
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
From Data and Model Levels: Improve the Performance of Few-Shot Malware Classification
Yuhan Chai, Jing Qiu, Lihua Yin, et al.
IEEE Transactions on Network and Service Management (2022) Vol. 19, Iss. 4, pp. 4248-4261
Closed Access | Times Cited: 23
Yuhan Chai, Jing Qiu, Lihua Yin, et al.
IEEE Transactions on Network and Service Management (2022) Vol. 19, Iss. 4, pp. 4248-4261
Closed Access | Times Cited: 23
Showing 23 citing articles:
Advanced Persistent Threats (APT): evolution, anatomy, attribution and countermeasures
Amit Sharma, Brij B. Gupta, Awadhesh Kumar Singh, et al.
Journal of Ambient Intelligence and Humanized Computing (2023) Vol. 14, Iss. 7, pp. 9355-9381
Closed Access | Times Cited: 52
Amit Sharma, Brij B. Gupta, Awadhesh Kumar Singh, et al.
Journal of Ambient Intelligence and Humanized Computing (2023) Vol. 14, Iss. 7, pp. 9355-9381
Closed Access | Times Cited: 52
FASNet: Federated Adversarial Siamese Networks for Robust Malware Image Classification
Namrata Govind Ambekar, Sonali Samal, N. Nandini Devi, et al.
Journal of Parallel and Distributed Computing (2025) Vol. 198, pp. 105039-105039
Closed Access
Namrata Govind Ambekar, Sonali Samal, N. Nandini Devi, et al.
Journal of Parallel and Distributed Computing (2025) Vol. 198, pp. 105039-105039
Closed Access
A Few-Shot Class-Incremental Learning Method for Network Intrusion Detection
Lei Du, Zhaoquan Gu, Ye Wang, et al.
IEEE Transactions on Network and Service Management (2023) Vol. 21, Iss. 2, pp. 2389-2401
Closed Access | Times Cited: 15
Lei Du, Zhaoquan Gu, Ye Wang, et al.
IEEE Transactions on Network and Service Management (2023) Vol. 21, Iss. 2, pp. 2389-2401
Closed Access | Times Cited: 15
Bubble detection in photoresist with small samples based on GAN augmentations and modified YOLO
Guang Yang, Chunhe Song, Zhijia Yang, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 123, pp. 106224-106224
Closed Access | Times Cited: 14
Guang Yang, Chunhe Song, Zhijia Yang, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 123, pp. 106224-106224
Closed Access | Times Cited: 14
Earthworm Optimization Algorithm Based Cascade LSTM-GRU Model for Android Malware Detection
Brij B. Gupta, Akshat Gaurav, Varsha Arya, et al.
Cyber Security and Applications (2025), pp. 100083-100083
Open Access
Brij B. Gupta, Akshat Gaurav, Varsha Arya, et al.
Cyber Security and Applications (2025), pp. 100083-100083
Open Access
Advanced Malware Collector: A Semi-Automated Framework for Hunting Advanced Persistent Threat Malware and Tools
Amit Sharma, Brij B. Gupta, Awadhesh Kumar Singh, et al.
Advances in intelligent systems and computing (2025), pp. 267-282
Closed Access
Amit Sharma, Brij B. Gupta, Awadhesh Kumar Singh, et al.
Advances in intelligent systems and computing (2025), pp. 267-282
Closed Access
Exploring the Impact of Imbalanced Data on Machine Learning-Based Malware Detection
Snehal Kulkarni, Akshat Gaurav, Francisco José García‐Peñalvo, et al.
Advances in intelligent systems and computing (2025), pp. 330-336
Closed Access
Snehal Kulkarni, Akshat Gaurav, Francisco José García‐Peñalvo, et al.
Advances in intelligent systems and computing (2025), pp. 330-336
Closed Access
A Survey of Defensive Deception Technology Based on Application Level
Ningning Chen, Le Wang, Xiaoxin Lin, et al.
Advances in intelligent systems and computing (2025), pp. 310-329
Closed Access
Ningning Chen, Le Wang, Xiaoxin Lin, et al.
Advances in intelligent systems and computing (2025), pp. 310-329
Closed Access
FAMCF: A few-shot Android malware family classification framework
Fan Zhou, Dongxia Wang, Yanhai Xiong, et al.
Computers & Security (2024) Vol. 146, pp. 104027-104027
Closed Access | Times Cited: 2
Fan Zhou, Dongxia Wang, Yanhai Xiong, et al.
Computers & Security (2024) Vol. 146, pp. 104027-104027
Closed Access | Times Cited: 2
Semantic Web-Based Structural Equation Modeling and Mediating Effects Are Used to Investigate Key Factors
Hao Ma, Gai Zhi-yi
International Journal on Semantic Web and Information Systems (2024) Vol. 20, Iss. 1, pp. 1-27
Open Access | Times Cited: 1
Hao Ma, Gai Zhi-yi
International Journal on Semantic Web and Information Systems (2024) Vol. 20, Iss. 1, pp. 1-27
Open Access | Times Cited: 1
A Network Security Situation Prediction Method Based on SSA-GResNeSt
Dongmei Zhao, Guoqing Ji, Shujun Zhang, et al.
IEEE Transactions on Network and Service Management (2024) Vol. 21, Iss. 3, pp. 3498-3510
Closed Access | Times Cited: 1
Dongmei Zhao, Guoqing Ji, Shujun Zhang, et al.
