
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Intrusion Detection Based on Bidirectional Long Short-Term Memory with Attention Mechanism
Yongjie Yang, Shanshan Tu, Raja Hashim Ali, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 74, Iss. 1, pp. 801-815
Open Access | Times Cited: 51
Yongjie Yang, Shanshan Tu, Raja Hashim Ali, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 74, Iss. 1, pp. 801-815
Open Access | Times Cited: 51
Showing 1-25 of 51 citing articles:
ResInceptNet-SA: A Network Traffic Intrusion Detection Model Fusing Feature Selection and Balanced Datasets
Guorui Liu, Tianlin Zhang, Hualin Dai, et al.
Applied Sciences (2025) Vol. 15, Iss. 2, pp. 956-956
Open Access | Times Cited: 1
Guorui Liu, Tianlin Zhang, Hualin Dai, et al.
Applied Sciences (2025) Vol. 15, Iss. 2, pp. 956-956
Open Access | Times Cited: 1
Predictive analysis on severity of Non-Alcoholic Fatty Liver Disease (NAFLD) using Machine Learning Algorithms
Muhamamd Haseeb Aslam, Syed Fawad Hussain, Raja Hashim Ali
(2022), pp. 95-100
Closed Access | Times Cited: 32
Muhamamd Haseeb Aslam, Syed Fawad Hussain, Raja Hashim Ali
(2022), pp. 95-100
Closed Access | Times Cited: 32
Solving Graph Coloring Problem via Graph Neural Network (GNN)
Ali Zeeshan Ijaz, Raja Hashim Ali, Nisar Ali, et al.
(2022), pp. 178-183
Closed Access | Times Cited: 31
Ali Zeeshan Ijaz, Raja Hashim Ali, Nisar Ali, et al.
(2022), pp. 178-183
Closed Access | Times Cited: 31
DocOnTap: AI-based disease diagnostic system and recommendation system
Zain ul Abideen, Talha Ali Khan, Raja Hashim Ali, et al.
(2022), pp. 148-153
Closed Access | Times Cited: 29
Zain ul Abideen, Talha Ali Khan, Raja Hashim Ali, et al.
(2022), pp. 148-153
Closed Access | Times Cited: 29
Importance of Synteny in Homology Inference
Ali Zeeshan Ijaz, Raja Hashim Ali, Asima Sarwar, et al.
(2022) Vol. 4, pp. 234-239
Closed Access | Times Cited: 27
Ali Zeeshan Ijaz, Raja Hashim Ali, Asima Sarwar, et al.
(2022) Vol. 4, pp. 234-239
Closed Access | Times Cited: 27
An Attention-Based Convolutional Neural Network for Intrusion Detection Model
Zhen Wang, Fuad A. Ghaleb
IEEE Access (2023) Vol. 11, pp. 43116-43127
Open Access | Times Cited: 14
Zhen Wang, Fuad A. Ghaleb
IEEE Access (2023) Vol. 11, pp. 43116-43127
Open Access | Times Cited: 14
BIM, IoT, and GIS integration in construction resource monitoring
Xiangyang Liu, Maxwell Fordjour Antwi‐Afari, Jue Li, et al.
Automation in Construction (2025) Vol. 174, pp. 106149-106149
Open Access
Xiangyang Liu, Maxwell Fordjour Antwi‐Afari, Jue Li, et al.
Automation in Construction (2025) Vol. 174, pp. 106149-106149
Open Access
The role of machine and deep learning in modern intrusion detection systems: A comprehensive review
Uday Chandra Akuthota, Lava Bhargava
Computers & Electrical Engineering (2025) Vol. 124, pp. 110318-110318
Closed Access
Uday Chandra Akuthota, Lava Bhargava
Computers & Electrical Engineering (2025) Vol. 124, pp. 110318-110318
Closed Access
Scene Parsing Using Fully Convolutional Network for Semantic Segmentation
Nisar Ali, Ali Zeeshan Ijaz, Raja Hashim Ali, et al.
(2023), pp. 180-185
Closed Access | Times Cited: 9
Nisar Ali, Ali Zeeshan Ijaz, Raja Hashim Ali, et al.
(2023), pp. 180-185
Closed Access | Times Cited: 9
An efficient intrusion detection systems in fog computing using forward selection and BiLSTM
Fadi Abu Zwayed, Mohammed Anbar, Selvakumar Manickam, et al.
Bulletin of Electrical Engineering and Informatics (2024) Vol. 13, Iss. 4, pp. 2586-2603
Open Access | Times Cited: 3
Fadi Abu Zwayed, Mohammed Anbar, Selvakumar Manickam, et al.
Bulletin of Electrical Engineering and Informatics (2024) Vol. 13, Iss. 4, pp. 2586-2603
Open Access | Times Cited: 3
American Sign Language Character Recognition using Convolutional Neural Networks
Atesam Abdullah, Nisar Ali, Raja Hashim Ali, et al.
(2023), pp. 165-169
Closed Access | Times Cited: 8
Atesam Abdullah, Nisar Ali, Raja Hashim Ali, et al.
