
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Intrusion detection using deep sparse auto-encoder and self-taught learning
Aqsa Saeed Qureshi, Asifullah Khan, Nauman Shamim, et al.
Neural Computing and Applications (2019) Vol. 32, Iss. 8, pp. 3135-3147
Closed Access | Times Cited: 72
Aqsa Saeed Qureshi, Asifullah Khan, Nauman Shamim, et al.
Neural Computing and Applications (2019) Vol. 32, Iss. 8, pp. 3135-3147
Closed Access | Times Cited: 72
Showing 1-25 of 72 citing articles:
Internet of Things Applications, Security Challenges, Attacks, Intrusion Detection, and Future Visions: A Systematic Review
N. C. Mishra, Sharnil Pandya
IEEE Access (2021) Vol. 9, pp. 59353-59377
Open Access | Times Cited: 240
N. C. Mishra, Sharnil Pandya
IEEE Access (2021) Vol. 9, pp. 59353-59377
Open Access | Times Cited: 240
Deep Learning-Based Intrusion Detection Systems: A Systematic Review
Jan Lánský, Saqib Ali, Mokhtar Mohammadi, et al.
IEEE Access (2021) Vol. 9, pp. 101574-101599
Open Access | Times Cited: 166
Jan Lánský, Saqib Ali, Mokhtar Mohammadi, et al.
IEEE Access (2021) Vol. 9, pp. 101574-101599
Open Access | Times Cited: 166
Unsupervised deep learning approach for network intrusion detection combining convolutional autoencoder and one-class SVM
Adel Binbusayyis, Thavavel Vaiyapuri
Applied Intelligence (2021) Vol. 51, Iss. 10, pp. 7094-7108
Closed Access | Times Cited: 127
Adel Binbusayyis, Thavavel Vaiyapuri
Applied Intelligence (2021) Vol. 51, Iss. 10, pp. 7094-7108
Closed Access | Times Cited: 127
A two-stage intrusion detection system with auto-encoder and LSTMs
Earum Mushtaq, Aneela Zameer, Muhammad Umer, et al.
Applied Soft Computing (2022) Vol. 121, pp. 108768-108768
Closed Access | Times Cited: 82
Earum Mushtaq, Aneela Zameer, Muhammad Umer, et al.
Applied Soft Computing (2022) Vol. 121, pp. 108768-108768
Closed Access | Times Cited: 82
A novel multi-module integrated intrusion detection system for high-dimensional imbalanced data
Jiyuan Cui, Liansong Zong, Jianhua Xie, et al.
Applied Intelligence (2022) Vol. 53, Iss. 1, pp. 272-288
Open Access | Times Cited: 82
Jiyuan Cui, Liansong Zong, Jianhua Xie, et al.
Applied Intelligence (2022) Vol. 53, Iss. 1, pp. 272-288
Open Access | Times Cited: 82
Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats
Zhiyan Chen, Jinxin Liu, Yu Shen, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 5, pp. 1-37
Open Access | Times Cited: 75
Zhiyan Chen, Jinxin Liu, Yu Shen, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 5, pp. 1-37
Open Access | Times Cited: 75
Zero-day attack detection: a systematic literature review
Rasheed Ahmad, Izzat Alsmadi, Wasim A. Al-Hamdani, et al.
Artificial Intelligence Review (2023) Vol. 56, Iss. 10, pp. 10733-10811
Closed Access | Times Cited: 61
Rasheed Ahmad, Izzat Alsmadi, Wasim A. Al-Hamdani, et al.
Artificial Intelligence Review (2023) Vol. 56, Iss. 10, pp. 10733-10811
Closed Access | Times Cited: 61
Deep transfer learning for intrusion detection in industrial control networks: A comprehensive review
Hamza Kheddar, Yassine Himeur, Ali Ismail Awad
Journal of Network and Computer Applications (2023) Vol. 220, pp. 103760-103760
Open Access | Times Cited: 47
Hamza Kheddar, Yassine Himeur, Ali Ismail Awad
Journal of Network and Computer Applications (2023) Vol. 220, pp. 103760-103760
Open Access | Times Cited: 47
A Survey of Deep Learning Technologies for Intrusion Detection in Internet of Things
Han Liao, Mohd Zamri Murah, Mohammad Kamrul Hasan, et al.
