
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
FCNN-SE: An Intrusion Detection Model Based on a Fusion CNN and Stacked Ensemble
Chen Chen, Yafei Song, Shaohua Yue, et al.
Applied Sciences (2022) Vol. 12, Iss. 17, pp. 8601-8601
Open Access | Times Cited: 21
Chen Chen, Yafei Song, Shaohua Yue, et al.
Applied Sciences (2022) Vol. 12, Iss. 17, pp. 8601-8601
Open Access | Times Cited: 21
Showing 21 citing articles:
Addressing the class imbalance problem in network intrusion detection systems using data resampling and deep learning
Ahmed M. Abdel–Khalek, Maggie Mashaly
The Journal of Supercomputing (2023) Vol. 79, Iss. 10, pp. 10611-10644
Open Access | Times Cited: 53
Ahmed M. Abdel–Khalek, Maggie Mashaly
The Journal of Supercomputing (2023) Vol. 79, Iss. 10, pp. 10611-10644
Open Access | Times Cited: 53
ResInceptNet-SA: A Network Traffic Intrusion Detection Model Fusing Feature Selection and Balanced Datasets
Guorui Liu, Tianlin Zhang, Hualin Dai, et al.
Applied Sciences (2025) Vol. 15, Iss. 2, pp. 956-956
Open Access | Times Cited: 1
Guorui Liu, Tianlin Zhang, Hualin Dai, et al.
Applied Sciences (2025) Vol. 15, Iss. 2, pp. 956-956
Open Access | Times Cited: 1
Enhanced Hybrid Deep Learning Models-Based Anomaly Detection Method for Two-Stage Binary and Multi-Class Classification of Attacks in Intrusion Detection Systems
Hesham M. Kamal, Maggie Mashaly
Algorithms (2025) Vol. 18, Iss. 2, pp. 69-69
Open Access | Times Cited: 1
Hesham M. Kamal, Maggie Mashaly
Algorithms (2025) Vol. 18, Iss. 2, pp. 69-69
Open Access | Times Cited: 1
A Novel Approach to Improve Software Defect Prediction Accuracy Using Machine Learning
Iqra Mehmood, Sidra Shahid, Hameed Hussain, et al.
IEEE Access (2023) Vol. 11, pp. 63579-63597
Open Access | Times Cited: 16
Iqra Mehmood, Sidra Shahid, Hameed Hussain, et al.
IEEE Access (2023) Vol. 11, pp. 63579-63597
Open Access | Times Cited: 16
Intrusion Detection Model Based on Improved Transformer
Yi Liu, Lanjian Wu
Applied Sciences (2023) Vol. 13, Iss. 10, pp. 6251-6251
Open Access | Times Cited: 15
Yi Liu, Lanjian Wu
Applied Sciences (2023) Vol. 13, Iss. 10, pp. 6251-6251
Open Access | Times Cited: 15
Advanced Hybrid Transformer-CNN Deep Learning Model for Effective Intrusion Detection Systems with Class Imbalance Mitigation Using Resampling Techniques
Hesham M. Kamal, Maggie Mashaly
Future Internet (2024) Vol. 16, Iss. 12, pp. 481-481
Open Access | Times Cited: 5
Hesham M. Kamal, Maggie Mashaly
Future Internet (2024) Vol. 16, Iss. 12, pp. 481-481
Open Access | Times Cited: 5
FPE–Transformer: A Feature Positional Encoding-Based Transformer Model for Attack Detection
Hande Çavşi Zaim, Esra YOLAÇAN
Applied Sciences (2025) Vol. 15, Iss. 3, pp. 1252-1252
Open Access
Hande Çavşi Zaim, Esra YOLAÇAN
Applied Sciences (2025) Vol. 15, Iss. 3, pp. 1252-1252
Open Access
Robust Intrusion Detection System Using an Improved Hybrid Deep Learning Model for Binary and Multi-Class Classification in IoT Networks
Hesham M. Kamal, Maggie Mashaly
Technologies (2025) Vol. 13, Iss. 3, pp. 102-102
Open Access
Hesham M. Kamal, Maggie Mashaly
Technologies (2025) Vol. 13, Iss. 3, pp. 102-102
Open Access
Research on Network Intrusion Detection Model Based on Hybrid Sampling and Deep Learning
Doudou Guo, Yufei Xie
Sensors (2025) Vol. 25, Iss. 5, pp. 1578-1578
Open Access
Doudou Guo, Yufei Xie
Sensors (2025) Vol. 25, Iss. 5, pp. 1578-1578
Open Access
Gazelle‐Dingo Optimization and Ensemble Classification: A Hybrid Approach for Intrusion Detection in Fog Computing
Aravind Karrothu, G.V. Sriramakrishnan, V. Ragavi
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 3
Closed Access
Aravind Karrothu, G.V. Sriramakrishnan, V. Ragavi
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 3
Closed Access
ALRN-RCS: Advanced Approach to Network Intrusion Detection Using Attention Long-Term Recurrent Networks and Chaotic Optimization
