
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
An Enhanced Multi-Stage Deep Learning Framework for Detecting Malicious Activities From Autonomous Vehicles
Izhar Ahmed Khan, Nour Moustafa, Dechang Pi, et al.
IEEE Transactions on Intelligent Transportation Systems (2021) Vol. 23, Iss. 12, pp. 25469-25478
Closed Access | Times Cited: 75
Izhar Ahmed Khan, Nour Moustafa, Dechang Pi, et al.
IEEE Transactions on Intelligent Transportation Systems (2021) Vol. 23, Iss. 12, pp. 25469-25478
Closed Access | Times Cited: 75
Showing 1-25 of 75 citing articles:
Design and Development of RNN Anomaly Detection Model for IoT Networks
Imtiaz Ullah, Qusay H. Mahmoud
IEEE Access (2022) Vol. 10, pp. 62722-62750
Open Access | Times Cited: 134
Imtiaz Ullah, Qusay H. Mahmoud
IEEE Access (2022) Vol. 10, pp. 62722-62750
Open Access | Times Cited: 134
AI-Based Intrusion Detection Systems for In-Vehicle Networks: A Survey
Sampath Rajapaksha, Harsha Kalutarage, M. Omar Al-Kadri, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 11, pp. 1-40
Open Access | Times Cited: 82
Sampath Rajapaksha, Harsha Kalutarage, M. Omar Al-Kadri, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 11, pp. 1-40
Open Access | Times Cited: 82
Autonomous Vehicles: Sophisticated Attacks, Safety Issues, Challenges, Open Topics, Blockchain, and Future Directions
Αναστάσιος Γιάνναρος, Aristeidis Karras, Leonidas Theodorakopoulos, et al.
Journal of Cybersecurity and Privacy (2023) Vol. 3, Iss. 3, pp. 493-543
Open Access | Times Cited: 77
Αναστάσιος Γιάνναρος, Aristeidis Karras, Leonidas Theodorakopoulos, et al.
Journal of Cybersecurity and Privacy (2023) Vol. 3, Iss. 3, pp. 493-543
Open Access | Times Cited: 77
A Survey on Machine Learning-Based Misbehavior Detection Systems for 5G and Beyond Vehicular Networks
Abdelwahab Boualouache, Thomas Engel
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 2, pp. 1128-1172
Open Access | Times Cited: 62
Abdelwahab Boualouache, Thomas Engel
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 2, pp. 1128-1172
Open Access | Times Cited: 62
Blockchain security enhancement: an approach towards hybrid consensus algorithms and machine learning techniques
K. Venkatesan, Syarifah Bahiyah Rahayu
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 38
K. Venkatesan, Syarifah Bahiyah Rahayu
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 38
Anomaly Detection in Connected and Autonomous Vehicles: A Survey, Analysis, and Research Challenges
Sihem Baccari, Mohamed Hadded, Hakim Ghazzai, et al.
IEEE Access (2024) Vol. 12, pp. 19250-19276
Open Access | Times Cited: 16
Sihem Baccari, Mohamed Hadded, Hakim Ghazzai, et al.
IEEE Access (2024) Vol. 12, pp. 19250-19276
Open Access | Times Cited: 16
XSRU-IoMT: Explainable simple recurrent units for threat detection in Internet of Medical Things networks
Izhar Ahmed Khan, Nour Moustafa, Imran Razzak, et al.
Future Generation Computer Systems (2021) Vol. 127, pp. 181-193
Closed Access | Times Cited: 91
Izhar Ahmed Khan, Nour Moustafa, Imran Razzak, et al.
Future Generation Computer Systems (2021) Vol. 127, pp. 181-193
Closed Access | Times Cited: 91
Enhancing IIoT networks protection: A robust security model for attack detection in Internet Industrial Control Systems
Izhar Ahmed Khan, Marwa Keshk, Dechang Pi, et al.
Ad Hoc Networks (2022) Vol. 134, pp. 102930-102930
Closed Access | Times Cited: 62
Izhar Ahmed Khan, Marwa Keshk, Dechang Pi, et al.
Ad Hoc Networks (2022) Vol. 134, pp. 102930-102930
Closed Access | Times Cited: 62
A federated learning framework for cyberattack detection in vehicular sensor networks
Maha Driss, Iman Almomani, Zil e Huma, et al.
