OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Showing 1-25 of 91 citing articles:

On the reliable detection of concept drift from streaming unlabeled data
Tegjyot Singh Sethi, Mehmed Kantardzic
Expert Systems with Applications (2017) Vol. 82, pp. 77-99
Open Access | Times Cited: 178

DroidEvolver: Self-Evolving Android Malware Detection System
Ke Xu, Yingjiu Li, Robert H. Deng, et al.
(2019)
Open Access | Times Cited: 123

Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection
Deqiang Li, Qianmu Li
IEEE Transactions on Information Forensics and Security (2020) Vol. 15, pp. 3886-3900
Open Access | Times Cited: 117

DeepRefiner: Multi-layer Android Malware Detection System Applying Deep Neural Networks
Ke Xu, Yingjiu Li, Robert H. Deng, et al.
(2018), pp. 473-487
Closed Access | Times Cited: 115

Malware Detection in Adversarial Settings
Wei Yang, Deguang Kong, Tao Xie, et al.
(2017)
Closed Access | Times Cited: 106

A malware classification method based on memory dump grayscale image
Yusheng Dai, Hui Li, Yekui Qian, et al.
Digital Investigation (2018) Vol. 27, pp. 30-37
Closed Access | Times Cited: 93

Malware Analysis By Combining Multiple Detectors and Observation Windows
Massimo Ficco
IEEE Transactions on Computers (2021), pp. 1-1
Closed Access | Times Cited: 68

Handling adversarial concept drift in streaming data
Tegjyot Singh Sethi, Mehmed Kantardzic
Expert Systems with Applications (2017) Vol. 97, pp. 18-40
Open Access | Times Cited: 67

Using Multi-features and Ensemble Learning Method for Imbalanced Malware Classification
Yunan Zhang, Qingjia Huang, Xinjian Ma, et al.
2015 IEEE Trustcom/BigDataSE/ISPA (2016), pp. 965-973
Closed Access | Times Cited: 65

Towards Adversarial Malware Detection
Davide Maiorca, Battista Biggio, Giorgio Giacinto
ACM Computing Surveys (2019) Vol. 52, Iss. 4, pp. 1-36
Open Access | Times Cited: 64

HideNoSeek
Aurore Fass, Michael Backes, Ben Stock
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2019)
Closed Access | Times Cited: 56

A Framework for Enhancing Deep Neural Networks Against Adversarial Malware
Deqiang Li, Qianmu Li, Yanfang Ye, et al.
IEEE Transactions on Network Science and Engineering (2021) Vol. 8, Iss. 1, pp. 736-750
Open Access | Times Cited: 47

A Survey of Adversarial Attack and Defense Methods for Malware Classification in Cyber Security
Senming Yan, Jing Ren, Wei Wang, et al.
IEEE Communications Surveys & Tutorials (2022) Vol. 25, Iss. 1, pp. 467-496
Closed Access | Times Cited: 35

PDF Malware Detection Based on Optimizable Decision Trees
Qasem Abu Al‐Haija, Ammar Odeh, Hazem Qattous
Electronics (2022) Vol. 11, Iss. 19, pp. 3142-3142
Open Access | Times Cited: 34

Enhancing Robustness of Machine Learning Systems via Data Transformations
Arjun Nitin Bhagoji, Daniel Cullina, Chawin Sitawarin, et al.
arXiv (Cornell University) (2017)
Closed Access | Times Cited: 58

RHMD
Khaled N. Khasawneh, Nael Abu‐Ghazaleh, Dmitry Ponomarev, et al.
(2017), pp. 315-327
Closed Access | Times Cited: 57

Decision-based evasion attacks on tree ensemble classifiers
Fuyong Zhang, Yi Wang, Shigang Liu, et al.
World Wide Web (2020) Vol. 23, Iss. 5, pp. 2957-2977
Closed Access | Times Cited: 49

Adversarial Patterns: Building Robust Android Malware Classifiers
Dipkamal Bhusal, Nidhi Rastogi
ACM Computing Surveys (2025)
Open Access

Data driven exploratory attacks on black box classifiers in adversarial domains
Tegjyot Singh Sethi, Mehmed Kantardzic
Neurocomputing (2018) Vol. 289, pp. 129-143
Open Access | Times Cited: 45

Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware
Davide Maiorca, Battista Biggio
IEEE Security & Privacy (2019) Vol. 17, Iss. 1, pp. 63-71
Open Access | Times Cited: 41

EnsembleHMD: Accurate Hardware Malware Detectors with Specialized Ensemble Classifiers
Khaled N. Khasawneh, Meltem Özsoy, Caleb Donovick, et al.
IEEE Transactions on Dependable and Secure Computing (2018) Vol. 17, Iss. 3, pp. 620-633
Open Access | Times Cited: 38

Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks
Davide Maiorca, Battista Biggio, Giorgio Giacinto
UNICA IRIS Institutional Research Information System (University of Cagliari) (2019) Vol. 52, Iss. 4, pp. 1-36
Open Access | Times Cited: 37

Malware Detection in PDF and Office Documents: A survey
Priyansh Singh, Shashikala Tapaswi, Sanchit Gupta
Information Security Journal A Global Perspective (2020) Vol. 29, Iss. 3, pp. 134-153
Closed Access | Times Cited: 33

A feature-vector generative adversarial network for evading PDF malware classifiers
Yuanzhang Li, Yaxiao Wang, Ye Wang, et al.
Information Sciences (2020) Vol. 523, pp. 38-48
Closed Access | Times Cited: 33

Boosting training for PDF malware classifier via active learning
Yuanzhang Li, Xinxin Wang, Zhiwei Shi, et al.
International Journal of Intelligent Systems (2021) Vol. 37, Iss. 4, pp. 2803-2821
Open Access | Times Cited: 27

Page 1 - Next Page

Scroll to top