IEEE Access (2024) Vol. 12, pp. 4745-4761
Open Access | Times Cited: 19
Han Liao, Mohd Zamri Murah, Mohammad Kamrul Hasan, et al.
IEEE Access (2024) Vol. 12, pp. 4745-4761
Open Access | Times Cited: 19
Network anomaly detection using channel boosted and residual learning based deep convolutional neural network
Naveed Chouhan, Asifullah Khan, Haroon-ur-Rasheed Khan
Applied Soft Computing (2019) Vol. 83, pp. 105612-105612
Closed Access | Times Cited: 98
Naveed Chouhan, Asifullah Khan, Haroon-ur-Rasheed Khan
Applied Soft Computing (2019) Vol. 83, pp. 105612-105612
Closed Access | Times Cited: 98
Cyber Security Intrusion Detection for Agriculture 4.0: Machine Learning-Based Solutions, Datasets, and Future Directions
Mohamed Amine Ferrag, Lei Shu, Othmane Friha, et al.
IEEE/CAA Journal of Automatica Sinica (2021) Vol. 9, Iss. 3, pp. 407-436
Closed Access | Times Cited: 91
Mohamed Amine Ferrag, Lei Shu, Othmane Friha, et al.
IEEE/CAA Journal of Automatica Sinica (2021) Vol. 9, Iss. 3, pp. 407-436
Closed Access | Times Cited: 91
Deep Neural Network Based Real-Time Intrusion Detection System
Sharuka Promodya Thirimanne, Lasitha Jayawardana, S.L.P. Yasakethu, et al.
SN Computer Science (2022) Vol. 3, Iss. 2
Open Access | Times Cited: 57
Sharuka Promodya Thirimanne, Lasitha Jayawardana, S.L.P. Yasakethu, et al.
SN Computer Science (2022) Vol. 3, Iss. 2
Open Access | Times Cited: 57
Zero-day Ransomware Attack Detection using Deep Contractive Autoencoder and Voting based Ensemble Classifier
Umme Zahoora, Muttukrishnan Rajarajan, Zahoqing Pan, et al.
Applied Intelligence (2022) Vol. 52, Iss. 12, pp. 13941-13960
Open Access | Times Cited: 41
Umme Zahoora, Muttukrishnan Rajarajan, Zahoqing Pan, et al.
Applied Intelligence (2022) Vol. 52, Iss. 12, pp. 13941-13960
Open Access | Times Cited: 41
Chipless RFID Sensors for IoT-Based Healthcare Applications: A Review of State of the Art
Amrutha Subrahmannian, Santanu Kumar Behera
IEEE Transactions on Instrumentation and Measurement (2022) Vol. 71, pp. 1-20
Closed Access | Times Cited: 39
Amrutha Subrahmannian, Santanu Kumar Behera
IEEE Transactions on Instrumentation and Measurement (2022) Vol. 71, pp. 1-20
Closed Access | Times Cited: 39
Advancing Network Security in Industrial IoT: A Deep Dive into AI-Enabled Intrusion Detection Systems
Mohammad Shahin, Mazdak Maghanaki, Ali Hosseinzadeh, et al.
Advanced Engineering Informatics (2024) Vol. 62, pp. 102685-102685
Closed Access | Times Cited: 10
Mohammad Shahin, Mazdak Maghanaki, Ali Hosseinzadeh, et al.
