
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Novel hybrid firefly algorithm: an application to enhance XGBoost tuning for intrusion detection classification
Miodrag Živković, Milan Tair, K. Venkatachalam, et al.
PeerJ Computer Science (2022) Vol. 8, pp. e956-e956
Open Access | Times Cited: 78
Miodrag Živković, Milan Tair, K. Venkatachalam, et al.
PeerJ Computer Science (2022) Vol. 8, pp. e956-e956
Open Access | Times Cited: 78
Showing 1-25 of 78 citing articles:
Hybrid CNN and XGBoost Model Tuned by Modified Arithmetic Optimization Algorithm for COVID-19 Early Diagnostics from X-ray Images
Miodrag Živković, Nebojša Bačanin, Miloš Antonijević, et al.
Electronics (2022) Vol. 11, Iss. 22, pp. 3798-3798
Open Access | Times Cited: 106
Miodrag Živković, Nebojša Bačanin, Miloš Antonijević, et al.
Electronics (2022) Vol. 11, Iss. 22, pp. 3798-3798
Open Access | Times Cited: 106
Multi-Step Crude Oil Price Prediction Based on LSTM Approach Tuned by Salp Swarm Algorithm with Disputation Operator
Luka Jovanovic, Dejan Jovanović, Nebojša Bačanin, et al.
Sustainability (2022) Vol. 14, Iss. 21, pp. 14616-14616
Open Access | Times Cited: 93
Luka Jovanovic, Dejan Jovanović, Nebojša Bačanin, et al.
Sustainability (2022) Vol. 14, Iss. 21, pp. 14616-14616
Open Access | Times Cited: 93
Multivariate energy forecasting via metaheuristic tuned long-short term memory and gated recurrent unit neural networks
Nebojša Bačanin, Luka Jovanovic, Miodrag Živković, et al.
Information Sciences (2023) Vol. 642, pp. 119122-119122
Open Access | Times Cited: 83
Nebojša Bačanin, Luka Jovanovic, Miodrag Živković, et al.
Information Sciences (2023) Vol. 642, pp. 119122-119122
Open Access | Times Cited: 83
The Explainable Potential of Coupling Metaheuristics-Optimized-XGBoost and SHAP in Revealing VOCs’ Environmental Fate
Luka Jovanovic, Gordana Jovanović, Mirjana Perišić, et al.
Atmosphere (2023) Vol. 14, Iss. 1, pp. 109-109
Open Access | Times Cited: 55
Luka Jovanovic, Gordana Jovanović, Mirjana Perišić, et al.
Atmosphere (2023) Vol. 14, Iss. 1, pp. 109-109
Open Access | Times Cited: 55
Decomposition aided attention-based recurrent neural networks for multistep ahead time-series forecasting of renewable power generation
Robertas Damaševičius, Luka Jovanovic, Aleksandar Petrović, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e1795-e1795
Open Access | Times Cited: 23
Robertas Damaševičius, Luka Jovanovic, Aleksandar Petrović, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e1795-e1795
Open Access | Times Cited: 23
An optimized LSTM-based deep learning model for anomaly network intrusion detection
Nitu Dash, Sujata Chakravarty, Amiya Kumar Rath, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access | Times Cited: 1
Nitu Dash, Sujata Chakravarty, Amiya Kumar Rath, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access | Times Cited: 1
An improved U-net and attention mechanism-based model for sugar beet and weed segmentation
Yadong Li, Ruinan Guo, Rujia Li, et al.
Frontiers in Plant Science (2025) Vol. 15
Open Access | Times Cited: 1
Yadong Li, Ruinan Guo, Rujia Li, et al.
Frontiers in Plant Science (2025) Vol. 15
Open Access | Times Cited: 1
An adaptive quadratic interpolation and rounding mechanism sine cosine algorithm with application to constrained engineering optimization problems
Xiao Yang, Rui Wang, Dong Zhao, et al.
