OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Network Abnormal Traffic Detection Model Based on Semi-Supervised Deep Reinforcement Learning
Shi Dong, Yuanjun Xia, Tao Peng
IEEE Transactions on Network and Service Management (2021) Vol. 18, Iss. 4, pp. 4197-4212
Closed Access | Times Cited: 122

Showing 1-25 of 122 citing articles:

A comprehensive survey on design and application of autoencoder in deep learning
Pengzhi Li, Yan Pei, Jianqiang Li
Applied Soft Computing (2023) Vol. 138, pp. 110176-110176
Closed Access | Times Cited: 182

Composition of Hybrid Deep Learning Model and Feature Optimization for Intrusion Detection System
Azriel Henry, Sunil Gautam, Samrat Khanna, et al.
Sensors (2023) Vol. 23, Iss. 2, pp. 890-890
Open Access | Times Cited: 63

Anomaly Traffic Detection Based on Communication-Efficient Federated Learning in Space-Air-Ground Integration Network
Haitao Xu, Shuying Han, Xuhui Li, et al.
IEEE Transactions on Wireless Communications (2023) Vol. 22, Iss. 12, pp. 9346-9360
Closed Access | Times Cited: 63

Dependable intrusion detection system using deep convolutional neural network: A Novel framework and performance evaluation approach
Vanlalruata Hnamte, Jamal Hussain
Telematics and Informatics Reports (2023) Vol. 11, pp. 100077-100077
Open Access | Times Cited: 46

Cyber-Secure SDN: A CNN-Based Approach for Efficient Detection and Mitigation of DDoS attacks
Ashfaq Ahmad Najar, S. Manohar Naik
Computers & Security (2024) Vol. 139, pp. 103716-103716
Closed Access | Times Cited: 26

Deep Learning for Credit Card Fraud Detection: A Review of Algorithms, Challenges, and Solutions
Ibomoiye Domor Mienye, Nobert Jere
IEEE Access (2024) Vol. 12, pp. 96893-96910
Open Access | Times Cited: 22

Electricity Theft Detection Using Deep Reinforcement Learning in Smart Power Grids
Ahmed T. El-Toukhy, Mahmoud M. Badr, Mohamed Mahmoud, et al.
IEEE Access (2023) Vol. 11, pp. 59558-59574
Open Access | Times Cited: 39

ID-RDRL: a deep reinforcement learning-based feature selection intrusion detection model
Kezhou Ren, Yifan Zeng, Zhiqin Cao, et al.
Scientific Reports (2022) Vol. 12, Iss. 1
Open Access | Times Cited: 38

A performance overview of machine learning-based defense strategies for advanced persistent threats in industrial control systems
Muhammad Imran, Hafeez Ur Rehman Siddiqui, Ali Raza, et al.
Computers & Security (2023) Vol. 134, pp. 103445-103445
Closed Access | Times Cited: 25

Deep Learning Model Transposition for Network Intrusion Detection Systems
João Figueiredo, Carlos Serrão, Ana de Almeida
Electronics (2023) Vol. 12, Iss. 2, pp. 293-293
Open Access | Times Cited: 24

Security Threats and Promising Solutions Arising from the Intersection of AI and IoT: A Study of IoMT and IoET Applications
Hadeel Alrubayyi, Moudy Sharaf Alshareef, Zunaira Nadeem, et al.
Future Internet (2024) Vol. 16, Iss. 3, pp. 85-85
Open Access | Times Cited: 10

Two-dimensional model-free Q-learning-based output feedback fault-tolerant control for batch processes
Huiyuan Shi, Wei Gao, Xueying Jiang, et al.
Computers & Chemical Engineering (2024) Vol. 182, pp. 108583-108583
Closed Access | Times Cited: 9

Cyber-security and reinforcement learning — A brief survey
Amrin Maria Khan Adawadkar, Nilima Kulkarni
Engineering Applications of Artificial Intelligence (2022) Vol. 114, pp. 105116-105116
Closed Access | Times Cited: 35

Anomaly detection in Internet of medical Things with Blockchain from the perspective of deep neural network
Jun Wang, Hanlei Jin, Junxiao Chen, et al.
Information Sciences (2022) Vol. 617, pp. 133-149
Closed Access | Times Cited: 31

Deep learning based multi-labelled soil classification and empirical estimation toward sustainable agriculture
J. Padmapriya, T. Sasilatha
Engineering Applications of Artificial Intelligence (2022) Vol. 119, pp. 105690-105690
Closed Access | Times Cited: 28

Iot-Based Privacy-Preserving Anomaly Detection Model for Smart Agriculture
Keerthi Kethineni, G. Pradeepini
Systems (2023) Vol. 11, Iss. 6, pp. 304-304
Open Access | Times Cited: 17

A Holistic Approach to Ransomware Classification: Leveraging Static and Dynamic Analysis with Visualization
Bahaa Yamany, Mahmoud Said Elsayed, Anca Delia Jurcut, et al.
Information (2024) Vol. 15, Iss. 1, pp. 46-46
Open Access | Times Cited: 7

Research on the Multimodal Digital Teaching Quality Data Evaluation Model Based on Fuzzy BP Neural Network
Feng Wen-yan, Fan Feng
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-12
Open Access | Times Cited: 23

Active Client Selection for Clustered Federated Learning
Honglan Huang, Wei Shi, Yanghe Feng, et al.
IEEE Transactions on Neural Networks and Learning Systems (2023) Vol. 35, Iss. 11, pp. 16424-16438
Closed Access | Times Cited: 14

MAFSIDS: a reinforcement learning-based intrusion detection model for multi-agent feature selection networks
Kezhou Ren, Yifan Zeng, Yuanfu Zhong, et al.
Journal Of Big Data (2023) Vol. 10, Iss. 1
Open Access | Times Cited: 14

Machine Learning Techniques for Cyberattack Prevention in IoT Systems: A Comparative Perspective of Cybersecurity and Cyberdefense in Colombia
Emanuel Ortiz-Ruiz, Juan Ramón Bermejo Higuera, Juan Antonio Sicilia Montalvo, et al.
Electronics (2024) Vol. 13, Iss. 5, pp. 824-824
Open Access | Times Cited: 5

Enhanced Deep Autoencoder-Based Reinforcement Learning Model with Improved Flamingo Search Policy Selection for Attack Classification
Dharani Kanta Roy, Hemanta Kalita
Journal of Cybersecurity and Privacy (2025) Vol. 5, Iss. 1, pp. 3-3
Open Access

Application of deep reinforcement learning for intrusion detection in Internet of Things: A systematic review
Saeid Jamshidi, Amin Nikanjam, Kawser Wazed Nafi, et al.
Internet of Things (2025), pp. 101531-101531
Closed Access

IGSA-SAC: a novel approach for intrusion detection using improved gravitational search algorithm and soft actor-critic
Lizhong Jin, Ruzong Fan, Xiaoling Han, et al.
Frontiers in Computer Science (2025) Vol. 7
Open Access

Page 1 - Next Page

Scroll to top