
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Regularized Cross-Layer Ladder Network for Intrusion Detection in Industrial Internet of Things
Jing Long, Wei Liang, Kuan‐Ching Li, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 2, pp. 1747-1755
Open Access | Times Cited: 55
Jing Long, Wei Liang, Kuan‐Ching Li, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 2, pp. 1747-1755
Open Access | Times Cited: 55
Showing 1-25 of 55 citing articles:
LMCA: a lightweight anomaly network traffic detection model integrating adjusted mobilenet and coordinate attention mechanism for IoT
Dezhi Han, Hongxu Zhou, Tien‐Hsiung Weng, et al.
Telecommunication Systems (2023) Vol. 84, Iss. 4, pp. 549-564
Closed Access | Times Cited: 71
Dezhi Han, Hongxu Zhou, Tien‐Hsiung Weng, et al.
Telecommunication Systems (2023) Vol. 84, Iss. 4, pp. 549-564
Closed Access | Times Cited: 71
GTxChain: A Secure IoT Smart Blockchain Architecture Based on Graph Neural Network
Jiahong Cai, Wei Liang, Xiong Li, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 24, pp. 21502-21514
Closed Access | Times Cited: 55
Jiahong Cai, Wei Liang, Xiong Li, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 24, pp. 21502-21514
Closed Access | Times Cited: 55
Dynamic multi-scale topological representation for enhancing network intrusion detection
Meihui Zhong, Ming‐Wei Lin, He Zhu
Computers & Security (2023) Vol. 135, pp. 103516-103516
Closed Access | Times Cited: 48
Meihui Zhong, Ming‐Wei Lin, He Zhu
Computers & Security (2023) Vol. 135, pp. 103516-103516
Closed Access | Times Cited: 48
DANTD: A Deep Abnormal Network Traffic Detection Model for Security of Industrial Internet of Things Using High-Order Features
Guolong Shi, Xinyi Shen, Fuke Xiao, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 24, pp. 21143-21153
Closed Access | Times Cited: 29
Guolong Shi, Xinyi Shen, Fuke Xiao, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 24, pp. 21143-21153
Closed Access | Times Cited: 29
LRCN: Layer-residual Co-Attention Networks for Visual Question Answering
Dezhi Han, Jingya Shi, Jiahao Zhao, et al.
Expert Systems with Applications (2024) Vol. 263, pp. 125658-125658
Closed Access | Times Cited: 14
Dezhi Han, Jingya Shi, Jiahao Zhao, et al.
Expert Systems with Applications (2024) Vol. 263, pp. 125658-125658
Closed Access | Times Cited: 14
BFG: privacy protection framework for internet of medical things based on blockchain and federated learning
Wenkang Liu, Yuxuan He, Xiaoliang Wang, et al.
Connection Science (2023) Vol. 35, Iss. 1
Open Access | Times Cited: 19
Wenkang Liu, Yuxuan He, Xiaoliang Wang, et al.
Connection Science (2023) Vol. 35, Iss. 1
Open Access | Times Cited: 19
Design and analysis of quantum machine learning: a survey
Linshu Chen, Tao Li, Yuxiang Chen, et al.
Connection Science (2024) Vol. 36, Iss. 1
Open Access | Times Cited: 5
Linshu Chen, Tao Li, Yuxiang Chen, et al.
Connection Science (2024) Vol. 36, Iss. 1
Open Access | Times Cited: 5
A Trajectory Privacy-Preserving Scheme Based on Transition Matrix and Caching for IIoT
Shiwen Zhang, Biao Hu, Wei Liang, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 4, pp. 5745-5756
Closed Access | Times Cited: 14
Shiwen Zhang, Biao Hu, Wei Liang, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 4, pp. 5745-5756
Closed Access | Times Cited: 14
LightNestle: Quick and Accurate Neural Sequential Tensor Completion via Meta Learning
Yuhui Li, Wei Liang, Kun Xie, et al.
IEEE INFOCOM 2022 - IEEE Conference on Computer Communications (2023)
Closed Access | Times Cited: 14
Yuhui Li, Wei Liang, Kun Xie, et al.
IEEE INFOCOM 2022 - IEEE Conference on Computer Communications (2023)
Closed Access | Times Cited: 14
Enhanced pelican optimization algorithm with ensemble-based anomaly detection in industrial internet of things environment
Nenavath Chander, M. Upendra Kumar
Cluster Computing (2024) Vol. 27, Iss. 5, pp. 6491-6509
Closed Access | Times Cited: 4
Nenavath Chander, M. Upendra Kumar
Cluster Computing (2024) Vol. 27, Iss. 5, pp. 6491-6509
Closed Access | Times Cited: 4
TMHD: Twin-Bridge Scheduling of Multi-Heterogeneous Dependent Tasks for Edge Computing
Wei Liang, Jiahong Xiao, Yuxiang Chen, et al.
Future Generation Computer Systems (2024) Vol. 158, pp. 60-72
Closed Access | Times Cited: 4
Wei Liang, Jiahong Xiao, Yuxiang Chen, et al.
Future Generation Computer Systems (2024) Vol. 158, pp. 60-72
Closed Access | Times Cited: 4
DPS-IIoT: Non-interactive zero-knowledge poof-inspired access control towards information-centric Industrial Internet of Things
Dun Li, Noël Crespi, Roberto Minerva, et al.
Computer Communications (2025), pp. 108065-108065
Open Access
Dun Li, Noël Crespi, Roberto Minerva, et al.
Computer Communications (2025), pp. 108065-108065
Open Access
ASAM: Asynchronous self-attention model for visual question answering
Han Liu, Dezhi Han, Shukai Zhang, et al.
