OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A novel multi-module integrated intrusion detection system for high-dimensional imbalanced data
Jiyuan Cui, Liansong Zong, Jianhua Xie, et al.
Applied Intelligence (2022) Vol. 53, Iss. 1, pp. 272-288
Open Access | Times Cited: 82

Showing 1-25 of 82 citing articles:

A Survey of CNN-Based Network Intrusion Detection
Leila Mohammadpour, Teck Chaw Ling, Chee Sun Liew, et al.
Applied Sciences (2022) Vol. 12, Iss. 16, pp. 8162-8162
Open Access | Times Cited: 93

A survey on imbalanced learning: latest research, applications and future directions
Wuxing Chen, Kaixiang Yang, Zhiwen Yu, et al.
Artificial Intelligence Review (2024) Vol. 57, Iss. 6
Open Access | Times Cited: 61

Class-overlap undersampling based on Schur decomposition for Class-imbalance problems
Qi Dai, Jian‐wei Liu, Yonghui Shi
Expert Systems with Applications (2023) Vol. 221, pp. 119735-119735
Closed Access | Times Cited: 52

A Survey of Deep Learning Technologies for Intrusion Detection in Internet of Things
Han Liao, Mohd Zamri Murah, Mohammad Kamrul Hasan, et al.
IEEE Access (2024) Vol. 12, pp. 4745-4761
Open Access | Times Cited: 19

HIDIM: A novel framework of network intrusion detection for hierarchical dependency and class imbalance
Weidong Zhou, Chunhe Xia, Tianbo Wang, et al.
Computers & Security (2024), pp. 104155-104155
Closed Access | Times Cited: 13

Designing a modified feature aggregation model with hybrid sampling techniques for network intrusion detection
NarasimhaSwamy Biyyapu, Veerapaneni Esther Jyothi, Phani Praveen Surapaneni, et al.
Cluster Computing (2024) Vol. 27, Iss. 5, pp. 5913-5931
Closed Access | Times Cited: 10

Network intrusion detection: An optimized deep learning approach using big data analytics
D. Suja Mary, L. Jaya Singh Dhas, A. Deepa, et al.
Expert Systems with Applications (2024) Vol. 251, pp. 123919-123919
Closed Access | Times Cited: 9

The good, the bad, and the algorithm: The impact of generative AI on cybersecurity
Luigi Coppolino, Salvatore D’Antonio, Giovanni Mazzeo, et al.
Neurocomputing (2025) Vol. 623, pp. 129406-129406
Open Access | Times Cited: 1

APELID: Enhancing real-time intrusion detection with augmented WGAN and parallel ensemble learning
Hoang V. Vo, Hanh P. Du, Hoa N. Nguyen
Computers & Security (2023) Vol. 136, pp. 103567-103567
Closed Access | Times Cited: 19

Intrusion Detection using hybridized Meta-heuristic techniques with Weighted XGBoost Classifier
Ghulam Mohi-Ud-Din, Lin Zhijun, Jiangbin Zheng, et al.
Expert Systems with Applications (2023) Vol. 232, pp. 120596-120596
Closed Access | Times Cited: 18

A Novel IDS with a Dynamic Access Control Algorithm to Detect and Defend Intrusion at IoT Nodes
Moutaz Alazab, Albara Awajan, Hadeel Alazzam, et al.
Sensors (2024) Vol. 24, Iss. 7, pp. 2188-2188
Open Access | Times Cited: 8

Class-overlap detection based on heterogeneous clustering ensemble for multi-class imbalance problem
Qi Dai, Long-hui Wang, Kai-long Xu, et al.
Expert Systems with Applications (2024) Vol. 255, pp. 124558-124558
Closed Access | Times Cited: 7

An efficient intrusion detection model based on convolutional spiking neural network
Zhen Wang, Fuad A. Ghaleb, Anazida Zainal, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 6

Anomaly-Based Intrusion Detection Model Using Deep Learning for IoT Networks
Muaadh A. Alsoufi, Maheyzah Md Siraj, Fuad A. Ghaleb, et al.
Computer Modeling in Engineering & Sciences (2024) Vol. 141, Iss. 1, pp. 823-845
Open Access | Times Cited: 6

Explainable AI-based innovative hybrid ensemble model for intrusion detection
Usman Ahmed, Jiangbin Zheng, Ahmad Almogren, et al.
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access | Times Cited: 6

MEMBER: A multi-task learning model with hybrid deep features for network intrusion detection
Jinghong Lan, Xudong Liu, Bo Li, et al.
Computers & Security (2022) Vol. 123, pp. 102919-102919
Closed Access | Times Cited: 28

FCNN-SE: An Intrusion Detection Model Based on a Fusion CNN and Stacked Ensemble
Chen Chen, Yafei Song, Shaohua Yue, et al.
Applied Sciences (2022) Vol. 12, Iss. 17, pp. 8601-8601
Open Access | Times Cited: 21

Knacks of a hybrid anomaly detection model using deep auto-encoder driven gated recurrent unit
Earum Mushtaq, Aneela Zameer, Rubina Nasir
Computer Networks (2023) Vol. 226, pp. 109681-109681
Closed Access | Times Cited: 12

Multi-granularity Enhanced Graph Convolutional Network for Aspect Sentiment Triplet Extraction
Mingwei Tang, Kun Yang, Linping Tao, et al.
Big Data Research (2025), pp. 100506-100506
Closed Access

An improved feature extraction algorithm for robust Swin Transformer model in high-dimensional medical image analysis
Anuj Kumar, Satya Prakash Yadav, Awadhesh Kumar
Computers in Biology and Medicine (2025) Vol. 188, pp. 109822-109822
Closed Access

Unknown Category Malicious Traffic Detection Based on Contrastive Learning
Leiming Yan, Tao Zhou, Xianyi Chen
Lecture notes in computer science (2025), pp. 231-245
Closed Access

An adaptive graph neural network-based intrusion detection system for airborne network
Wenqi Liu, Shijia Li, Cong Gao, et al.
Engineering Applications of Artificial Intelligence (2025) Vol. 152, pp. 110851-110851
Closed Access

DIFT: A Diffusion-Transformer for Intrusion Detection of IoT with Imbalanced Learning
Peng Wang, Yafei Song, Xiaodan Wang, et al.
Journal of Network and Systems Management (2025) Vol. 33, Iss. 3
Closed Access

A vulnerability detection algorithm based on residual graph attention networks for source code imbalance (RGAN)
Mingwei Tang, Wei Tang, Qingchi Gui, et al.
Expert Systems with Applications (2023) Vol. 238, pp. 122216-122216
Closed Access | Times Cited: 10

An Industrial Intrusion Detection Method Based on Hybrid Convolutional Neural Networks with Improved TCN
Zhihua Liu, Shengquan Liu, Zhang Jian
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 78, Iss. 1, pp. 411-433
Open Access | Times Cited: 3

Page 1 - Next Page

Scroll to top