(2023), pp. 165-169
Closed Access | Times Cited: 8
The YOLOv8 Edge: Harnessing Custom Datasets for Superior Real-Time Detection
Tafreed Ahmed, Ahmad Maaz, Danyaal Mahmood, et al.
(2023), pp. 38-43
Closed Access | Times Cited: 7
Tafreed Ahmed, Ahmad Maaz, Danyaal Mahmood, et al.
(2023), pp. 38-43
Closed Access | Times Cited: 7
FAMTDS: A novel MFO-based fully automated malicious traffic detection system for multi-environment networks
Furqan Rustam, Wajdi Aljedaani, Mahmoud Said Elsayed, et al.
Computer Networks (2024) Vol. 251, pp. 110603-110603
Open Access | Times Cited: 2
Furqan Rustam, Wajdi Aljedaani, Mahmoud Said Elsayed, et al.
Computer Networks (2024) Vol. 251, pp. 110603-110603
Open Access | Times Cited: 2
Taxonomy of deep learning-based intrusion detection system approaches in fog computing: a systematic review
Sepide Najafli, Abolfazl Toroghi Haghighat, Babak Karasfi
Knowledge and Information Systems (2024) Vol. 66, Iss. 11, pp. 6527-6560
Closed Access | Times Cited: 2
Sepide Najafli, Abolfazl Toroghi Haghighat, Babak Karasfi
Knowledge and Information Systems (2024) Vol. 66, Iss. 11, pp. 6527-6560
Closed Access | Times Cited: 2
Classification of Parkinson Disease with Feature Selection using Genetic Algorithm
Mahnoor Iftikhar, Nisar Ali, Raja Hashim Ali, et al.
(2023), pp. 522-527
Closed Access | Times Cited: 6
Mahnoor Iftikhar, Nisar Ali, Raja Hashim Ali, et al.
(2023), pp. 522-527
Closed Access | Times Cited: 6
Exploring The Potential of HMMs in Linguistics for Part of Speech (POS) Tagging
Mahnoor Iftikhar, Raja Hashim Ali, Memoona Saleem, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 5
Mahnoor Iftikhar, Raja Hashim Ali, Memoona Saleem, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 5
Deciphering Faces: Enhancing Emotion Detection with Machine Learning Techniques
Muhammad Haseeb Ishaq, Rafay Mustafa, Usama Arshad, et al.
(2023), pp. 310-314
Closed Access | Times Cited: 5
Muhammad Haseeb Ishaq, Rafay Mustafa, Usama Arshad, et al.
(2023), pp. 310-314
Closed Access | Times Cited: 5
Mitigating Crop Losses: AI-enabled Disease Detection in Tomato Plants
Hassan Ashfaq, Usama Arshad, Raja Hashim Ali, et al.
(2023), pp. 190-195
Closed Access | Times Cited: 5
Hassan Ashfaq, Usama Arshad, Raja Hashim Ali, et al.
(2023), pp. 190-195
Closed Access | Times Cited: 5
Detecting Cyberbullying using Machine Learning Approaches
Adnan Haider, Abu Bakar Siddique, Raja Hashim Ali, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 4
Adnan Haider, Abu Bakar Siddique, Raja Hashim Ali, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 4
Stock Price Forecasting using Hidden Markov Models
Attia Shabbir, Raja Hashim Ali, Muhammad Zeeshan Shabbir, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 4
Attia Shabbir, Raja Hashim Ali, Muhammad Zeeshan Shabbir, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 4
Prediction of Polycystic Ovary Syndrome Using Genetic Algorithm-driven Feature Selection
Fatima Faridoon, Raja Hashim Ali, Zain ul Abideen, et al.
(2023)
Closed Access | Times Cited: 4
Fatima Faridoon, Raja Hashim Ali, Zain ul Abideen, et al.
(2023)
Closed Access | Times Cited: 4
Studying the effects of feature selection approaches on machine learning techniques for Mushroom classification problem
Abu Bakar Siddique, Muhammad Abu Bakar, Raja Hashim Ali, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 4
Abu Bakar Siddique, Muhammad Abu Bakar, Raja Hashim Ali, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 4
Revolutionizing Campus Exploration with GikiLenS: A Deep Learning-Powered Object Detection App
Iqra Mueed, Usama Arshad, Raja Hashim Ali
(2023), pp. 315-320
Closed Access | Times Cited: 4
Iqra Mueed, Usama Arshad, Raja Hashim Ali
(2023), pp. 315-320
Closed Access | Times Cited: 4
Innovative Poverty Estimation through Machine Learning Approaches
Ahmad Mashhood, Zain ul Abideen, Usama Arshad, et al.
(2023), pp. 154-158
Closed Access | Times Cited: 4
Ahmad Mashhood, Zain ul Abideen, Usama Arshad, et al.
(2023), pp. 154-158
Closed Access | Times Cited: 4
A comprehensive survey on intrusion detection algorithms
Yang Li, Zhengming Li, Mengyao Li
Computers & Electrical Engineering (2024) Vol. 121, pp. 109863-109863
Closed Access | Times Cited: 1
Yang Li, Zhengming Li, Mengyao Li
Computers & Electrical Engineering (2024) Vol. 121, pp. 109863-109863
Closed Access | Times Cited: 1