Computer Science and Information Systems (2025) Vol. 22, Iss. 1, pp. 199-217
Open Access
Han Liu, Dezhi Han, Shukai Zhang, et al.
Computer Science and Information Systems (2025) Vol. 22, Iss. 1, pp. 199-217
Open Access
A Machine Learning-based Feature Extraction Method for Image Classification using ResNet Architecture
Jing Liao, Lili Guo, Lei Jiang, et al.
Digital Signal Processing (2025) Vol. 160, pp. 105036-105036
Closed Access
Jing Liao, Lili Guo, Lei Jiang, et al.
Digital Signal Processing (2025) Vol. 160, pp. 105036-105036
Closed Access
A method for composite activation functions in deep learning for object detection
Jing Liao, Chang Wu Yu, Lei Jiang, et al.
Signal Image and Video Processing (2025) Vol. 19, Iss. 5
Closed Access
Jing Liao, Chang Wu Yu, Lei Jiang, et al.
Signal Image and Video Processing (2025) Vol. 19, Iss. 5
Closed Access
Large language model-driven probabilistic trajectory prediction in the Internet of Things using spatio-temporal encoding and normalizing flows
Xiaoliang Wang, Liming Xu, Lian Zhou, et al.
Digital Communications and Networks (2025)
Open Access
Xiaoliang Wang, Liming Xu, Lian Zhou, et al.
Digital Communications and Networks (2025)
Open Access
VASERP: An Adaptive, Lightweight, Secure, and Efficient RFID-Based Authentication Scheme for IoV
Yinyan Gong, Kuan‐Ching Li, Lijun Xiao, et al.
Sensors (2023) Vol. 23, Iss. 11, pp. 5198-5198
Open Access | Times Cited: 11
Yinyan Gong, Kuan‐Ching Li, Lijun Xiao, et al.
Sensors (2023) Vol. 23, Iss. 11, pp. 5198-5198
Open Access | Times Cited: 11
Cross-Layer Federated Learning for Lightweight IoT Intrusion Detection Systems
Suzan Hajj, Joseph Azar, Jacques Bou Abdo, et al.
Sensors (2023) Vol. 23, Iss. 16, pp. 7038-7038
Open Access | Times Cited: 11
Suzan Hajj, Joseph Azar, Jacques Bou Abdo, et al.
Sensors (2023) Vol. 23, Iss. 16, pp. 7038-7038
Open Access | Times Cited: 11
Research on hybrid intrusion detection based on improved Harris Hawk optimization algorithm
Peng-Zhen Zhou, Huifu Zhang, Wei Liang
Connection Science (2023) Vol. 35, Iss. 1
Open Access | Times Cited: 8
Peng-Zhen Zhou, Huifu Zhang, Wei Liang
Connection Science (2023) Vol. 35, Iss. 1
Open Access | Times Cited: 8
A DRL-Based Decentralized Computation Offloading Method: An Example of an Intelligent Manufacturing Scenario
Shaofei Lu, Shen Liu, Yajun Zhu, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 9, pp. 9631-9641
Closed Access | Times Cited: 12
Shaofei Lu, Shen Liu, Yajun Zhu, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 9, pp. 9631-9641
Closed Access | Times Cited: 12
How COVID-19 impacts telehealth: an empirical study of telehealth services, users and the use of metaverse
Lihong Tang, Tingmin Wu, Xiao Chen, et al.
Connection Science (2024) Vol. 36, Iss. 1
Open Access | Times Cited: 2
Lihong Tang, Tingmin Wu, Xiao Chen, et al.
Connection Science (2024) Vol. 36, Iss. 1
Open Access | Times Cited: 2
The security and privacy challenges toward cybersecurity of 6G networks: A comprehensive review
Yanlu Li, Yufeng Xiao, Wei Liang, et al.
Computer Science and Information Systems (2024) Vol. 21, Iss. 3, pp. 851-897
Open Access | Times Cited: 2
Yanlu Li, Yufeng Xiao, Wei Liang, et al.
Computer Science and Information Systems (2024) Vol. 21, Iss. 3, pp. 851-897
Open Access | Times Cited: 2
Blockchain-Based Hybrid Reliable User Selection Scheme for Task Allocation in Mobile Crowd Sensing
Shiwen Zhang, Zhixue Li, Wei Liang, et al.
IEEE Transactions on Network Science and Engineering (2024) Vol. 11, Iss. 6, pp. 6494-6510
Closed Access | Times Cited: 2
Shiwen Zhang, Zhixue Li, Wei Liang, et al.
IEEE Transactions on Network Science and Engineering (2024) Vol. 11, Iss. 6, pp. 6494-6510
Closed Access | Times Cited: 2
Advances in semi-supervised classification of hyperspectral remote sensing images
Xing Yang, Leyuan Fang, Jun Yue
National Remote Sensing Bulletin (2024) Vol. 28, Iss. 1, pp. 20-41
Open Access | Times Cited: 1
Xing Yang, Leyuan Fang, Jun Yue
National Remote Sensing Bulletin (2024) Vol. 28, Iss. 1, pp. 20-41
Open Access | Times Cited: 1
Research on Improving Higher Education Exam Quality Based on Weighted k-Medoids Clustering
Linshu Chen, Tao Li, Yuxiang Chen, et al.
Communications in computer and information science (2024), pp. 194-209
Closed Access | Times Cited: 1
Linshu Chen, Tao Li, Yuxiang Chen, et al.
Communications in computer and information science (2024), pp. 194-209
Closed Access | Times Cited: 1