Complex & Intelligent Systems (2022) Vol. 8, Iss. 5, pp. 4221-4235
Open Access | Times Cited: 54
Maha Driss, Iman Almomani, Zil e Huma, et al.
Complex & Intelligent Systems (2022) Vol. 8, Iss. 5, pp. 4221-4235
Open Access | Times Cited: 54
Dew-Cloud-Based Hierarchical Federated Learning for Intrusion Detection in IoMT
Parminder Singh, Gurjot Singh Gaba, Avinash Kaur, et al.
IEEE Journal of Biomedical and Health Informatics (2022) Vol. 27, Iss. 2, pp. 722-731
Open Access | Times Cited: 48
Parminder Singh, Gurjot Singh Gaba, Avinash Kaur, et al.
IEEE Journal of Biomedical and Health Informatics (2022) Vol. 27, Iss. 2, pp. 722-731
Open Access | Times Cited: 48
Transformer-Based Attention Network for In-Vehicle Intrusion Detection
Trieu-Phong Nguyen, Heungwoo Nam, Daehee Kim
IEEE Access (2023) Vol. 11, pp. 55389-55403
Open Access | Times Cited: 31
Trieu-Phong Nguyen, Heungwoo Nam, Daehee Kim
IEEE Access (2023) Vol. 11, pp. 55389-55403
Open Access | Times Cited: 31
WKN-OC: A New Deep Learning Method for Anomaly Detection in Intelligent Vehicles
Zhitao He, Yongyi Chen, Hui Zhang, et al.
IEEE Transactions on Intelligent Vehicles (2023) Vol. 8, Iss. 3, pp. 2162-2172
Closed Access | Times Cited: 23
Zhitao He, Yongyi Chen, Hui Zhang, et al.
IEEE Transactions on Intelligent Vehicles (2023) Vol. 8, Iss. 3, pp. 2162-2172
Closed Access | Times Cited: 23
Anomaly diagnosis of connected autonomous vehicles: A survey
Yukun Fang, Haigen Min, Xia Wu, et al.
Information Fusion (2024) Vol. 105, pp. 102223-102223
Closed Access | Times Cited: 12
Yukun Fang, Haigen Min, Xia Wu, et al.
Information Fusion (2024) Vol. 105, pp. 102223-102223
Closed Access | Times Cited: 12
Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks
Mohammed Almehdhar, Abdullatif Albaseer, Muhammad Asif Khan, et al.
IEEE Open Journal of Vehicular Technology (2024) Vol. 5, pp. 869-906
Open Access | Times Cited: 11
Mohammed Almehdhar, Abdullatif Albaseer, Muhammad Asif Khan, et al.
IEEE Open Journal of Vehicular Technology (2024) Vol. 5, pp. 869-906
Open Access | Times Cited: 11
Zero-X: A Blockchain-Enabled Open-Set Federated Learning Framework for Zero-Day Attack Detection in IoV
Abdelaziz Amara Korba, Abdelwahab Boualouache, Yacine Ghamri-Doudane
IEEE Transactions on Vehicular Technology (2024) Vol. 73, Iss. 9, pp. 12399-12414
Open Access | Times Cited: 9
Abdelaziz Amara Korba, Abdelwahab Boualouache, Yacine Ghamri-Doudane
IEEE Transactions on Vehicular Technology (2024) Vol. 73, Iss. 9, pp. 12399-12414
Open Access | Times Cited: 9
Federated Learning-Based Misbehaviour Detection for the 5G-Enabled Internet of Vehicles
Preeti Rani, Chandani Sharma, Janjhyam Venkata Naga Ramesh, et al.
IEEE Transactions on Consumer Electronics (2023) Vol. 70, Iss. 2, pp. 4656-4664
Closed Access | Times Cited: 16
Preeti Rani, Chandani Sharma, Janjhyam Venkata Naga Ramesh, et al.