IEEE Transactions on Network and Service Management (2024) Vol. 21, Iss. 3, pp. 3498-3510
Closed Access | Times Cited: 1
Ada‐FFL: Adaptive computing fairness federated learning
Yue Cong, Jing Qiu, Kun Zhang, et al.
CAAI Transactions on Intelligence Technology (2023) Vol. 9, Iss. 3, pp. 573-584
Open Access | Times Cited: 4
Yue Cong, Jing Qiu, Kun Zhang, et al.
CAAI Transactions on Intelligence Technology (2023) Vol. 9, Iss. 3, pp. 573-584
Open Access | Times Cited: 4
Using knowledge graphs and contrastive learning for detecting APT Malware on Endpoint systems
Cho Do Xuan, Hoa D. Nguyen
Journal of Intelligent & Fuzzy Systems (2023) Vol. 45, Iss. 3, pp. 4517-4533
Closed Access | Times Cited: 3
Cho Do Xuan, Hoa D. Nguyen
Journal of Intelligent & Fuzzy Systems (2023) Vol. 45, Iss. 3, pp. 4517-4533
Closed Access | Times Cited: 3
Deep consistency-preserving hash auto-encoders for neuroimage cross-modal retrieval
Xinyu Wang, Xianhua Zeng
Scientific Reports (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 2
Xinyu Wang, Xianhua Zeng
Scientific Reports (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 2
ACMFNN: A Novel Design of an Augmented Convolutional Model for Intelligent Cross-Domain Malware Localization via Forensic Neural Networks
Rijvan Beg, R. K. Pateriya, Deepak Singh Tomar
IEEE Access (2023) Vol. 11, pp. 87945-87957
Open Access | Times Cited: 2
Rijvan Beg, R. K. Pateriya, Deepak Singh Tomar
IEEE Access (2023) Vol. 11, pp. 87945-87957
Open Access | Times Cited: 2
Few-Shot Blockchain Domain Named Entity Recognition with Fused Lexical Features
Hao Chen, Yang Lin, Rongrong Chen, et al.
Mechanisms and machine science (2024), pp. 595-613
Closed Access
Hao Chen, Yang Lin, Rongrong Chen, et al.
Mechanisms and machine science (2024), pp. 595-613
Closed Access
Crowdsourcing Malware Family Annotation: Joint Class-Determined Tag Extraction and Weakly-Tagged Sample Inference
Yongkang Jiang, Gaolei Li, Shenghong Li, et al.
IEEE Transactions on Network and Service Management (2024) Vol. 21, Iss. 4, pp. 4763-4776
Closed Access
Yongkang Jiang, Gaolei Li, Shenghong Li, et al.
IEEE Transactions on Network and Service Management (2024) Vol. 21, Iss. 4, pp. 4763-4776
Closed Access
SoK: Visualization-based Malware Detection Techniques
Matteo Brosolo, Vinod Puthuvath, Asmitha KA, et al.
Proceedings of the 17th International Conference on Availability, Reliability and Security (2024), pp. 1-13
Closed Access
Matteo Brosolo, Vinod Puthuvath, Asmitha KA, et al.
Proceedings of the 17th International Conference on Availability, Reliability and Security (2024), pp. 1-13
Closed Access
LIFT: Discriminant Classification Approach of Malware Family on Time Consistent Open Set
Yuxia Sun, Siyi Pan, Yang Yang, et al.
Lecture notes in computer science (2024), pp. 37-49
Closed Access
Yuxia Sun, Siyi Pan, Yang Yang, et al.
Lecture notes in computer science (2024), pp. 37-49
Closed Access
Few-Shot Malware Classification using Malware Variant and Model Augmentation
Yanni Liu, Ayong Ye, Yuanhuang Liu, et al.
2022 International Conference on Networking and Network Applications (NaNA) (2024), pp. 399-404
Closed Access
Yanni Liu, Ayong Ye, Yuanhuang Liu, et al.
2022 International Conference on Networking and Network Applications (NaNA) (2024), pp. 399-404
Closed Access
Mi-maml: classifying few-shot advanced malware using multi-improved model-agnostic meta-learning
Yulong Ji, Kelly H. Zou, Bin Zou
Cybersecurity (2024) Vol. 7, Iss. 1
Open Access
Yulong Ji, Kelly H. Zou, Bin Zou
Cybersecurity (2024) Vol. 7, Iss. 1
Open Access
Conserving Semantic Unit Information and Simplifying Syntactic Constituents to Improve Implicit Discourse Relation Recognition
Zhongyang Fang, Yue Cong, Yuhan Chai, et al.
Entropy (2023) Vol. 25, Iss. 9, pp. 1294-1294
Open Access
Zhongyang Fang, Yue Cong, Yuhan Chai, et al.
Entropy (2023) Vol. 25, Iss. 9, pp. 1294-1294
Open Access
Multilevel Thresholding-based Medical Image Segmentation using Hybrid Particle Cuckoo Swarm Optimization
Dharmendra Kumar, Anil Kumar Solanki, Anil Ahlawat
Recent Advances in Computer Science and Communications (2023) Vol. 17, Iss. 5
Closed Access
Dharmendra Kumar, Anil Kumar Solanki, Anil Ahlawat
Recent Advances in Computer Science and Communications (2023) Vol. 17, Iss. 5
Closed Access