OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Functionality-Preserving Adversarial Machine Learning for Robust Classification in Cybersecurity and Intrusion Detection Domains: A Survey
Andrew McCarthy, Essam Ghadafi, Panagiotis Andriotis, et al.
Journal of Cybersecurity and Privacy (2022) Vol. 2, Iss. 1, pp. 154-190
Open Access | Times Cited: 39

Showing 1-25 of 39 citing articles:

Adversarial Machine Learning Attacks against Intrusion Detection Systems: A Survey on Strategies and Defense
Afnan Alotaibi, Murad A. Rassam
Future Internet (2023) Vol. 15, Iss. 2, pp. 62-62
Open Access | Times Cited: 64

Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems
Mayra Macas, Chunming Wu, Walter Fuertes
Expert Systems with Applications (2023) Vol. 238, pp. 122223-122223
Closed Access | Times Cited: 41

A comprehensive survey on cyber deception techniques to improve honeypot performance
Amir Javadpour, Forough Ja’fari, Tarik Taleb, et al.
Computers & Security (2024) Vol. 140, pp. 103792-103792
Open Access | Times Cited: 24

Adv-Bot: Realistic adversarial botnet attacks against network intrusion detection systems
Islam Debicha, Benjamin Cochez, Tayeb Kenaza, et al.
Computers & Security (2023) Vol. 129, pp. 103176-103176
Open Access | Times Cited: 24

Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
Sneha Padhiar, Ritesh Patel
Smart innovation, systems and technologies (2023), pp. 265-270
Closed Access | Times Cited: 22

Harnessing adversarial machine learning for advanced threat detection: AI-driven strategies in cybersecurity risk assessment and fraud prevention
Onuh Matthew Ijiga, Idoko Peter Idoko, Godslove Isenyo Ebiega, et al.
Open Access Research Journal of Science and Technology (2024) Vol. 11, Iss. 1, pp. 001-004
Open Access | Times Cited: 13

Deep reinforcement learning based Evasion Generative Adversarial Network for botnet detection
Rizwan Hamid Randhawa, Nauman Aslam, Mohammad Alauthman, et al.
Future Generation Computer Systems (2023) Vol. 150, pp. 294-302
Open Access | Times Cited: 17

Navigating the Cyber Threat Landscape: A Comprehensive Analysis of Attacks and Security in the Digital Age
Akinul Islam Jony, Sultanul Arifeen Hamim
Journal of Information Technology and Cyber Security (2024) Vol. 1, Iss. 2, pp. 53-67
Open Access | Times Cited: 5

A Comprehensive Review on Cybersecurity Issues and Their Mitigation Measures in FinTech
Guma Ali, Maad M. Mijwil, Bosco Apparatus Buruga, et al.
Iraqi Journal for Computer Science and Mathematics (2024) Vol. 5, Iss. 3
Open Access | Times Cited: 5

OptAML: Optimized adversarial machine learning on water treatment and distribution systems
Mustafa Şinasi Ayas, Enis Kara, Selen Ayas, et al.
International Journal of Critical Infrastructure Protection (2025), pp. 100740-100740
Closed Access

Investigating the Transferability of Evasion Attacks in Network Intrusion Detection Systems Considering Domain-Specific Constraints
Mariama Mbow, Rodrigo Román, Ayan Seal, et al.
Lecture notes in computer science (2025), pp. 44-55
Closed Access

Cross-Domain Adversarial Attacks and Robust Defense Mechanisms for Multimodal Neural Networks
Jay Barach
Communications in computer and information science (2025), pp. 345-362
Closed Access

DDoS attack detection in SDN: Enhancing entropy‐based detection with machine learning
Marcos J. Santos‐Neto, Jacir L. Bordim, Eduardo Alchieri, et al.
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 11
Closed Access | Times Cited: 4

Artificial Intelligence to Improve Antibiotic Prescribing: A Systematic Review
Doaa Amin, Nathaly Garzón‐Orjuela, Agustín García Pereira, et al.
Antibiotics (2023) Vol. 12, Iss. 8, pp. 1293-1293
Open Access | Times Cited: 11

Evasion Attack and Defense on Machine Learning Models in Cyber-Physical Systems: A Survey
Shunyao Wang, Ryan K. L. Ko, Guangdong Bai, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 26, Iss. 2, pp. 930-966
Open Access | Times Cited: 10

i-2NIDS Novel Intelligent Intrusion Detection Approach for a Strong Network Security
Sabrine Ennaji, Nabil El Akkad, Khalid Haddouch
International Journal of Information Security and Privacy (2023) Vol. 17, Iss. 1, pp. 1-17
Open Access | Times Cited: 8

Application Study on the Reinforcement Learning Strategies in the Network Awareness Risk Perception and Prevention
Junwei Xie
International Journal of Computational Intelligence Systems (2024) Vol. 17, Iss. 1
Open Access | Times Cited: 2

Adversarial Machine Learning for Detecting Advanced Threats Inspired by StuxNet in Critical Infrastructure Networks
Hafiz Bilal Ahmad, Haichang Gao, Naila Latif, et al.
(2024), pp. 01-07
Closed Access | Times Cited: 2

Adversarial Robustness of Vision Transformers Versus Convolutional Neural Networks
Kazim Ali, Muhammad Shahid Bhatti, Atif Saeed, et al.
IEEE Access (2024) Vol. 12, pp. 105281-105293
Open Access | Times Cited: 2

Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification
Andrew McCarthy, Essam Ghadafi, Panagiotis Andriotis, et al.
Journal of Information Security and Applications (2022) Vol. 72, pp. 103398-103398
Open Access | Times Cited: 11

A Robust Machine Learning Model for Cyber Incident Classification and Prioritization
Aiswarya Dwarampudi, Manas Kumar Yogi
Journal of Trends in Computer Science and Smart Technology (2024) Vol. 6, Iss. 1, pp. 51-66
Open Access | Times Cited: 1

An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection
João Vitorino, Miguel Silva, Eva Maia, et al.
Lecture notes in computer science (2024), pp. 3-17
Closed Access | Times Cited: 1

GPMT: Generating practical malicious traffic based on adversarial attacks with little prior knowledge
Peishuai Sun, Shuhao Li, Jiang Xie, et al.
Computers & Security (2023) Vol. 130, pp. 103257-103257
Closed Access | Times Cited: 4

Attacks Against Machine Learning Systems: Analysis and GAN-based Approach to Protection
Igor Kotenko, Igor Saenko, Oleg Lauta, et al.
Lecture notes in networks and systems (2023), pp. 49-59
Closed Access | Times Cited: 4

A Multi-Agent Intrusion Detection System Optimized by a Deep Reinforcement Learning Approach with a Dataset Enlarged Using a Generative Model to Reduce the Bias Effect
Matthieu Mouyart, Guilherme Medeiros Machado, Jae‐Yun Jun
Journal of Sensor and Actuator Networks (2023) Vol. 12, Iss. 5, pp. 68-68
Open Access | Times Cited: 4

Page 1 - Next Page

Scroll to top