Expert Systems with Applications (2022) Vol. 213, pp. 119041-119041
Closed Access | Times Cited: 63
Xiao Yang, Rui Wang, Dong Zhao, et al.
Expert Systems with Applications (2022) Vol. 213, pp. 119041-119041
Closed Access | Times Cited: 63
The AdaBoost Approach Tuned by Firefly Metaheuristics for Fraud Detection
Aleksandar Petrović, Nebojša Bačanin, Miodrag Živković, et al.
2022 IEEE World Conference on Applied Intelligence and Computing (AIC) (2022), pp. 834-839
Closed Access | Times Cited: 39
Aleksandar Petrović, Nebojša Bačanin, Miodrag Živković, et al.
2022 IEEE World Conference on Applied Intelligence and Computing (AIC) (2022), pp. 834-839
Closed Access | Times Cited: 39
Addressing Internet of Things security by enhanced sine cosine metaheuristics tuned hybrid machine learning model and results interpretation based on SHAP approach
Miloš Dobrojević, Miodrag Živković, Amit Chhabra, et al.
PeerJ Computer Science (2023) Vol. 9, pp. e1405-e1405
Open Access | Times Cited: 37
Miloš Dobrojević, Miodrag Živković, Amit Chhabra, et al.
PeerJ Computer Science (2023) Vol. 9, pp. e1405-e1405
Open Access | Times Cited: 37
Machine learning tuning by diversity oriented firefly metaheuristics for Industry 4.0
Luka Jovanovic, Nebojša Bačanin, Miodrag Živković, et al.
Expert Systems (2023) Vol. 41, Iss. 2
Closed Access | Times Cited: 25
Luka Jovanovic, Nebojša Bačanin, Miodrag Živković, et al.
Expert Systems (2023) Vol. 41, Iss. 2
Closed Access | Times Cited: 25
Improving audit opinion prediction accuracy using metaheuristics-tuned XGBoost algorithm with interpretable results through SHAP value analysis
M. Todorovic, Nemanja Stanišić, Miodrag Živković, et al.
Applied Soft Computing (2023) Vol. 149, pp. 110955-110955
Closed Access | Times Cited: 24
M. Todorovic, Nemanja Stanišić, Miodrag Živković, et al.
Applied Soft Computing (2023) Vol. 149, pp. 110955-110955
Closed Access | Times Cited: 24
Deep learning techniques for securing cyber-physical systems in supply chain 4.0
Shougi Suliman Abosuliman
Computers & Electrical Engineering (2023) Vol. 107, pp. 108637-108637
Closed Access | Times Cited: 23
Shougi Suliman Abosuliman
Computers & Electrical Engineering (2023) Vol. 107, pp. 108637-108637
Closed Access | Times Cited: 23
Addressing feature selection and extreme learning machine tuning by diversity-oriented social network search: an application for phishing websites detection
Nebojša Bačanin, Miodrag Živković, Miloš Antonijević, et al.
Complex & Intelligent Systems (2023) Vol. 9, Iss. 6, pp. 7269-7304
Open Access | Times Cited: 23
Nebojša Bačanin, Miodrag Živković, Miloš Antonijević, et al.
Complex & Intelligent Systems (2023) Vol. 9, Iss. 6, pp. 7269-7304
Open Access | Times Cited: 23
Tuning XGBoost by Planet Optimization Algorithm: An Application for Diabetes Classification
Luka Jovanovic, Marko Djuric, Miodrag Živković, et al.
Lecture notes in electrical engineering (2023), pp. 787-803
Closed Access | Times Cited: 21
Luka Jovanovic, Marko Djuric, Miodrag Živković, et al.
