
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Many-Objective Optimization Based Intrusion Detection for in-Vehicle Network Security
Jiangjiang Zhang, Bei Gong, Muhammad Waqas, et al.
IEEE Transactions on Intelligent Transportation Systems (2023) Vol. 24, Iss. 12, pp. 15051-15065
Open Access | Times Cited: 10
Jiangjiang Zhang, Bei Gong, Muhammad Waqas, et al.
IEEE Transactions on Intelligent Transportation Systems (2023) Vol. 24, Iss. 12, pp. 15051-15065
Open Access | Times Cited: 10
Showing 10 citing articles:
A review of security attacks and intrusion detection in the vehicular networks
Tarak Nandy, Rafidah Md Noor, Raenu Kolandaisamy, et al.
Journal of King Saud University - Computer and Information Sciences (2024) Vol. 36, Iss. 2, pp. 101945-101945
Open Access | Times Cited: 10
Tarak Nandy, Rafidah Md Noor, Raenu Kolandaisamy, et al.
Journal of King Saud University - Computer and Information Sciences (2024) Vol. 36, Iss. 2, pp. 101945-101945
Open Access | Times Cited: 10
Intrusion Detection Model for Internet of Vehicles Using GRIPCA and OWELM
Kai‐Jun Zhang, Jiayu Yang, Yangfei Shao, et al.
IEEE Access (2024) Vol. 12, pp. 28911-28925
Open Access | Times Cited: 7
Kai‐Jun Zhang, Jiayu Yang, Yangfei Shao, et al.
IEEE Access (2024) Vol. 12, pp. 28911-28925
Open Access | Times Cited: 7
SIDiLDNG: A similarity-based intrusion detection system using improved Levenshtein Distance and N-gram for CAN
Jiaru Song, Guihe Qin, Yanhua Liang, et al.
Computers & Security (2024) Vol. 142, pp. 103847-103847
Closed Access | Times Cited: 6
Jiaru Song, Guihe Qin, Yanhua Liang, et al.
Computers & Security (2024) Vol. 142, pp. 103847-103847
Closed Access | Times Cited: 6
Intrusion Detection System for Connected Autonomous Vehicles Using Spatio-Temporal Information
Q.S. Liu, Guihe Qin, Yanhua Liang, et al.
(2025)
Closed Access
Q.S. Liu, Guihe Qin, Yanhua Liang, et al.
(2025)
Closed Access
Design a multi-objective optimization with dynamic and global filter pruning strategy for convolutional neural network
Divya Singh, T. Prabhakara Rao, N. Veeranjaneyulu, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 1
Divya Singh, T. Prabhakara Rao, N. Veeranjaneyulu, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 1
Large-Scale Multi-Objective Optimization Algorithm Based on Weighted Overlapping Grouping of Decision Variables
Liang Chen, Jingbo Zhang, Linjie Wu, et al.
Computer Modeling in Engineering & Sciences (2024) Vol. 140, Iss. 1, pp. 363-383
Open Access
Liang Chen, Jingbo Zhang, Linjie Wu, et al.
Computer Modeling in Engineering & Sciences (2024) Vol. 140, Iss. 1, pp. 363-383
Open Access
A Generalized and Robust Nonlinear Approach based on Machine Learning for Intrusion Detection
Jakiur Rahman, Jaskaran Singh, Soumen Nayak, et al.
Applied Artificial Intelligence (2024) Vol. 38, Iss. 1
Open Access
Jakiur Rahman, Jaskaran Singh, Soumen Nayak, et al.
Applied Artificial Intelligence (2024) Vol. 38, Iss. 1
Open Access
RBSS: A fast subset selection strategy for multi-objective optimization
Hainan Zhang, Jianhou Gan, Juxiang Zhou, et al.
Swarm and Evolutionary Computation (2024) Vol. 90, pp. 101659-101659
Closed Access
Hainan Zhang, Jianhou Gan, Juxiang Zhou, et al.
Swarm and Evolutionary Computation (2024) Vol. 90, pp. 101659-101659
Closed Access
Network Traffic Anomaly Detection in CAN Bus Based on Ensemble Learning
Yu‐Xi Wu, Xiaodong Tao
(2024), pp. 240-245
Closed Access
Yu‐Xi Wu, Xiaodong Tao
(2024), pp. 240-245
Closed Access
T-Shaped CAN Feature Integration With Lightweight Deep Learning Model for In-Vehicle Network Intrusion Detection
Sha Huan, Xiaoyi Zhang, Wenli Shang, et al.
IEEE Transactions on Intelligent Transportation Systems (2024) Vol. 25, Iss. 12, pp. 21183-21196
Closed Access
Sha Huan, Xiaoyi Zhang, Wenli Shang, et al.
IEEE Transactions on Intelligent Transportation Systems (2024) Vol. 25, Iss. 12, pp. 21183-21196
Closed Access