
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Hyperparameter Optimization for 1D-CNN-Based Network Intrusion Detection Using GA and PSO
Dusmurod Kilichev, Wooseong Kim
Mathematics (2023) Vol. 11, Iss. 17, pp. 3724-3724
Open Access | Times Cited: 30
Dusmurod Kilichev, Wooseong Kim
Mathematics (2023) Vol. 11, Iss. 17, pp. 3724-3724
Open Access | Times Cited: 30
Showing 1-25 of 30 citing articles:
A systematic review of hyperparameter optimization techniques in Convolutional Neural Networks
Mohaimenul Azam Khan Raiaan, Sadman Sakib, Nur Mohammad Fahad, et al.
Decision Analytics Journal (2024) Vol. 11, pp. 100470-100470
Open Access | Times Cited: 30
Mohaimenul Azam Khan Raiaan, Sadman Sakib, Nur Mohammad Fahad, et al.
Decision Analytics Journal (2024) Vol. 11, pp. 100470-100470
Open Access | Times Cited: 30
Next–Generation Intrusion Detection for IoT EVCS: Integrating CNN, LSTM, and GRU Models
Dusmurod Kilichev, Dilmurod Turimov, Wooseong Kim
Mathematics (2024) Vol. 12, Iss. 4, pp. 571-571
Open Access | Times Cited: 13
Dusmurod Kilichev, Dilmurod Turimov, Wooseong Kim
Mathematics (2024) Vol. 12, Iss. 4, pp. 571-571
Open Access | Times Cited: 13
Intrusion detection systems for IoT based on bio-inspired and machine learning techniques: a systematic review of the literature
Rafika Saadouni, Chirihane Gherbi, Zibouda Aliouat, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 8655-8681
Closed Access | Times Cited: 7
Rafika Saadouni, Chirihane Gherbi, Zibouda Aliouat, et al.
Cluster Computing (2024) Vol. 27, Iss. 7, pp. 8655-8681
Closed Access | Times Cited: 7
A Novel Approach for Real-Time Server-Based Attack Detection Using Meta-Learning
Furqan Rustam, Ali Raza, Muhammad Qasim, et al.
IEEE Access (2024) Vol. 12, pp. 39614-39627
Open Access | Times Cited: 6
Furqan Rustam, Ali Raza, Muhammad Qasim, et al.
IEEE Access (2024) Vol. 12, pp. 39614-39627
Open Access | Times Cited: 6
Enhancing Network Intrusion Detection Through the Application of the Dung Beetle Optimized Fusion Model
Yue Li, Jiale Zhang, Yiting Yan, et al.
IEEE Access (2024) Vol. 12, pp. 9483-9496
Open Access | Times Cited: 5
Yue Li, Jiale Zhang, Yiting Yan, et al.
IEEE Access (2024) Vol. 12, pp. 9483-9496
Open Access | Times Cited: 5
QoS-Aware cloud security using lightweight EfficientNet with Adaptive Sparse Bayesian Optimization
J Vinothini, Srie Vidhya Janani E
Peer-to-Peer Networking and Applications (2025) Vol. 18, Iss. 2
Closed Access
J Vinothini, Srie Vidhya Janani E
Peer-to-Peer Networking and Applications (2025) Vol. 18, Iss. 2
Closed Access
Advanced Temporal Deep Learning Framework for Enhanced Predictive Modeling in Industrial Treatment Systems
S Ramya, S Srinath, Pushpa Tuppad
Results in Engineering (2025), pp. 104158-104158
Open Access
S Ramya, S Srinath, Pushpa Tuppad
Results in Engineering (2025), pp. 104158-104158
Open Access
A Lidar wind speed measurement system based on SSA-1DCNN algorithm
Anni Ying, Bing Yin, Chonggao Hu, et al.
Journal of Modern Optics (2025), pp. 1-11
Closed Access
Anni Ying, Bing Yin, Chonggao Hu, et al.
Journal of Modern Optics (2025), pp. 1-11
Closed Access
Evolutionary LightGBM‐Based Intrusion Detection System for IoT Networks
Khushi Singal, Nisha Kandhoul, Sanjay K. Dhurander
International Journal of Communication Systems (2025) Vol. 38, Iss. 5
Closed Access
Khushi Singal, Nisha Kandhoul, Sanjay K. Dhurander
International Journal of Communication Systems (2025) Vol. 38, Iss. 5
Closed Access
Online Machine Learning for Intrusion Detection in Electric Vehicle Charging Systems
Fazliddin Makhmudov, Dusmurod Kilichev, Ulugbek Giyosov, et al.
Mathematics (2025) Vol. 13, Iss. 5, pp. 712-712
Open Access
Fazliddin Makhmudov, Dusmurod Kilichev, Ulugbek Giyosov, et al.
Mathematics (2025) Vol. 13, Iss. 5, pp. 712-712
Open Access
NSGTO‐LSTM: Niche‐strategy‐based gorilla troops optimization and long short‐term memory network intrusion detection model
Saritha Anchuri, Arvind Ganesh, Prathusha Perugu
ETRI Journal (2025)
Open Access
Saritha Anchuri, Arvind Ganesh, Prathusha Perugu
ETRI Journal (2025)
Open Access
Assessing landscape ecological vulnerability to riverbank erosion in the Middle Brahmaputra floodplains of Assam, India using machine learning algorithms
Nirsobha Bhuyan, Haroon Sajjad, Tamal Kanti Saha, et al.
CATENA (2023) Vol. 234, pp. 107581-107581
Open Access | Times Cited: 13
Nirsobha Bhuyan, Haroon Sajjad, Tamal Kanti Saha, et al.
