OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Intrusion detection for Industrial Internet of Things based on deep learning
Yaoyao Lu, Senchun Chai, Yuhan Suo, et al.
Neurocomputing (2023) Vol. 564, pp. 126886-126886
Closed Access | Times Cited: 18

Showing 18 citing articles:

Enhanced Fault Diagnosis in IoT: Uniting Data Fusion with Deep Multi-Scale Fusion Neural Network
Dinesh Kumar Reddy Basani, Basava Ramanjaneyulu Gudivaka, Rajya Lakshmi Gudivaka, et al.
Internet of Things (2024), pp. 101361-101361
Closed Access | Times Cited: 7

DTKD-IDS: A Dual-Teacher Knowledge Distillation Intrusion Detection Model for the Industrial Internet of Things
Biao Xie, Zhendong Wang, Zhiyuan Zeng, et al.
Ad Hoc Networks (2025), pp. 103869-103869
Closed Access

Anomaly classification in IIoT edge devices
Danny Múnera, Diana P. Tobón, Martha Rodríguez
Revista Facultad de Ingeniería Universidad de Antioquia (2025)
Open Access

Improvement of intrusion detection in IoT Networks using a hybrid Machine and Metaheuristic Algorithm
Parisa Rahmani, Mohamad Arefi, Seyyed MohamadSaber Seyyed Shojae, et al.
(2024)
Open Access | Times Cited: 2

GSOOA-1DDRSN: Network traffic anomaly detection based on deep residual shrinkage networks
Fengqin Zuo, Damin Zhang, Lun Li, et al.
Heliyon (2024) Vol. 10, Iss. 11, pp. e32087-e32087
Open Access | Times Cited: 2

A hierarchical hybrid intrusion detection model for industrial internet of things
Zhendong Wang, Xin Yang, Zhiyuan Zeng, et al.
Peer-to-Peer Networking and Applications (2024) Vol. 17, Iss. 5, pp. 3385-3407
Closed Access | Times Cited: 2

Identifying Local Useful Information for Attribute Graph Anomaly Detection
Penghui Xi, Debo Cheng, Guangquan Lu, et al.
Neurocomputing (2024), pp. 128900-128900
Closed Access | Times Cited: 2

A deep residual SConv1D-attention intrusion detection model for industrial Internet of Things
Zhendong Wang, Biao Xie, Shuxin Yang, et al.
Cluster Computing (2024) Vol. 28, Iss. 2
Closed Access | Times Cited: 1

Leveraging Deep Learning for Intrusion Detection in Industrial IoT Landscapes

Computer Science Engineering and Technology (2024) Vol. 2, Iss. 3, pp. 1-8
Closed Access

Enhanced Deep Learning for IIoT Threat Intelligence: Revealing Advanced Persistent Threat Attack Patterns
M. K. Vishnu Priya, H. Anila Glory, V. S. Shankar Sriram
Communications in computer and information science (2024), pp. 201-217
Closed Access

ENS-RFMC: An Encrypted Network Traffic Sampling Method Based on Rule-Based Feature Extraction and Multi-hierarchical Clustering for Intrusion Detection
Liangchen Chen, Gao Shu, Zixuan Wei, et al.
Lecture notes in computer science (2024), pp. 78-92
Closed Access

Enhancing Intrusion Detection Systems with Dimensionality Reduction and Multi-Stacking Ensemble Techniques
Ali Mohammed Alsaffar, Mostafa Nouri-Baygi, Hamed M. Zolbanin
Algorithms (2024) Vol. 17, Iss. 12, pp. 550-550
Open Access

Industrial network intrusion detection in open-set scenarios
Wei Yu, Zhixiang Chen, Hui Wang, et al.
International Journal of Information Security (2024) Vol. 24, Iss. 1
Closed Access

Enhancing Industrial-IoT Cybersecurity Through Generative Models and Convolutional Neural Networks
Karima Hassini, Mohamed Lazaar
Lecture notes in networks and systems (2024), pp. 543-558
Closed Access

Attention-Based Hybrid Deep Learning Model for Intrusion Detection in IIoT Networks
Safi Ullah, Wadii Boulila, Anis Koubâa, et al.
Procedia Computer Science (2024) Vol. 246, pp. 3323-3332
Open Access

Refined Trademark Sticker Detection Method Using Minimum Pooling Features *
Junchu Huang, Yan Song
TENCON 2021 - 2021 IEEE Region 10 Conference (TENCON) (2024), pp. 265-268
Closed Access

IP-MCCLSTM: A Network Intrusion Detection Model Based on IP Filtering
Feng Qin, Lin Zhang, Bing Liang
2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP) (2023) Vol. 4, pp. 1-6
Closed Access

HIDG-based PSO Algorithm: Suspicious Sensor Selection for Power Grid Monitoring System Under Data Integrity Attack
Pandeng Li, Zhihong Liang, Yiwei Yang, et al.
2022 4th International Conference on Electrical Engineering and Control Technologies (CEECT) (2023), pp. 385-390
Closed Access

Page 1

Scroll to top