OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

TMG-GAN: Generative Adversarial Networks-Based Imbalanced Learning for Network Intrusion Detection
Hongwei Ding, Yu Sun, Nana Huang, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 19, pp. 1156-1167
Closed Access | Times Cited: 22

Showing 22 citing articles:

Advancements in Generative AI: A Comprehensive Review of GANs, GPT, Autoencoders, Diffusion Model, and Transformers
Staphord Bengesi, Hoda El-Sayed, Md Kamruzzaman Sarker, et al.
IEEE Access (2024) Vol. 12, pp. 69812-69837
Open Access | Times Cited: 54

Workplace security and privacy implications in the GenAI age: A survey
Abebe Diro, Shahriar Kaisar, Akanksha Saini, et al.
Journal of Information Security and Applications (2025) Vol. 89, pp. 103960-103960
Open Access | Times Cited: 1

LEGAN: Addressing Intra-class Imbalance in GAN-based Medical Image Augmentation for Improved Imbalanced Data Classification
Hongwei Ding, Nana Huang, Yaoxin Wu, et al.
IEEE Transactions on Instrumentation and Measurement (2024) Vol. 73, pp. 1-14
Closed Access | Times Cited: 5

Leveraging GANs data augmentation for imbalanced medical image classification
Hongwei Ding, Nana Huang, Xiaohui Cui
Applied Soft Computing (2024) Vol. 165, pp. 112050-112050
Closed Access | Times Cited: 5

Federated dual correction intrusion detection system: Efficient aggregation for heterogeneous data
Zhigang Jin, Yu Ding, Xiaodong Wu, et al.
Computer Networks (2025), pp. 111116-111116
Closed Access

Research on Network Intrusion Detection Model Based on Hybrid Sampling and Deep Learning
Doudou Guo, Yufei Xie
Sensors (2025) Vol. 25, Iss. 5, pp. 1578-1578
Open Access

Explainable TabNet Transformer-based on Google Vizier Optimizer for Anomaly Intrusion Detection System
Ibrahim A. Fares, Mohamed Abd Elaziz
Knowledge-Based Systems (2025), pp. 113351-113351
Closed Access

Self-Organizing Maps-Assisted Variational Autoencoder for Unsupervised Network Anomaly Detection
Hailong Huang, Jiahong Yang, Hang Zeng, et al.
Symmetry (2025) Vol. 17, Iss. 4, pp. 520-520
Open Access

TFKAN: Transformer based on Kolmogorov–Arnold Networks for Intrusion Detection in IoT environment
Ibrahim A. Fares, Mohamed Abd Elaziz, Ahmad O. Aseeri, et al.
Egyptian Informatics Journal (2025) Vol. 30, pp. 100666-100666
Closed Access

Improving imbalanced medical image classification through GAN-based data augmentation methods
Hongwei Ding, Nana Huang, Yaoxin Wu, et al.
Pattern Recognition (2025), pp. 111680-111680
Closed Access

Securing Industry 5.0: An explainable deep learning model for intrusion detection in cyber-physical systems
Himanshu Nandanwar, Rahul Katarya
Computers & Electrical Engineering (2025) Vol. 123, pp. 110161-110161
Closed Access

Intrusion Detection with Federated Learning and Conditional Generative Adversarial Network in Satellite-Terrestrial Integrated Networks
Weiwei Jiang, Haoyu Han, Yang Zhang, et al.
Mobile Networks and Applications (2024)
Closed Access | Times Cited: 3

Network Intrusion Detection using Auto-encoder Neural Networks and MLP
Talla Yashwanth, K. Ashwini, Gandla Shiva Chaithanya, et al.
(2024), pp. 1-6
Closed Access | Times Cited: 2

A GAN-based Hybrid Deep Learning Approach for Enhancing Intrusion Detection in IoT Networks
S. Balaji, G. Dhanabalan, C. Umarani, et al.
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 6
Open Access | Times Cited: 2

Practical Cyber Attack Detection With Continuous Temporal Graph in Dynamic Network System
Guanghan Duan, Hongwu Lv, Huiqiang Wang, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 4851-4864
Closed Access | Times Cited: 1

Encrypted malicious traffic detection based on natural language processing and deep learning
Xiaodong Zang, Tongliang Wang, Xinchang Zhang, et al.
Computer Networks (2024) Vol. 250, pp. 110598-110598
Closed Access | Times Cited: 1

A multi-information fusion anomaly detection model based on convolutional neural networks and AutoEncoder
Zhongnan Zhao, Hongwei Guo, Yue Wang
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 1

A comprehensive survey on intrusion detection algorithms
Yang Li, Zhengming Li, Mengyao Li
Computers & Electrical Engineering (2024) Vol. 121, pp. 109863-109863
Closed Access | Times Cited: 1

FGA-IDS: A Federated Learning and GAN-Augmented Intrusion Detection System for UAV Networks
Qingli Zeng, Semire Olatunde-Salawu, Farid Nait-Abdesselam
(2024), pp. 50-59
Closed Access | Times Cited: 1

ResNeSt-biGRU: An Intrusion Detection Model Based on Internet of Things
Yan Xiang, Daofeng Li, Xinyi Meng, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 1, pp. 1005-1023
Open Access

LAN: Learning Adaptive Neighbors for Real-Time Insider Threat Detection
Xiangrui Cai, Yang Wang, Sihan Xu, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 10157-10172
Open Access

DDP-DAR: Network Intrusion Detection Based on Denoising Diffusion Probabilistic Model and Dual-Attention Residual Network
Saihua Cai, Yingwei Zhao, Jingjing Lyu, et al.
Neural Networks (2024) Vol. 184, pp. 107064-107064
Closed Access

ReCDA: Concept Drift Adaptation with Representation Enhancement for Network Intrusion Detection
Shuo Yang, Xinran Zheng, Jinze Li, et al.
Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (2024), pp. 3818-3828
Closed Access

Page 1

Scroll to top