
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
RANet: Network intrusion detection with group-gating convolutional neural network
Xiaoqing Zhang, Fei Yang, Yue Hu, et al.
Journal of Network and Computer Applications (2021) Vol. 198, pp. 103266-103266
Closed Access | Times Cited: 26
Xiaoqing Zhang, Fei Yang, Yue Hu, et al.
Journal of Network and Computer Applications (2021) Vol. 198, pp. 103266-103266
Closed Access | Times Cited: 26
Showing 1-25 of 26 citing articles:
Cyber Intrusion Detection System Based on a Multiobjective Binary Bat Algorithm for Feature Selection and Enhanced Bat Algorithm for Parameter Optimization in Neural Networks
Waheed Ali H. M. Ghanem, Sanaa A. A. Ghaleb, Aman Jantan, et al.
IEEE Access (2022) Vol. 10, pp. 76318-76339
Open Access | Times Cited: 50
Waheed Ali H. M. Ghanem, Sanaa A. A. Ghaleb, Aman Jantan, et al.
IEEE Access (2022) Vol. 10, pp. 76318-76339
Open Access | Times Cited: 50
Scalable anomaly-based intrusion detection for secure Internet of Things using generative adversarial networks in fog environment
Wei Yao, Han Shi, Hai Zhao
Journal of Network and Computer Applications (2023) Vol. 214, pp. 103622-103622
Closed Access | Times Cited: 27
Wei Yao, Han Shi, Hai Zhao
Journal of Network and Computer Applications (2023) Vol. 214, pp. 103622-103622
Closed Access | Times Cited: 27
Shaping future low-carbon energy and transportation systems: Digital technologies and applications
Jie Song, Guannan He, Jianxiao Wang, et al.
iEnergy (2022) Vol. 1, Iss. 3, pp. 285-305
Open Access | Times Cited: 32
Jie Song, Guannan He, Jianxiao Wang, et al.
iEnergy (2022) Vol. 1, Iss. 3, pp. 285-305
Open Access | Times Cited: 32
Adaptive feature squeeze network for nuclear cataract classification in AS-OCT image
Xiaoqing Zhang, Zunjie Xiao, Risa Higashita, et al.
Journal of Biomedical Informatics (2022) Vol. 128, pp. 104037-104037
Open Access | Times Cited: 28
Xiaoqing Zhang, Zunjie Xiao, Risa Higashita, et al.
Journal of Biomedical Informatics (2022) Vol. 128, pp. 104037-104037
Open Access | Times Cited: 28
Mixed‐decomposed convolutional network: A lightweight yet efficient convolutional neural network for ocular disease recognition
Xiaoqing Zhang, Xiao Wu, Zunjie Xiao, et al.
CAAI Transactions on Intelligence Technology (2023) Vol. 9, Iss. 2, pp. 319-332
Open Access | Times Cited: 13
Xiaoqing Zhang, Xiao Wu, Zunjie Xiao, et al.
CAAI Transactions on Intelligence Technology (2023) Vol. 9, Iss. 2, pp. 319-332
Open Access | Times Cited: 13
Knacks of a hybrid anomaly detection model using deep auto-encoder driven gated recurrent unit
Earum Mushtaq, Aneela Zameer, Rubina Nasir
Computer Networks (2023) Vol. 226, pp. 109681-109681
Closed Access | Times Cited: 12
Earum Mushtaq, Aneela Zameer, Rubina Nasir
Computer Networks (2023) Vol. 226, pp. 109681-109681
Closed Access | Times Cited: 12
APFed: Adaptive personalized federated learning for intrusion detection in maritime meteorological sensor networks
Xin Su, Guifu Zhang
Digital Communications and Networks (2024)
Open Access | Times Cited: 4
Xin Su, Guifu Zhang
Digital Communications and Networks (2024)
Open Access | Times Cited: 4
Improved Crow Search-Based Feature Selection and Ensemble Learning for IoT Intrusion Detection
D. Jayalatchumy, Rajakumar Ramalingam, Aravind Balakrishnan, et al.
IEEE Access (2024) Vol. 12, pp. 33218-33235
Open Access | Times Cited: 4
D. Jayalatchumy, Rajakumar Ramalingam, Aravind Balakrishnan, et al.
IEEE Access (2024) Vol. 12, pp. 33218-33235
Open Access | Times Cited: 4
An intrusion detection method combining variational auto-encoder and generative adversarial networks
Zhengfa Li, Chuanhe Huang, Wanyu Qiu
Computer Networks (2024) Vol. 253, pp. 110724-110724
Closed Access | Times Cited: 4
Zhengfa Li, Chuanhe Huang, Wanyu Qiu
Computer Networks (2024) Vol. 253, pp. 110724-110724
Closed Access | Times Cited: 4
Enhancing network security: an intrusion detection system using residual network-based convolutional neural network
Saima Farhan, Jovaria Mubashir, Yasin Ul Haq, et al.
Cluster Computing (2025) Vol. 28, Iss. 4
Closed Access
Saima Farhan, Jovaria Mubashir, Yasin Ul Haq, et al.
Cluster Computing (2025) Vol. 28, Iss. 4
Closed Access
A Gated Recurrent Unit Deep Learning Model to Detect and Mitigate Distributed Denial of Service and Portscan Attacks
Daniel Matheus Brandão Lent, Matheus P. Novaes, Luiz F. Carvalho, et al.
IEEE Access (2022) Vol. 10, pp. 73229-73242
Open Access | Times Cited: 17
Daniel Matheus Brandão Lent, Matheus P. Novaes, Luiz F. Carvalho, et al.
IEEE Access (2022) Vol. 10, pp. 73229-73242
Open Access | Times Cited: 17
Unsupervised Representation Learning Approach for Intrusion Detection in the Industrial Internet of Things Network Environment
Vishnu Radhakrishnan, N Kabilan, Vinayakumar Ravi, et al.