Lecture notes in electrical engineering (2023), pp. 787-803
Closed Access | Times Cited: 21
A multilayer stacking method base on RFE-SHAP feature selection strategy for recognition of driver’s mental load and emotional state
Jing Huang, Peng Yang, Lin Hu
Expert Systems with Applications (2023) Vol. 238, pp. 121729-121729
Closed Access | Times Cited: 21
Jing Huang, Peng Yang, Lin Hu
Expert Systems with Applications (2023) Vol. 238, pp. 121729-121729
Closed Access | Times Cited: 21
Cloud computing load prediction by decomposition reinforced attention long short-term memory network optimized by modified particle swarm optimization algorithm
Nebojša Bačanin, Vladimir Šimić, Miodrag Živković, et al.
Annals of Operations Research (2023)
Closed Access | Times Cited: 21
Nebojša Bačanin, Vladimir Šimić, Miodrag Živković, et al.
Annals of Operations Research (2023)
Closed Access | Times Cited: 21
Improving performance of extreme learning machine for classification challenges by modified firefly algorithm and validation on medical benchmark datasets
Nebojša Bačanin, Cătălin Stoean, Dušan Marković, et al.
Multimedia Tools and Applications (2024) Vol. 83, Iss. 31, pp. 76035-76075
Closed Access | Times Cited: 8
Nebojša Bačanin, Cătălin Stoean, Dušan Marković, et al.
Multimedia Tools and Applications (2024) Vol. 83, Iss. 31, pp. 76035-76075
Closed Access | Times Cited: 8
An improved long short term memory network for intrusion detection
Asmaa Ahmed Awad, Ahmed F. Ali, Tarek Gaber
PLoS ONE (2023) Vol. 18, Iss. 8, pp. e0284795-e0284795
Open Access | Times Cited: 15
Asmaa Ahmed Awad, Ahmed F. Ali, Tarek Gaber
PLoS ONE (2023) Vol. 18, Iss. 8, pp. e0284795-e0284795
Open Access | Times Cited: 15
Intrusion detection using metaheuristic optimization within IoT/IIoT systems and software of autonomous vehicles
Pavle Dakić, Miodrag Živković, Luka Jovanovic, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 6
Pavle Dakić, Miodrag Živković, Luka Jovanovic, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 6
Encrypted Network Traffic Classification Using Intelligent Techniques
Shital Mali, Mansi Gujral, Aswani Kumar Cherukuri
Cureus Journal of Computer Science. (2025)
Closed Access
Shital Mali, Mansi Gujral, Aswani Kumar Cherukuri
Cureus Journal of Computer Science. (2025)
Closed Access
Hybrid voting-GA ensemble learning for multi-class fault detection in digital twin-driven IIoT systems
Ezz El‐Din Hemdan, Samar M. Zayed, Gamal Attiya, et al.
Computing (2025) Vol. 107, Iss. 2
Closed Access
Ezz El‐Din Hemdan, Samar M. Zayed, Gamal Attiya, et al.
Computing (2025) Vol. 107, Iss. 2
Closed Access
A quantum-optimized approach for breast cancer detection using SqueezeNet-SVM
Anas Bilal, Ali Alkhathlan, Faris Kateb, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Anas Bilal, Ali Alkhathlan, Faris Kateb, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Optimizing XGBoost hyperparameters using the dragonfly algorithm for enhanced cyber attack detection in the internet of healthcare things (IoHT)
SURBHI SURBHI, Nupa Ram Chauhan, Neeraj Dahiya
Cluster Computing (2025) Vol. 28, Iss. 4
Closed Access
SURBHI SURBHI, Nupa Ram Chauhan, Neeraj Dahiya
Cluster Computing (2025) Vol. 28, Iss. 4
Closed Access
An enhanced method for intrusion detection systems in IoT environment
Qusay M. Alzubi, Yousef Sanjalawe, Sharif Naser Makhadmeh, et al.
Cluster Computing (2025) Vol. 28, Iss. 4
Closed Access
Qusay M. Alzubi, Yousef Sanjalawe, Sharif Naser Makhadmeh, et al.
Cluster Computing (2025) Vol. 28, Iss. 4
Closed Access