
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Using Deep Learning Networks to Identify Cyber Attacks on Intrusion Detection for In-Vehicle Networks
Hsiao-Chung Lin, Ping Wang, Kuo‐Ming Chao, et al.
Electronics (2022) Vol. 11, Iss. 14, pp. 2180-2180
Open Access | Times Cited: 27
Hsiao-Chung Lin, Ping Wang, Kuo‐Ming Chao, et al.
Electronics (2022) Vol. 11, Iss. 14, pp. 2180-2180
Open Access | Times Cited: 27
Showing 1-25 of 27 citing articles:
AI-Based Intrusion Detection Systems for In-Vehicle Networks: A Survey
Sampath Rajapaksha, Harsha Kalutarage, M. Omar Al-Kadri, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 11, pp. 1-40
Open Access | Times Cited: 82
Sampath Rajapaksha, Harsha Kalutarage, M. Omar Al-Kadri, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 11, pp. 1-40
Open Access | Times Cited: 82
Intrusion Detection in the Automotive Domain: A Comprehensive Review
Brooke Lampe, Weizhi Meng
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 4, pp. 2356-2426
Open Access | Times Cited: 25
Brooke Lampe, Weizhi Meng
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 4, pp. 2356-2426
Open Access | Times Cited: 25
A comprehensive guide to CAN IDS data and introduction of the ROAD dataset
Miki E. Verma, Robert A. Bridges, Michael D. Iannacone, et al.
PLoS ONE (2024) Vol. 19, Iss. 1, pp. e0296879-e0296879
Open Access | Times Cited: 10
Miki E. Verma, Robert A. Bridges, Michael D. Iannacone, et al.
PLoS ONE (2024) Vol. 19, Iss. 1, pp. e0296879-e0296879
Open Access | Times Cited: 10
Electric vehicle based smart cloud model cyber security analysis using fuzzy machine learning with blockchain technique
Pengfei Yang
Computers & Electrical Engineering (2024) Vol. 115, pp. 109111-109111
Closed Access | Times Cited: 9
Pengfei Yang
Computers & Electrical Engineering (2024) Vol. 115, pp. 109111-109111
Closed Access | Times Cited: 9
Green Energy Management in Manufacturing Based on Demand Prediction by Artificial Intelligence—A Review
Izabela Rojek, Dariusz Mikołajewski, Adam Mroziński, et al.
Electronics (2024) Vol. 13, Iss. 16, pp. 3338-3338
Open Access | Times Cited: 6
Izabela Rojek, Dariusz Mikołajewski, Adam Mroziński, et al.
Electronics (2024) Vol. 13, Iss. 16, pp. 3338-3338
Open Access | Times Cited: 6
A Novel Detection Approach of Unknown Cyber-Attacks for Intra-Vehicle Networks Using Recurrence Plots and Neural Networks
Omar Y. Al-Jarrah, Karim El Haloui, Mehrdad Dianati, et al.
IEEE Open Journal of Vehicular Technology (2023) Vol. 4, pp. 271-280
Open Access | Times Cited: 13
Omar Y. Al-Jarrah, Karim El Haloui, Mehrdad Dianati, et al.
IEEE Open Journal of Vehicular Technology (2023) Vol. 4, pp. 271-280
Open Access | Times Cited: 13
Artificial intelligence (AI) advancements for transportation security: in-depth insights into electric and aerial vehicle systems
Gulshan Kumar, Ali Altalbe
Environment Development and Sustainability (2024)
Closed Access | Times Cited: 5
Gulshan Kumar, Ali Altalbe
Environment Development and Sustainability (2024)
Closed Access | Times Cited: 5
Supervised Machine Learning for Real-Time Intrusion Attack Detection in Connected and Autonomous Vehicles: A Security Paradigm Shift
Ahmad Aloqaily, Emad E. Abdallah, Hiba AbuZaid, et al.
Informatics (2025) Vol. 12, Iss. 1, pp. 4-4
Open Access
Ahmad Aloqaily, Emad E. Abdallah, Hiba AbuZaid, et al.
Informatics (2025) Vol. 12, Iss. 1, pp. 4-4
Open Access
Identifying Intrusion Attempts on Connected and Autonomous Vehicles: A Survey
Emad E. Abdallah, Ahmad Aloqaily, Hiba Fayez
Procedia Computer Science (2023) Vol. 220, pp. 307-314
Open Access | Times Cited: 9
Emad E. Abdallah, Ahmad Aloqaily, Hiba Fayez
Procedia Computer Science (2023) Vol. 220, pp. 307-314
Open Access | Times Cited: 9
An Anomaly Detection Method Based on Multiple LSTM-Autoencoder Models for In-Vehicle Network
Taeguen Kim, Jiyoon Kim, Ilsun You
Electronics (2023) Vol. 12, Iss. 17, pp. 3543-3543
Open Access | Times Cited: 7
Taeguen Kim, Jiyoon Kim, Ilsun You
Electronics (2023) Vol. 12, Iss. 17, pp. 3543-3543
Open Access | Times Cited: 7
ROAST-IoT: A Novel Range-Optimized Attention Convolutional Scattered Technique for Intrusion Detection in IoT Networks
Anandaraj Mahalingam, Ganeshkumar Perumal, S. Gopalakrishnan, et al.
Sensors (2023) Vol. 23, Iss. 19, pp. 8044-8044
Open Access | Times Cited: 7
Anandaraj Mahalingam, Ganeshkumar Perumal, S. Gopalakrishnan, et al.
Sensors (2023) Vol. 23, Iss. 19, pp. 8044-8044
Open Access | Times Cited: 7
Transforming In-Vehicle Network Intrusion Detection: VAE-based Knowledge Distillation Meets Explainable AI
Muhammet Anil Yagiz, Pedram MohajerAnsari, Mert D. Pesé, et al.