N. P. Ponnuviji, E. Nirmala, Mary Harin Fernandez F, et al.
IETE Journal of Research (2024) Vol. 70, Iss. 11, pp. 8006-8017
Closed Access | Times Cited: 1
N. P. Ponnuviji, E. Nirmala, Mary Harin Fernandez F, et al.
IETE Journal of Research (2024) Vol. 70, Iss. 11, pp. 8006-8017
Closed Access | Times Cited: 1
Application of GA-WELM Model Based on Stratified Cross-Validation in Intrusion Detection
Chen Chen, Xiangke Guo, Wei Zhang, et al.
Symmetry (2023) Vol. 15, Iss. 9, pp. 1719-1719
Open Access | Times Cited: 3
Chen Chen, Xiangke Guo, Wei Zhang, et al.
Symmetry (2023) Vol. 15, Iss. 9, pp. 1719-1719
Open Access | Times Cited: 3
Enhancing Multi-Class Intrusion Detection through Hybrid Auto Encoder-Deep Neural Network Classifiers: A Comprehensive Analysis of Class Imbalance Mitigation Strategies Using Data Resampling Techniques
Hesham M. Kamal, Maggie Mashaly
Research Square (Research Square) (2024)
Open Access
Hesham M. Kamal, Maggie Mashaly
Research Square (Research Square) (2024)
Open Access
Network Security Perception System Integrating Improved CNN Algorithm and Improved GRU Algorithm
Yu Huang, Ziyi Zhao, Chenwei Shi
IEEE Access (2024) Vol. 12, pp. 163805-163818
Open Access
Yu Huang, Ziyi Zhao, Chenwei Shi
IEEE Access (2024) Vol. 12, pp. 163805-163818
Open Access
Enhancing Intrusion Detection Systems with Dimensionality Reduction and Multi-Stacking Ensemble Techniques
Ali Mohammed Alsaffar, Mostafa Nouri-Baygi, Hamed M. Zolbanin
Algorithms (2024) Vol. 17, Iss. 12, pp. 550-550
Open Access
Ali Mohammed Alsaffar, Mostafa Nouri-Baygi, Hamed M. Zolbanin
Algorithms (2024) Vol. 17, Iss. 12, pp. 550-550
Open Access
Deep Attention Learning for Extreme Minority Class Intrusion Detection in Network Traffic
K Ghamya, K Prema, P.S. Senthil Kumar, et al.
(2024), pp. 1-9
Closed Access
K Ghamya, K Prema, P.S. Senthil Kumar, et al.
(2024), pp. 1-9
Closed Access
Computer network system security assessment method
Chen Chen, Gang Chen
(2022), pp. 333-336
Closed Access | Times Cited: 1
Chen Chen, Gang Chen
(2022), pp. 333-336
Closed Access | Times Cited: 1
Intrusion detection model based on GA-ELM
Chen Chen, Bo Yang, Xiaoyan Ye, et al.
(2022), pp. 142-146
Closed Access | Times Cited: 1
Chen Chen, Bo Yang, Xiaoyan Ye, et al.
(2022), pp. 142-146
Closed Access | Times Cited: 1
Hybrid Machine Learning-Based Approach for Anomaly Detection using Apache Spark
Hanane Chliah, Amal Battou, Maryem Ait El Hadj, et al.
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 4
Open Access
Hanane Chliah, Amal Battou, Maryem Ait El Hadj, et al.
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 4
Open Access
Intrusion detection model based on GA-BP
Chen Chen, Qiang Fan, Dejiang Wan, et al.
(2023) Vol. 23, pp. 62-62
Closed Access
Chen Chen, Qiang Fan, Dejiang Wan, et al.
(2023) Vol. 23, pp. 62-62
Closed Access
Intrusion Detection Model Based on Weighted Extreme Learning Machine
Chen Chen, Gang Wei, Fan Qiang, et al.
Advances in Social Science, Education and Humanities Research/Advances in social science, education and humanities research (2023), pp. 1115-1120
Closed Access
Chen Chen, Gang Wei, Fan Qiang, et al.
Advances in Social Science, Education and Humanities Research/Advances in social science, education and humanities research (2023), pp. 1115-1120
Closed Access