CATENA (2023) Vol. 234, pp. 107581-107581
Open Access | Times Cited: 13
Advancing Network Security with AI: SVM-Based Deep Learning for Intrusion Detection
Khadija M. Abuali, Liyth Nissirat, Aida Al‐Samawi
Sensors (2023) Vol. 23, Iss. 21, pp. 8959-8959
Open Access | Times Cited: 13
Khadija M. Abuali, Liyth Nissirat, Aida Al‐Samawi
Sensors (2023) Vol. 23, Iss. 21, pp. 8959-8959
Open Access | Times Cited: 13
Optimizing Smart Home Intrusion Detection With Harmony-Enhanced Extra Trees
Akmalbek Abdusalomov, Dusmurod Kilichev, Rashid Nasimov, et al.
IEEE Access (2024) Vol. 12, pp. 117761-117786
Open Access | Times Cited: 4
Akmalbek Abdusalomov, Dusmurod Kilichev, Rashid Nasimov, et al.
IEEE Access (2024) Vol. 12, pp. 117761-117786
Open Access | Times Cited: 4
SoK: quantum computing methods for machine learning optimization
Hamza Baniata
Quantum Machine Intelligence (2024) Vol. 6, Iss. 2
Closed Access | Times Cited: 4
Hamza Baniata
Quantum Machine Intelligence (2024) Vol. 6, Iss. 2
Closed Access | Times Cited: 4
Research on Dung Beetle Optimization Based Stacked Sparse Autoencoder for Network Situation Element Extraction
Yongchao Yang, Pan Zhao
IEEE Access (2024) Vol. 12, pp. 24014-24026
Open Access | Times Cited: 3
Yongchao Yang, Pan Zhao
IEEE Access (2024) Vol. 12, pp. 24014-24026
Open Access | Times Cited: 3
Enhancing Vibration-based Damage Assessment with 1D-CNN: Parametric Studies and Field Applications
Soyeon Park, Sun-Joong Kim
KSCE Journal of Civil Engineering (2024) Vol. 28, Iss. 7, pp. 2934-2951
Closed Access | Times Cited: 3
Soyeon Park, Sun-Joong Kim
KSCE Journal of Civil Engineering (2024) Vol. 28, Iss. 7, pp. 2934-2951
Closed Access | Times Cited: 3
Detection of DDoS attacks in SDN with Siberian Tiger Optimization algorithm and deep learning
Naseer Hameed Saadoon Al-Sarray, Javad Rahebi, Ayşe Demi̇rhan
Research Square (Research Square) (2024)
Open Access | Times Cited: 3
Naseer Hameed Saadoon Al-Sarray, Javad Rahebi, Ayşe Demi̇rhan
Research Square (Research Square) (2024)
Open Access | Times Cited: 3
Deep-Learning-Based Approach for IoT Attack and Malware Detection
Burak Taşçı
Applied Sciences (2024) Vol. 14, Iss. 18, pp. 8505-8505
Open Access | Times Cited: 3
Burak Taşçı
Applied Sciences (2024) Vol. 14, Iss. 18, pp. 8505-8505
Open Access | Times Cited: 3
An Intrusion Detection Method Based on Hybrid Machine Learning and Neural Network in the Industrial Control Field
Duo Sun, Lei Zhang, Kai Jin, et al.
Applied Sciences (2023) Vol. 13, Iss. 18, pp. 10455-10455
Open Access | Times Cited: 5
Duo Sun, Lei Zhang, Kai Jin, et al.
Applied Sciences (2023) Vol. 13, Iss. 18, pp. 10455-10455
Open Access | Times Cited: 5
Optimizing Smart Home Intrusion Detection with Harmony-Enhanced Extra Trees
Akmalbek Abdusalomov, Dusmurod Kilichev, Rashid Nasimov, et al.
(2024)
Closed Access | Times Cited: 1
Akmalbek Abdusalomov, Dusmurod Kilichev, Rashid Nasimov, et al.
(2024)
Closed Access | Times Cited: 1
Optimizing Inventory and Pricing for Substitute Products with Soft Supply Constraints
Armando Meza, Paolo Latorre, Milena Bonacic, et al.
Mathematics (2024) Vol. 12, Iss. 11, pp. 1751-1751
Open Access | Times Cited: 1
Armando Meza, Paolo Latorre, Milena Bonacic, et al.
Mathematics (2024) Vol. 12, Iss. 11, pp. 1751-1751
Open Access | Times Cited: 1
An AI-Driven Based Cybersecurity System for Network Intrusion Detection System in Hybrid with EPO and CNNet-LAM
D. Anu Disney, R. Yugha, S.Bangaru Karachi, et al.
(2024), pp. 1397-1404
Closed Access | Times Cited: 1
D. Anu Disney, R. Yugha, S.Bangaru Karachi, et al.
(2024), pp. 1397-1404
Closed Access | Times Cited: 1
Network Intrusion Detection with Feature Elimination and Selection Using Deep Learning
Aryam Mann, Vamsi Kiran Mekathoti, B. Nithya, et al.
(2024) Vol. 4, pp. 1-6
Closed Access | Times Cited: 1
Aryam Mann, Vamsi Kiran Mekathoti, B. Nithya, et al.
(2024) Vol. 4, pp. 1-6
Closed Access | Times Cited: 1
Exploring the ALNS method for improved cybersecurity: A deep learning approach for attack detection in IoT and IIoT environments
Sarra Cherfi, Ammar Boulaiche, Ali Lemouari
Internet of Things (2024) Vol. 28, pp. 101421-101421
Closed Access | Times Cited: 1
Sarra Cherfi, Ammar Boulaiche, Ali Lemouari
Internet of Things (2024) Vol. 28, pp. 101421-101421
Closed Access | Times Cited: 1