(2024), pp. 93-103
Open Access | Times Cited: 2
Muhammet Anil Yagiz, Pedram MohajerAnsari, Mert D. Pesé, et al.
(2024), pp. 93-103
Open Access | Times Cited: 2
Multiple Mechanisms to Strengthen the Ability of YOLOv5s for Real-Time Identification of Vehicle Type
Qiang Luo, Junfan Wang, Mingyu Gao, et al.
Electronics (2022) Vol. 11, Iss. 16, pp. 2586-2586
Open Access | Times Cited: 10
Qiang Luo, Junfan Wang, Mingyu Gao, et al.
Electronics (2022) Vol. 11, Iss. 16, pp. 2586-2586
Open Access | Times Cited: 10
Deep Transfer Learning Techniques in Intrusion Detection System-Internet of Vehicles: A State-of-the-Art Review
Wufei Wu, Javad Hassannataj Joloudari, Senthil Kumar Jagatheesaperumal, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 80, Iss. 2, pp. 2785-2813
Open Access | Times Cited: 1
Wufei Wu, Javad Hassannataj Joloudari, Senthil Kumar Jagatheesaperumal, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 80, Iss. 2, pp. 2785-2813
Open Access | Times Cited: 1
Intrusion Detection System for Vehicular Networks Based on MobileNetV3
Shaoqiang Wang, Y. Wang, Baosen Zheng, et al.
IEEE Access (2024) Vol. 12, pp. 106285-106302
Open Access | Times Cited: 1
Shaoqiang Wang, Y. Wang, Baosen Zheng, et al.
IEEE Access (2024) Vol. 12, pp. 106285-106302
Open Access | Times Cited: 1
Red fox optimizer based feature selection with optimal deep learning based Intrusion detection for network security
Swapna Sunkara, Tamilarasi Suresh, V Sathiyasuntharam
International Journal of Information Technology (2023) Vol. 15, Iss. 8, pp. 4437-4447
Closed Access | Times Cited: 3
Swapna Sunkara, Tamilarasi Suresh, V Sathiyasuntharam
International Journal of Information Technology (2023) Vol. 15, Iss. 8, pp. 4437-4447
Closed Access | Times Cited: 3
In-vehicle network intrusion detection systems: a systematic survey of deep learning-based approaches
Feng Luo, Jiajia Wang, Xuan Zhang, et al.
PeerJ Computer Science (2023) Vol. 9, pp. e1648-e1648
Open Access | Times Cited: 3
Feng Luo, Jiajia Wang, Xuan Zhang, et al.
PeerJ Computer Science (2023) Vol. 9, pp. e1648-e1648
Open Access | Times Cited: 3
Enhancing Intrusion Detection and Explanations for Imbalanced Vehicle CAN Network Data
Thi-Thu-Huong Le, Naufal Suryanto, Howon Kim, et al.
(2023), pp. 777-784
Closed Access | Times Cited: 3
Thi-Thu-Huong Le, Naufal Suryanto, Howon Kim, et al.
(2023), pp. 777-784
Closed Access | Times Cited: 3
Predicting and diagnosis of COVID-19 based on IoT and machine learning algorithm
Fatih Ertam, Ilhan Firat Kilinçer
Advances in computers (2024)
Closed Access
Fatih Ertam, Ilhan Firat Kilinçer
Advances in computers (2024)
Closed Access
In-Vehicle Communication Cyber Security: A Comprehensive Review of Challenges and Solutions
Batuhan Gül, Fatih Ertam
Vehicular Communications (2024), pp. 100846-100846
Closed Access
Batuhan Gül, Fatih Ertam
Vehicular Communications (2024), pp. 100846-100846
Closed Access
A Machine Learning Model to Predict Cyberattacks in Connected and Autonomous Vehicles
Manoj K. Jha, Rishav Jaiswal
Journal of Computational and Cognitive Engineering (2024) Vol. 3, Iss. 3, pp. 307-315
Open Access
Manoj K. Jha, Rishav Jaiswal
Journal of Computational and Cognitive Engineering (2024) Vol. 3, Iss. 3, pp. 307-315
Open Access
Network Traffic Anomaly Detection in CAN Bus Based on Ensemble Learning
Yu‐Xi Wu, Xiaodong Tao
(2024), pp. 240-245
Closed Access
Yu‐Xi Wu, Xiaodong Tao
(2024), pp. 240-245
Closed Access
Subject Review: Detecting Cyber Security Attacks
Haitham Salman Chyad, Raniah Ali Mustafa
International Journal of Advances in Scientific Research and Engineering (2023) Vol. 09, Iss. 08, pp. 44-52
Open Access | Times Cited: 1
Haitham Salman Chyad, Raniah Ali Mustafa
International Journal of Advances in Scientific Research and Engineering (2023) Vol. 09, Iss. 08, pp. 44-52
Open Access | Times Cited: 1
Analyze textual data: deep neural network for adversarial inversion attack in wireless networks
Mohammed A. Al Ghamdi
SN Applied Sciences (2023) Vol. 5, Iss. 12
Open Access | Times Cited: 1
Mohammed A. Al Ghamdi
SN Applied Sciences (2023) Vol. 5, Iss. 12
Open Access | Times Cited: 1
Deep Neural Networks Scheme-Based Intelligent IDS System for Securing Internet of Vehicles
Ch. Ravi Kishore, Divya Rao, H. S. Behera
Lecture notes in networks and systems (2023), pp. 555-566
Closed Access
Ch. Ravi Kishore, Divya Rao, H. S. Behera
Lecture notes in networks and systems (2023), pp. 555-566
Closed Access