
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Network anomaly detection using channel boosted and residual learning based deep convolutional neural network
Naveed Chouhan, Asifullah Khan, Haroon-ur-Rasheed Khan
Applied Soft Computing (2019) Vol. 83, pp. 105612-105612
Closed Access | Times Cited: 98
Naveed Chouhan, Asifullah Khan, Haroon-ur-Rasheed Khan
Applied Soft Computing (2019) Vol. 83, pp. 105612-105612
Closed Access | Times Cited: 98
Showing 1-25 of 98 citing articles:
A survey of the recent architectures of deep convolutional neural networks
Asifullah Khan, Anabia Sohail, Umme Zahoora, et al.
Artificial Intelligence Review (2020) Vol. 53, Iss. 8, pp. 5455-5516
Closed Access | Times Cited: 2476
Asifullah Khan, Anabia Sohail, Umme Zahoora, et al.
Artificial Intelligence Review (2020) Vol. 53, Iss. 8, pp. 5455-5516
Closed Access | Times Cited: 2476
CNN Variants for Computer Vision: History, Architecture, Application, Challenges and Future Scope
Dulari Bhatt, Chirag Patel, Hardik Talsania, et al.
Electronics (2021) Vol. 10, Iss. 20, pp. 2470-2470
Open Access | Times Cited: 555
Dulari Bhatt, Chirag Patel, Hardik Talsania, et al.
Electronics (2021) Vol. 10, Iss. 20, pp. 2470-2470
Open Access | Times Cited: 555
Deep Anomaly Detection for Time-Series Data in Industrial IoT: A Communication-Efficient On-Device Federated Learning Approach
Yi Liu, Sahil Garg, Jiangtian Nie, et al.
IEEE Internet of Things Journal (2020) Vol. 8, Iss. 8, pp. 6348-6358
Open Access | Times Cited: 419
Yi Liu, Sahil Garg, Jiangtian Nie, et al.
IEEE Internet of Things Journal (2020) Vol. 8, Iss. 8, pp. 6348-6358
Open Access | Times Cited: 419
AI-IDS: Application of Deep Learning to Real-Time Web Intrusion Detection
Aechan Kim, Mohyun Park, Dong Hoon Lee
IEEE Access (2020) Vol. 8, pp. 70245-70261
Open Access | Times Cited: 192
Aechan Kim, Mohyun Park, Dong Hoon Lee
IEEE Access (2020) Vol. 8, pp. 70245-70261
Open Access | Times Cited: 192
Design and Development of RNN Anomaly Detection Model for IoT Networks
Imtiaz Ullah, Qusay H. Mahmoud
IEEE Access (2022) Vol. 10, pp. 62722-62750
Open Access | Times Cited: 137
Imtiaz Ullah, Qusay H. Mahmoud
IEEE Access (2022) Vol. 10, pp. 62722-62750
Open Access | Times Cited: 137
Machine Learning and Deep Learning Approaches for CyberSecurity: A Review
Asmaa Halbouni, Teddy Surya Gunawan, Mohamed Hadi Habaebi, et al.
IEEE Access (2022) Vol. 10, pp. 19572-19585
Open Access | Times Cited: 112
Asmaa Halbouni, Teddy Surya Gunawan, Mohamed Hadi Habaebi, et al.
IEEE Access (2022) Vol. 10, pp. 19572-19585
Open Access | Times Cited: 112
A Survey of CNN-Based Network Intrusion Detection
Leila Mohammadpour, Teck Chaw Ling, Chee Sun Liew, et al.
Applied Sciences (2022) Vol. 12, Iss. 16, pp. 8162-8162
Open Access | Times Cited: 93
Leila Mohammadpour, Teck Chaw Ling, Chee Sun Liew, et al.
Applied Sciences (2022) Vol. 12, Iss. 16, pp. 8162-8162
Open Access | Times Cited: 93
A two-stage intrusion detection system with auto-encoder and LSTMs
Earum Mushtaq, Aneela Zameer, Muhammad Umer, et al.