IEEE Transactions on Consumer Electronics (2023) Vol. 70, Iss. 2, pp. 4656-4664
Closed Access | Times Cited: 16
Enhancing network intrusion detection: a dual-ensemble approach with CTGAN-balanced data and weak classifiers
Mohammad Reza Abbaszadeh Bavil Soflaei, Arash Salehpour, Karim Samadzamini
The Journal of Supercomputing (2024) Vol. 80, Iss. 11, pp. 16301-16333
Closed Access | Times Cited: 7
Mohammad Reza Abbaszadeh Bavil Soflaei, Arash Salehpour, Karim Samadzamini
The Journal of Supercomputing (2024) Vol. 80, Iss. 11, pp. 16301-16333
Closed Access | Times Cited: 7
OQFL: An Optimized Quantum-Based Federated Learning Framework for Defending Against Adversarial Attacks in Intelligent Transportation Systems
Waleed Yamany, Nour Moustafa, Benjamin Turnbull
IEEE Transactions on Intelligent Transportation Systems (2021) Vol. 24, Iss. 1, pp. 893-903
Closed Access | Times Cited: 33
Waleed Yamany, Nour Moustafa, Benjamin Turnbull
IEEE Transactions on Intelligent Transportation Systems (2021) Vol. 24, Iss. 1, pp. 893-903
Closed Access | Times Cited: 33
Deep Learning and Autonomous Vehicles: Strategic Themes, Applications, and Research Agenda Using SciMAT and Content-Centric Analysis, a Systematic Review
Fábio Eid Morooka, Adalberto Manoel, Tiago Fonseca Albuquerque Cavalcanti Sigahi, et al.
Machine Learning and Knowledge Extraction (2023) Vol. 5, Iss. 3, pp. 763-781
Open Access | Times Cited: 14
Fábio Eid Morooka, Adalberto Manoel, Tiago Fonseca Albuquerque Cavalcanti Sigahi, et al.
Machine Learning and Knowledge Extraction (2023) Vol. 5, Iss. 3, pp. 763-781
Open Access | Times Cited: 14
Intrusion detection system for vehicular ad hoc network attacks based on machine learning techniques
Wasim A. Ali, Michèle Roccotelli, Gennaro Boggia, et al.
Information Security Journal A Global Perspective (2024) Vol. 33, Iss. 6, pp. 659-677
Closed Access | Times Cited: 5
Wasim A. Ali, Michèle Roccotelli, Gennaro Boggia, et al.
Information Security Journal A Global Perspective (2024) Vol. 33, Iss. 6, pp. 659-677
Closed Access | Times Cited: 5
Efficient Distributed Denial of Service Attack Detection in Internet of Vehicles Using Gini Index Feature Selection and Federated Learning
Muhammad Dilshad, Madiha Haider Syed, Semeen Rehman
Future Internet (2025) Vol. 17, Iss. 1, pp. 9-9
Open Access
Muhammad Dilshad, Madiha Haider Syed, Semeen Rehman
Future Internet (2025) Vol. 17, Iss. 1, pp. 9-9
Open Access
Federated Workload-Aware Quantized Framework for Secure Learning in Data-Sensitive Applications
Manu Narula, Jasraj Meena, Dinesh Kumar Vishwakarma
Future Generation Computer Systems (2025) Vol. 168, pp. 107772-107772
Closed Access
Manu Narula, Jasraj Meena, Dinesh Kumar Vishwakarma
Future Generation Computer Systems (2025) Vol. 168, pp. 107772-107772
Closed Access
Arpotcam: augmented reality-driven honeypot for enhancing security in IoT surveillance systems
Volviane Saphir Mfogo, Alain B. Zemkoho, Laurent Njilla, et al.
The Visual Computer (2025)
Closed Access
Volviane Saphir Mfogo, Alain B. Zemkoho, Laurent Njilla, et al.
The Visual Computer (2025)
Closed Access
Multi-objective evolving long–short term memory networks with attention for network intrusion detection
Wenhong Wei, Yi Chen, Qiuzhen Lin, et al.
Applied Soft Computing (2023) Vol. 139, pp. 110216-110216
Closed Access | Times Cited: 11
Wenhong Wei, Yi Chen, Qiuzhen Lin, et al.
Applied Soft Computing (2023) Vol. 139, pp. 110216-110216
Closed Access | Times Cited: 11
An Optimized B_LSTM Intrusion Detection Framework for Internet of Vehicles
Ch. Ravi Kishore, Divya Rao, H. S. Behera
Lecture notes in networks and systems (2025), pp. 595-611
Closed Access
Ch. Ravi Kishore, Divya Rao, H. S. Behera
Lecture notes in networks and systems (2025), pp. 595-611
Closed Access