Springer series in reliability engineering (2025), pp. 41-76
Closed Access
Vishnu Radhakrishnan, N Kabilan, Vinayakumar Ravi, et al.
Springer series in reliability engineering (2025), pp. 41-76
Closed Access
Research on hybrid intrusion detection based on improved Harris Hawk optimization algorithm
Peng-Zhen Zhou, Huifu Zhang, Wei Liang
Connection Science (2023) Vol. 35, Iss. 1
Open Access | Times Cited: 9
Peng-Zhen Zhou, Huifu Zhang, Wei Liang
Connection Science (2023) Vol. 35, Iss. 1
Open Access | Times Cited: 9
Optimization of predictive performance of intrusion detection system using hybrid ensemble model for secure systems
Qaiser Abbas, Sadaf Hina, Hamza Sajjad, et al.
PeerJ Computer Science (2023) Vol. 9, pp. e1552-e1552
Open Access | Times Cited: 8
Qaiser Abbas, Sadaf Hina, Hamza Sajjad, et al.
PeerJ Computer Science (2023) Vol. 9, pp. e1552-e1552
Open Access | Times Cited: 8
AI-powered intrusion detection in large-scale traffic networks based on flow sensing strategy and parallel deep analysis
Hoang V. Vo, Hanh P. Du, Hoa N. Nguyen
Journal of Network and Computer Applications (2023) Vol. 220, pp. 103735-103735
Closed Access | Times Cited: 7
Hoang V. Vo, Hanh P. Du, Hoa N. Nguyen
Journal of Network and Computer Applications (2023) Vol. 220, pp. 103735-103735
Closed Access | Times Cited: 7
A Lightweight Unsupervised Intrusion Detection Model Based on Variational Auto-Encoder
Yi Ren, Kanghui Feng, Fei Hu, et al.
Sensors (2023) Vol. 23, Iss. 20, pp. 8407-8407
Open Access | Times Cited: 4
Yi Ren, Kanghui Feng, Fei Hu, et al.
Sensors (2023) Vol. 23, Iss. 20, pp. 8407-8407
Open Access | Times Cited: 4
Spatial-temporal knowledge distillation for lightweight network traffic anomaly detection
Xintong Wang, Zixuan Wang, Enliang Wang, et al.
Computers & Security (2023) Vol. 137, pp. 103636-103636
Closed Access | Times Cited: 4
Xintong Wang, Zixuan Wang, Enliang Wang, et al.
Computers & Security (2023) Vol. 137, pp. 103636-103636
Closed Access | Times Cited: 4
Detecting suspicious transactions in a virtual-currency-enabled online social network
Yadong Zhou, Bowen Hu, Junjie Zhang, et al.
Journal of Network and Computer Applications (2022) Vol. 211, pp. 103555-103555
Closed Access | Times Cited: 5
Yadong Zhou, Bowen Hu, Junjie Zhang, et al.
Journal of Network and Computer Applications (2022) Vol. 211, pp. 103555-103555
Closed Access | Times Cited: 5
Intrusion Detection using Dense Neural Network in Network System
Aman Doherey, Akansha Singh, Arun Kumar
(2022), pp. 484-488
Closed Access | Times Cited: 3
Aman Doherey, Akansha Singh, Arun Kumar
(2022), pp. 484-488
Closed Access | Times Cited: 3
Intelligent monitoring of malicious intrusion behavior for power communication network channel
Hongyu Shi, Haiying Huang, Yong Wu, et al.
(2024)
Closed Access
Hongyu Shi, Haiying Huang, Yong Wu, et al.
(2024)
Closed Access
Attention Mechanism Model Combined With Adversarial Learning for E-Commerce User Behavior Classification and Personality Recommendation
Sharif Uddin Ahmed Rana
Advances in logistics, operations, and management science book series (2024), pp. 1-28
Closed Access
Sharif Uddin Ahmed Rana
Advances in logistics, operations, and management science book series (2024), pp. 1-28
Closed Access
Malicious Encrypted Network Traffic Detection Using Deep Auto-Encoder with a Custom Reconstruction Loss
A. Ramzi Bahlali, Abdelmalik Bachir, Abdelhakim Cheriet
2022 International Symposium on Networks, Computers and Communications (ISNCC) (2023)
Open Access | Times Cited: 1
A. Ramzi Bahlali, Abdelmalik Bachir, Abdelhakim Cheriet
2022 International Symposium on Networks, Computers and Communications (ISNCC) (2023)
Open Access | Times Cited: 1
Intrusion Detection for Marine Meteorological Sensor Network
Xin Su, Guifu Zhang, Minxue Zhang, et al.
(2022), pp. 190-196
Closed Access | Times Cited: 1
Xin Su, Guifu Zhang, Minxue Zhang, et al.
(2022), pp. 190-196
Closed Access | Times Cited: 1
Attention Mechanism Model Combined with Adversarial Learning for E-commerce User Behavior Classification and Personality Recommendation
Sharif Uddin Ahmed Rana
Qeios (2023)
Open Access
Sharif Uddin Ahmed Rana
Qeios (2023)
Open Access
Network Intrusion Detection Method Based on Stacked Contractive Auto-Encoder and Gated Convolution
Shuai Li, Shang Wang, Fangfang Dang, et al.
2022 IEEE 4th International Conference on Civil Aviation Safety and Information Technology (ICCASIT) (2023), pp. 159-163
Closed Access
Shuai Li, Shang Wang, Fangfang Dang, et al.
2022 IEEE 4th International Conference on Civil Aviation Safety and Information Technology (ICCASIT) (2023), pp. 159-163
Closed Access