OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A two-stage intrusion detection system with auto-encoder and LSTMs
Earum Mushtaq, Aneela Zameer, Muhammad Umer, et al.
Applied Soft Computing (2022) Vol. 121, pp. 108768-108768
Closed Access | Times Cited: 82

Showing 1-25 of 82 citing articles:

A data-driven approach for intrusion and anomaly detection using automated machine learning for the Internet of Things
Hao Xu, Zihan Sun, Yuan Cao, et al.
Soft Computing (2023) Vol. 27, Iss. 19, pp. 14469-14481
Closed Access | Times Cited: 148

DCNNBiLSTM: An Efficient Hybrid Deep Learning-Based Intrusion Detection System
Vanlalruata Hnamte, Jamal Hussain
Telematics and Informatics Reports (2023) Vol. 10, pp. 100053-100053
Open Access | Times Cited: 115

A hybrid VMD-LSTM/GRU model to predict non-stationary and irregular waves on the east coast of China
Lingxiao Zhao, Zhiyang Li, Leilei Qu, et al.
Ocean Engineering (2023) Vol. 276, pp. 114136-114136
Closed Access | Times Cited: 86

A Novel Two-Stage Deep Learning Model for Network Intrusion Detection: LSTM-AE
Vanlalruata Hnamte, Hong-Nhung Nguyen, Jamal Hussain, et al.
IEEE Access (2023) Vol. 11, pp. 37131-37148
Open Access | Times Cited: 70

Fusion of linear and non-linear dimensionality reduction techniques for feature reduction in LSTM-based Intrusion Detection System
Ankit Thakkar, Nandish Kikani, Rebakah Geddam
Applied Soft Computing (2024) Vol. 154, pp. 111378-111378
Closed Access | Times Cited: 16

Intrusion detection in cloud computing based on time series anomalies utilizing machine learning
Abdel-Rahman Al-Ghuwairi, Yousef Sharrab, Dimah Al-Fraihat, et al.
Journal of Cloud Computing Advances Systems and Applications (2023) Vol. 12, Iss. 1
Open Access | Times Cited: 38

HC-DTTSVM: A Network Intrusion Detection Method Based on Decision Tree Twin Support Vector Machine and Hierarchical Clustering
Li Zou, Xuemei Luo, Yan Zhang, et al.
IEEE Access (2023) Vol. 11, pp. 21404-21416
Open Access | Times Cited: 32

Deep Q-network-based heuristic intrusion detection against edge-based SIoT zero-day attacks
Shigen Shen, Chenpeng Cai, Zhenwei Li, et al.
Applied Soft Computing (2023) Vol. 150, pp. 111080-111080
Closed Access | Times Cited: 25

Analysis of Intrusion Detection Systems in UNSW-NB15 and NSL-KDD Datasets with Machine Learning Algorithms
F. J. Turk
Bitlis Eren Üniversitesi Fen Bilimleri Dergisi (2023) Vol. 12, Iss. 2, pp. 465-477
Open Access | Times Cited: 24

Machine learning and deep learning for user authentication and authorization in cybersecurity: A state-of-the-art review
Zinniya Taffannum Pritee, Mehedi Hasan Anik, Saida Binta Alam, et al.
Computers & Security (2024) Vol. 140, pp. 103747-103747
Closed Access | Times Cited: 12

A hybrid approach for intrusion detection in vehicular networks using feature selection and dimensionality reduction with optimized deep learning
Fayaz Hassan, Zafi Sherhan Syed, Aftab Ahmed Memon, et al.
PLoS ONE (2025) Vol. 20, Iss. 2, pp. e0312752-e0312752
Open Access | Times Cited: 1

An innovative deep learning-based approach for significant wave height forecasting
Şule Bekiryazıcı, Khalid Amarouche, Neyir Ozcan, et al.
Ocean Engineering (2025) Vol. 323, pp. 120623-120623
Closed Access | Times Cited: 1

Detection of Anomalies in Data Streams Using the LSTM-CNN Model
Agnieszka Duraj, Piotr S. Szczepaniak, Artur Sadok
Sensors (2025) Vol. 25, Iss. 5, pp. 1610-1610
Open Access | Times Cited: 1

TL-CNN-IDS: transfer learning-based intrusion detection system using convolutional neural network
Fengru Yan, Guanghua Zhang, Dongwen Zhang, et al.
The Journal of Supercomputing (2023) Vol. 79, Iss. 15, pp. 17562-17584
Closed Access | Times Cited: 21

Securing Mobile Edge Computing Using Hybrid Deep Learning Method
Olusola Adeniyi, Ali Safaa Sadiq, Prashant Pillai, et al.
Computers (2024) Vol. 13, Iss. 1, pp. 25-25
Open Access | Times Cited: 8

Optimized common features selection and deep-autoencoder (OCFSDA) for lightweight intrusion detection in Internet of things
Uneneibotejit Otokwala, Andrei Petrovski, Harsha Kalutarage
International Journal of Information Security (2024) Vol. 23, Iss. 4, pp. 2559-2581
Open Access | Times Cited: 8

An Integrated Complete Ensemble Empirical Mode Decomposition with Adaptive Noise to Optimize LSTM for Significant Wave Height Forecasting
Lingxiao Zhao, Zhiyang Li, Junsheng Zhang, et al.
Journal of Marine Science and Engineering (2023) Vol. 11, Iss. 2, pp. 435-435
Open Access | Times Cited: 15

A novel multi-scale CNN and Bi-LSTM arbitration dense network model for low-rate DDoS attack detection
Xiaochun Yin, Fang Wei, Zengguang Liu, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 5

An improved Harris Hawks optimizer based feature selection technique with effective two-staged classifier for network intrusion detection system
U Nandhini, Santhosh Kumar SVN
Peer-to-Peer Networking and Applications (2024)
Closed Access | Times Cited: 4

Using the ToN-IoT dataset to develop a new intrusion detection system for industrial IoT devices
Zhong Cao, Zhicai Zhao, Wenli Shang, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 4

Toward Generating a Large Scale Intrusion Detection Dataset and Intruders Behavioral Profiling Using Network and Transportation Layers Traffic Flow Analyzer (NTLFlowLyzer)
MohammadMoein Shafi, Arash Habibi Lashkari, Arousha Haghighian Roudsari
Journal of Network and Systems Management (2025) Vol. 33, Iss. 2
Closed Access

An adaptive graph neural network-based intrusion detection system for airborne network
Wenqi Liu, Shijia Li, Cong Gao, et al.
Engineering Applications of Artificial Intelligence (2025) Vol. 152, pp. 110851-110851
Closed Access

An Industrial Intrusion Detection Method Based on Hybrid Convolutional Neural Networks with Improved TCN
Zhihua Liu, Shengquan Liu, Zhang Jian
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 78, Iss. 1, pp. 411-433
Open Access | Times Cited: 3

Research on Dung Beetle Optimization Based Stacked Sparse Autoencoder for Network Situation Element Extraction
Yongchao Yang, Pan Zhao
IEEE Access (2024) Vol. 12, pp. 24014-24026
Open Access | Times Cited: 3

Page 1 - Next Page

Scroll to top