OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Sustainable Ensemble Learning Driving Intrusion Detection Model
Xinghua Li, Mengyao Zhu, Laurence T. Yang, et al.
IEEE Transactions on Dependable and Secure Computing (2021), pp. 1-1
Closed Access | Times Cited: 25

Showing 25 citing articles:

Blockchain Intelligence for Internet of Vehicles: Challenges and Solutions
Xiaojie Wang, Hailin Zhu, Zhaolong Ning, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 4, pp. 2325-2355
Closed Access | Times Cited: 50

A survey on graph neural networks for intrusion detection systems: Methods, trends and challenges
Meihui Zhong, Ming‐Wei Lin, Chao Zhang, et al.
Computers & Security (2024) Vol. 141, pp. 103821-103821
Closed Access | Times Cited: 29

Intrusion Detection in SCADA Based Power Grids: Recursive Feature Elimination Model With Majority Vote Ensemble Algorithm
Darshana Upadhyay, Jaume Manero, Marzia Zaman, et al.
IEEE Transactions on Network Science and Engineering (2021) Vol. 8, Iss. 3, pp. 2559-2574
Open Access | Times Cited: 70

Enhancing IIoT networks protection: A robust security model for attack detection in Internet Industrial Control Systems
Izhar Ahmed Khan, Marwa Keshk, Dechang Pi, et al.
Ad Hoc Networks (2022) Vol. 134, pp. 102930-102930
Closed Access | Times Cited: 62

Machine Learning-Based Multilevel Intrusion Detection Approach
Jiasheng Ling, Lei Zhang, Chenyang Liu, et al.
Electronics (2025) Vol. 14, Iss. 2, pp. 323-323
Open Access

Abnormal Traffic Detection: Traffic Feature Extraction and DAE-GAN With Efficient Data Augmentation
Zecheng Li, Shengyuan Chen, Hongshu Dai, et al.
IEEE Transactions on Reliability (2022) Vol. 72, Iss. 2, pp. 498-510
Closed Access | Times Cited: 24

An Enhanced Intrusion Detection System for IoT Networks Based on Deep Learning and Knowledge Graph
Xiuzhang Yang, Guojun Peng, Dongni Zhang, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-21
Open Access | Times Cited: 23

Intelligent Intrusion Detection Scheme for Smart Power-Grid Using Optimized Ensemble Learning on Selected Features
Manikant Panthi, Tanmoy Kanti Das
International Journal of Critical Infrastructure Protection (2022) Vol. 39, pp. 100567-100567
Closed Access | Times Cited: 23

Network Intrusion Detection with Two-Phased Hybrid Ensemble Learning and Automatic Feature Selection
Asanka Kavinda Mananayaka, Sun Sunnie Chung
IEEE Access (2023) Vol. 11, pp. 45154-45167
Open Access | Times Cited: 15

Ensemble Learning for Intrusion Detection in SDN-Based Zero Touch Smart Grid Systems
Zakaria Abou El Houda, Bouziane Brik, Lyes Khoukhi
(2022)
Closed Access | Times Cited: 18

ExpSSOA-Deep maxout: Exponential Shuffled shepherd optimization based Deep maxout network for intrusion detection using big data in cloud computing framework
Bishwajeet Kumar Pandey, Veeramanickam M.R.M., Muḥammad Musḥtaq Aḥmad, et al.
Computers & Security (2022) Vol. 124, pp. 102975-102975
Closed Access | Times Cited: 18

Real-time intrusion detection based on residual learning through ResNet algorithm
Asma Shaikh, Preeti Gupta
International Journal of Systems Assurance Engineering and Management (2022)
Closed Access | Times Cited: 12

Type-I Generative Adversarial Attack
Shenghong He, Ruxin Wang, Tongliang Liu, et al.
IEEE Transactions on Dependable and Secure Computing (2022) Vol. 20, Iss. 3, pp. 2593-2606
Open Access | Times Cited: 10

FeSA: Automatic Federated Swarm Attestation on Dynamic Large-Scale IoT Devices
Boyu Kuang, Anmin Fu, Yansong Gao, et al.
IEEE Transactions on Dependable and Secure Computing (2022) Vol. 20, Iss. 4, pp. 2954-2969
Closed Access | Times Cited: 10

A Robust Intrusion Detection System Empowered by Generative Adversarial Networks
V. Vijayaganth, Dharshana M.G., P. Sureka, et al.
International Journal of Innovative Science and Research Technology (IJISRT) (2024), pp. 663-668
Open Access | Times Cited: 1

A Comprehensive Survey on Ensemble Learning-Based Intrusion Detection Approaches in Computer Networks
Thiago José Lucas, Inaê Soares de Figueiredo, Carlos Alexandre Carvalho Tojeiro, et al.
IEEE Access (2023) Vol. 11, pp. 122638-122676
Open Access | Times Cited: 4

Towards Fast Network Intrusion Detection based on Efficiency-preserving Federated Learning
Tian Dong, Han Qiu, Jialiang Lu, et al.
(2021), pp. 468-475
Closed Access | Times Cited: 7

Intrusion detection method on the network using modified random forest for identifying various network attacks
G. Sandhya, V. Anusuya Devi, S. Vedha, et al.
AIP conference proceedings (2024) Vol. 3214, pp. 020058-020058
Closed Access

A comprehensive survey on intrusion detection algorithms
Yang Li, Zhengming Li, Mengyao Li
Computers & Electrical Engineering (2024) Vol. 121, pp. 109863-109863
Closed Access

PCB Defect Classification with Data Augmentation-Based Ensemble Method for Sustainable Smart Manufacturing
Jaeseok Jang, Qing Tang, Hail Jung
Sustainability (2024) Vol. 16, Iss. 23, pp. 10417-10417
Open Access

Network Intrusion Detection based on Feature Fusion of Attack Dimension
Xiaolong Sun, Zhengyao Gu, Hao Zhang, et al.
Research Square (Research Square) (2024)
Closed Access

Intrusion Detection System using Ensemble Learning Approaches: A Systematic Literature Review
Aouatif Arqane, Omar Boutkhoum, Hicham Boukhriss, et al.
International Journal of Online and Biomedical Engineering (iJOE) (2022) Vol. 18, Iss. 13, pp. 160-175
Open Access | Times Cited: 2

Cyber Security

Communications in computer and information science (2022)
Closed Access | Times Cited: 2

Network Intrusion Detection via Tri-Broad Learning System based on Spatial-temporal Granularity
Jieling Li, Hao Zhang, Zhihuang Liu, et al.
Research Square (Research Square) (2022)
Open Access

Page 1

Scroll to top