
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Anomaly detection using deep convolutional generative adversarial networks in the internet of things
Amit Kumar Mishra, Shweta Paliwal, Gautam Srivastava
ISA Transactions (2023)
Closed Access | Times Cited: 9
Amit Kumar Mishra, Shweta Paliwal, Gautam Srivastava
ISA Transactions (2023)
Closed Access | Times Cited: 9
Showing 9 citing articles:
Generative Modeling for Imbalanced Credit Card Fraud Transaction Detection
Mohammed Tayebi, Said El Kafhali
Journal of Cybersecurity and Privacy (2025) Vol. 5, Iss. 1, pp. 9-9
Open Access | Times Cited: 2
Mohammed Tayebi, Said El Kafhali
Journal of Cybersecurity and Privacy (2025) Vol. 5, Iss. 1, pp. 9-9
Open Access | Times Cited: 2
Network and cybersecurity applications of defense in adversarial attacks: A state-of-the-art using machine learning and deep learning methods
Yahya Layth Khaleel, Mustafa Abdulfattah Habeeb, A. S. Albahri, et al.
Journal of Intelligent Systems (2024) Vol. 33, Iss. 1
Open Access | Times Cited: 12
Yahya Layth Khaleel, Mustafa Abdulfattah Habeeb, A. S. Albahri, et al.
Journal of Intelligent Systems (2024) Vol. 33, Iss. 1
Open Access | Times Cited: 12
An Intrusion Detection System over the IoT Data Streams Using eXplainable Artificial Intelligence (XAI)
Adel Alabbadi, Fuad Bajaber
Sensors (2025) Vol. 25, Iss. 3, pp. 847-847
Open Access
Adel Alabbadi, Fuad Bajaber
Sensors (2025) Vol. 25, Iss. 3, pp. 847-847
Open Access
A survey: contribution of ML & DL to the detection & prevention of botnet attacks
Yassine El Yamani, Youssef Baddi, Najib El Kamoun
Journal of Reliable Intelligent Environments (2024) Vol. 10, Iss. 4, pp. 431-448
Closed Access | Times Cited: 3
Yassine El Yamani, Youssef Baddi, Najib El Kamoun
Journal of Reliable Intelligent Environments (2024) Vol. 10, Iss. 4, pp. 431-448
Closed Access | Times Cited: 3
DL-ADS: Improved Grey Wolf Optimization Enabled AE-LSTM Technique for Efficient Network Anomaly Detection in Internet of Thing Edge Computing
J. Manokaran, G. Vairavel
IEEE Access (2024) Vol. 12, pp. 75983-76002
Open Access | Times Cited: 1
J. Manokaran, G. Vairavel
IEEE Access (2024) Vol. 12, pp. 75983-76002
Open Access | Times Cited: 1
Cyber Security Intrusion Detection and Bot Data Collection using Deep Learning in the IoT
Fahad Ali Alotaibi, Shailendra Mishra
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 3
Open Access
Fahad Ali Alotaibi, Shailendra Mishra
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 3
Open Access
Hybrid Data-Driven Learning-Based Internet of Things Network Intrusion Detection Model
Oyeniyi Akeem Alimi
2022 IEEE World AI IoT Congress (AIIoT) (2024), pp. 496-501
Closed Access
Oyeniyi Akeem Alimi
2022 IEEE World AI IoT Congress (AIIoT) (2024), pp. 496-501
Closed Access
Advancing anomaly detection in cloud environments with cutting‐edge generative AI for expert systems
Ümit Demirbaga
Expert Systems (2024) Vol. 42, Iss. 2
Open Access
Ümit Demirbaga
Expert Systems (2024) Vol. 42, Iss. 2
Open Access
GAN-based Anomaly Detection for Urban Sensing
Kyle DeMedeiros, Marwan Abdelatti, Abdeltawab Hendawi
2021 IEEE International Conference on Big Data (Big Data) (2024), pp. 6230-6239
Closed Access
Kyle DeMedeiros, Marwan Abdelatti, Abdeltawab Hendawi
2021 IEEE International Conference on Big Data (Big Data) (2024), pp. 6230-6239
Closed Access