Applied Soft Computing (2022) Vol. 121, pp. 108768-108768
Closed Access | Times Cited: 82
Earum Mushtaq, Aneela Zameer, Muhammad Umer, et al.
Applied Soft Computing (2022) Vol. 121, pp. 108768-108768
Closed Access | Times Cited: 82
A Novel Two-Stage Deep Learning Model for Network Intrusion Detection: LSTM-AE
Vanlalruata Hnamte, Hong-Nhung Nguyen, Jamal Hussain, et al.
IEEE Access (2023) Vol. 11, pp. 37131-37148
Open Access | Times Cited: 70
Vanlalruata Hnamte, Hong-Nhung Nguyen, Jamal Hussain, et al.
IEEE Access (2023) Vol. 11, pp. 37131-37148
Open Access | Times Cited: 70
Zero-day attack detection: a systematic literature review
Rasheed Ahmad, Izzat Alsmadi, Wasim A. Al-Hamdani, et al.
Artificial Intelligence Review (2023) Vol. 56, Iss. 10, pp. 10733-10811
Closed Access | Times Cited: 61
Rasheed Ahmad, Izzat Alsmadi, Wasim A. Al-Hamdani, et al.
Artificial Intelligence Review (2023) Vol. 56, Iss. 10, pp. 10733-10811
Closed Access | Times Cited: 61
Genetic convolutional neural network for intrusion detection systems
M.T. Nguyen, Kiseon Kim
Future Generation Computer Systems (2020) Vol. 113, pp. 418-427
Closed Access | Times Cited: 121
M.T. Nguyen, Kiseon Kim
Future Generation Computer Systems (2020) Vol. 113, pp. 418-427
Closed Access | Times Cited: 121
A Double-Layered Hybrid Approach for Network Intrusion Detection System Using Combined Naive Bayes and SVM
Treepop Wisanwanichthan, Mason Thammawichai
IEEE Access (2021) Vol. 9, pp. 138432-138450
Open Access | Times Cited: 102
Treepop Wisanwanichthan, Mason Thammawichai
IEEE Access (2021) Vol. 9, pp. 138432-138450
Open Access | Times Cited: 102
An Intrusion Detection Method Using Few-Shot Learning
Yingwei Yu, Naizheng Bian
IEEE Access (2020) Vol. 8, pp. 49730-49740
Open Access | Times Cited: 91
Yingwei Yu, Naizheng Bian
IEEE Access (2020) Vol. 8, pp. 49730-49740
Open Access | Times Cited: 91
COVID-19 Detection in Chest X-ray Images Using a New Channel Boosted CNN
Saddam Hussain Khan, Anabia Sohail, Asifullah Khan, et al.
Diagnostics (2022) Vol. 12, Iss. 2, pp. 267-267
Open Access | Times Cited: 65
Saddam Hussain Khan, Anabia Sohail, Asifullah Khan, et al.
Diagnostics (2022) Vol. 12, Iss. 2, pp. 267-267
Open Access | Times Cited: 65
A comprehensive review on detection of cyber-attacks: Data sets, methods, challenges, and future research directions
Hüseyin Ahmetoğlu, Resul Daş
Internet of Things (2022) Vol. 20, pp. 100615-100615
Closed Access | Times Cited: 65
Hüseyin Ahmetoğlu, Resul Daş
Internet of Things (2022) Vol. 20, pp. 100615-100615
Closed Access | Times Cited: 65
A Survey of the Recent Trends in Deep Learning Based Malware Detection
Umm-e-Hani Tayyab, Faiza Babar Khan, Muhammad Hanif Durad, et al.
Journal of Cybersecurity and Privacy (2022) Vol. 2, Iss. 4, pp. 800-829
Open Access | Times Cited: 59
Umm-e-Hani Tayyab, Faiza Babar Khan, Muhammad Hanif Durad, et al.
Journal of Cybersecurity and Privacy (2022) Vol. 2, Iss. 4, pp. 800-829
Open Access | Times Cited: 59
A network intrusion detection method based on semantic Re-encoding and deep learning
Zhendong Wu, Jingjing Wang, Liqin Hu, et al.