Advanced Engineering Informatics (2024) Vol. 62, pp. 102685-102685
Closed Access | Times Cited: 10
Advancements in training and deployment strategies for AI-based intrusion detection systems in IoT: a systematic literature review
S Kumar Reddy Mallidi, Rajeswara Rao Ramisetty
Discover Internet of Things (2025) Vol. 5, Iss. 1
Open Access | Times Cited: 1
S Kumar Reddy Mallidi, Rajeswara Rao Ramisetty
Discover Internet of Things (2025) Vol. 5, Iss. 1
Open Access | Times Cited: 1
Optimizing Intrusion Detection for IoT : A Systematic Review of Machine Learning and Deep Learning Approaches With Feature Selection and Data Balancing
S Kumar Reddy Mallidi, Rajeswara Rao Ramisetty
Wiley Interdisciplinary Reviews Data Mining and Knowledge Discovery (2025) Vol. 15, Iss. 2
Closed Access | Times Cited: 1
S Kumar Reddy Mallidi, Rajeswara Rao Ramisetty
Wiley Interdisciplinary Reviews Data Mining and Knowledge Discovery (2025) Vol. 15, Iss. 2
Closed Access | Times Cited: 1
A Novel Framework Design of Network Intrusion Detection Based on Machine Learning Techniques
Chongzhen Zhang, Yanli Chen, Yang Meng, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-15
Open Access | Times Cited: 44
Chongzhen Zhang, Yanli Chen, Yang Meng, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-15
Open Access | Times Cited: 44
Accelerating the update of a DL-based IDS for IoT using deep transfer learning
Idriss Idrissi, Mostafa Azizi, Omar Moussaoui
Indonesian Journal of Electrical Engineering and Computer Science (2021) Vol. 23, Iss. 2, pp. 1059-1059
Open Access | Times Cited: 42
Idriss Idrissi, Mostafa Azizi, Omar Moussaoui
Indonesian Journal of Electrical Engineering and Computer Science (2021) Vol. 23, Iss. 2, pp. 1059-1059
Open Access | Times Cited: 42
Deep Q-Network-Based Open-Set Intrusion Detection Solution for Industrial Internet of Things
Shoujian Yu, R. Zhai, Yizhou Shen, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 7, pp. 12536-12550
Closed Access | Times Cited: 17
Shoujian Yu, R. Zhai, Yizhou Shen, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 7, pp. 12536-12550
Closed Access | Times Cited: 17
Machine Learning for Misuse-Based Network Intrusion Detection: Overview, Unified Evaluation and Feature Choice Comparison Framework
Laurens Le Jeune, Toon Goedemé, Nele Mentens
IEEE Access (2021) Vol. 9, pp. 63995-64015
Open Access | Times Cited: 39
Laurens Le Jeune, Toon Goedemé, Nele Mentens
IEEE Access (2021) Vol. 9, pp. 63995-64015
Open Access | Times Cited: 39
A two-stage stacked ensemble intrusion detection system using five base classifiers and MLP with optimal feature selection
Earum Mushtaq, Aneela Zameer, Asifullah Khan
Microprocessors and Microsystems (2022) Vol. 94, pp. 104660-104660
Closed Access | Times Cited: 24
Earum Mushtaq, Aneela Zameer, Asifullah Khan
Microprocessors and Microsystems (2022) Vol. 94, pp. 104660-104660
Closed Access | Times Cited: 24
An intrusion detection method based on stacked sparse autoencoder and improved gaussian mixture model
Tianyue Zhang, Wei Chen, Yu-Xiao Liu, et al.
Computers & Security (2023) Vol. 128, pp. 103144-103144
Closed Access | Times Cited: 15
Tianyue Zhang, Wei Chen, Yu-Xiao Liu, et al.
Computers & Security (2023) Vol. 128, pp. 103144-103144
Closed Access | Times Cited: 15
Deep Transfer Learning Applications in Intrusion Detection Systems: A Comprehensive Review
Hamza Kheddar, Yassine Himeur, Ali Ismail Awad
arXiv (Cornell University) (2023)
Open Access | Times Cited: 14
Hamza Kheddar, Yassine Himeur, Ali Ismail Awad
arXiv (Cornell University) (2023)
Open Access | Times Cited: 14
Multifaceted fused-CNN based scoring of breast cancer whole-slide histopathology images
Noorul Wahab, Asifullah Khan
Applied Soft Computing (2020) Vol. 97, pp. 106808-106808
Closed Access | Times Cited: 37
Noorul Wahab, Asifullah Khan
Applied Soft Computing (2020) Vol. 97, pp. 106808-106808
Closed Access | Times Cited: 37