ming Yang, et al.
2022 13th Asian Control Conference (ASCC) (2022), pp. 2012-2017
Closed Access