Journal of Network and Computer Applications (2020) Vol. 164, pp. 102688-102688
Closed Access | Times Cited: 69
Zhendong Wu, Jingjing Wang, Liqin Hu, et al.
Journal of Network and Computer Applications (2020) Vol. 164, pp. 102688-102688
Closed Access | Times Cited: 69
Communication-Efficient Federated Learning for Anomaly Detection in Industrial Internet of Things
Yi Liu, Neeraj Kumar, Zehui Xiong, et al.
GLOBECOM 2022 - 2022 IEEE Global Communications Conference (2020), pp. 1-6
Closed Access | Times Cited: 64
Yi Liu, Neeraj Kumar, Zehui Xiong, et al.
GLOBECOM 2022 - 2022 IEEE Global Communications Conference (2020), pp. 1-6
Closed Access | Times Cited: 64
Command filtered adaptive neural network synchronization control of fractional-order chaotic systems subject to unknown dead zones
Shumin Ha, Liangyun Chen, Heng Liu
Journal of the Franklin Institute (2021) Vol. 358, Iss. 7, pp. 3376-3402
Closed Access | Times Cited: 44
Shumin Ha, Liangyun Chen, Heng Liu
Journal of the Franklin Institute (2021) Vol. 358, Iss. 7, pp. 3376-3402
Closed Access | Times Cited: 44
Network traffic anomaly detection method based on multi-scale residual classifier
Xueyuan Duan, Yu Fu, Kun Wang
Computer Communications (2022) Vol. 198, pp. 206-216
Closed Access | Times Cited: 30
Xueyuan Duan, Yu Fu, Kun Wang
Computer Communications (2022) Vol. 198, pp. 206-216
Closed Access | Times Cited: 30
Anomaly detection for construction vibration signals using unsupervised deep learning and cloud computing
Qiuhan Meng, Songye Zhu
Advanced Engineering Informatics (2023) Vol. 55, pp. 101907-101907
Closed Access | Times Cited: 18
Qiuhan Meng, Songye Zhu
Advanced Engineering Informatics (2023) Vol. 55, pp. 101907-101907
Closed Access | Times Cited: 18
Automated, Reliable Zero-Day Malware Detection Based on Autoencoding Architecture
Chiho Kim, Sang–Yoon Chang, Jonghyun Kim, et al.
IEEE Transactions on Network and Service Management (2023) Vol. 20, Iss. 3, pp. 3900-3914
Closed Access | Times Cited: 17
Chiho Kim, Sang–Yoon Chang, Jonghyun Kim, et al.
IEEE Transactions on Network and Service Management (2023) Vol. 20, Iss. 3, pp. 3900-3914
Closed Access | Times Cited: 17
An Enhanced Hybrid Intrusion Detection Based on Crow Search Analysis Optimizations and Artificial Neural Network
Chetan Gupta, Amit Kumar, Neelesh Kumar Jain
Wireless Personal Communications (2024) Vol. 134, Iss. 1, pp. 43-68
Closed Access | Times Cited: 6
Chetan Gupta, Amit Kumar, Neelesh Kumar Jain
Wireless Personal Communications (2024) Vol. 134, Iss. 1, pp. 43-68
Closed Access | Times Cited: 6
Random clustering-based outlier detector
Adam Kiersztyn, Dorota Pylak, Michał Horodelski, et al.
Information Sciences (2024) Vol. 667, pp. 120498-120498
Closed Access | Times Cited: 6
Adam Kiersztyn, Dorota Pylak, Michał Horodelski, et al.
Information Sciences (2024) Vol. 667, pp. 120498-120498
Closed Access | Times Cited: 6
The Weighted Word2vec Paragraph Vectors for Anomaly Detection Over HTTP Traffic
Jieling Li, Hao Zhang, Z Wei
IEEE Access (2020) Vol. 8, pp. 141787-141798
Open Access | Times Cited: 43
Jieling Li, Hao Zhang, Z Wei
IEEE Access (2020) Vol. 8, pp. 141787-141798
Open Access | Times Cited: 43