
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Deep Learning Model for Network Intrusion Detection with Imbalanced Data
Yanfang Fu, Yishuai Du, Zijian Cao, et al.
Electronics (2022) Vol. 11, Iss. 6, pp. 898-898
Open Access | Times Cited: 151
Yanfang Fu, Yishuai Du, Zijian Cao, et al.
Electronics (2022) Vol. 11, Iss. 6, pp. 898-898
Open Access | Times Cited: 151
Showing 1-25 of 151 citing articles:
IoT Intrusion Detection Using Machine Learning with a Novel High Performing Feature Selection Method
Khalid Albulayhi, Qasem Abu Al‐Haija, Suliman A. Alsuhibany, et al.
Applied Sciences (2022) Vol. 12, Iss. 10, pp. 5015-5015
Open Access | Times Cited: 120
Khalid Albulayhi, Qasem Abu Al‐Haija, Suliman A. Alsuhibany, et al.
Applied Sciences (2022) Vol. 12, Iss. 10, pp. 5015-5015
Open Access | Times Cited: 120
An optimized CNN-based intrusion detection system for reducing risks in smart farming
Amir El-Ghamry, Ashraf Darwish, Aboul Ella Hassanien
Internet of Things (2023) Vol. 22, pp. 100709-100709
Closed Access | Times Cited: 77
Amir El-Ghamry, Ashraf Darwish, Aboul Ella Hassanien
Internet of Things (2023) Vol. 22, pp. 100709-100709
Closed Access | Times Cited: 77
NIDS-CNNLSTM: Network Intrusion Detection Classification Model Based on Deep Learning
Jiawei Du, Kai Yang, Yanjing Hu, et al.
IEEE Access (2023) Vol. 11, pp. 24808-24821
Open Access | Times Cited: 51
Jiawei Du, Kai Yang, Yanjing Hu, et al.
IEEE Access (2023) Vol. 11, pp. 24808-24821
Open Access | Times Cited: 51
An Imbalanced Generative Adversarial Network-Based Approach for Network Intrusion Detection in an Imbalanced Dataset
Yamarthi Narasimha Rao, Kunda Suresh Babu
Sensors (2023) Vol. 23, Iss. 1, pp. 550-550
Open Access | Times Cited: 44
Yamarthi Narasimha Rao, Kunda Suresh Babu
Sensors (2023) Vol. 23, Iss. 1, pp. 550-550
Open Access | Times Cited: 44
Future of generative adversarial networks (GAN) for anomaly detection in network security: A review
Willone Lim, Kelvin S. C. Yong, Lau Bee Theng, et al.
Computers & Security (2024) Vol. 139, pp. 103733-103733
Open Access | Times Cited: 40
Willone Lim, Kelvin S. C. Yong, Lau Bee Theng, et al.
Computers & Security (2024) Vol. 139, pp. 103733-103733
Open Access | Times Cited: 40
A Survey of Deep Learning Technologies for Intrusion Detection in Internet of Things
Han Liao, Mohd Zamri Murah, Mohammad Kamrul Hasan, et al.
IEEE Access (2024) Vol. 12, pp. 4745-4761
Open Access | Times Cited: 19
Han Liao, Mohd Zamri Murah, Mohammad Kamrul Hasan, et al.
IEEE Access (2024) Vol. 12, pp. 4745-4761
Open Access | Times Cited: 19
Machine Learning-Based Intrusion Detection System: An Experimental Comparison
Imran Hidayat, Muhammad Zulfiqar Ali, Arshad Ali
Journal of Computational and Cognitive Engineering (2022) Vol. 2, Iss. 2, pp. 88-97
Open Access | Times Cited: 53
Imran Hidayat, Muhammad Zulfiqar Ali, Arshad Ali
Journal of Computational and Cognitive Engineering (2022) Vol. 2, Iss. 2, pp. 88-97
Open Access | Times Cited: 53
A lightweight intrusion detection method for IoT based on deep learning and dynamic quantization
Zhendong Wang, Hui Chen, Shuxin Yang, et al.
PeerJ Computer Science (2023) Vol. 9, pp. e1569-e1569
Open Access | Times Cited: 33
Zhendong Wang, Hui Chen, Shuxin Yang, et al.
PeerJ Computer Science (2023) Vol. 9, pp. e1569-e1569
Open Access | Times Cited: 33
A comprehensive review on deep learning algorithms: Security and privacy issues
Muhammad Tayyab, Mohsen Marjani, N. Z. Jhanjhi, et al.
Computers & Security (2023) Vol. 131, pp. 103297-103297
Closed Access | Times Cited: 30
Muhammad Tayyab, Mohsen Marjani, N. Z. Jhanjhi, et al.
Computers & Security (2023) Vol. 131, pp. 103297-103297
Closed Access | Times Cited: 30
Network intrusion detection based on the temporal convolutional model
Ivandro Ortet Lopes, Deqing Zou, Ihsan H. Abdulqadder, et al.
Computers & Security (2023) Vol. 135, pp. 103465-103465
Closed Access | Times Cited: 26
Ivandro Ortet Lopes, Deqing Zou, Ihsan H. Abdulqadder, et al.
Computers & Security (2023) Vol. 135, pp. 103465-103465
Closed Access | Times Cited: 26
Intrusion Detection System Based on One-Class Support Vector Machine and Gaussian Mixture Model
Chao Wang, Yunxiao Sun, Sicai Lv, et al.
Electronics (2023) Vol. 12, Iss. 4, pp. 930-930
Open Access | Times Cited: 23
Chao Wang, Yunxiao Sun, Sicai Lv, et al.
Electronics (2023) Vol. 12, Iss. 4, pp. 930-930
Open Access | Times Cited: 23
BLoCNet: a hybrid, dataset-independent intrusion detection system using deep learning
Brandon Bowen, Anitha Chennamaneni, Ana Goulart, et al.
International Journal of Information Security (2023) Vol. 22, Iss. 4, pp. 893-917
Closed Access | Times Cited: 23
Brandon Bowen, Anitha Chennamaneni, Ana Goulart, et al.
International Journal of Information Security (2023) Vol. 22, Iss. 4, pp. 893-917
Closed Access | Times Cited: 23
Enhanced Intrusion Detection with LSTM-Based Model, Feature Selection, and SMOTE for Imbalanced Data
Hussein Ridha Sayegh, Dong Wang, Ali Mansour Al-madani
Applied Sciences (2024) Vol. 14, Iss. 2, pp. 479-479
Open Access | Times Cited: 14
Hussein Ridha Sayegh, Dong Wang, Ali Mansour Al-madani
Applied Sciences (2024) Vol. 14, Iss. 2, pp. 479-479
Open Access | Times Cited: 14
Securing tomorrow: a comprehensive survey on the synergy of Artificial Intelligence and information security
Ehtesham Hashmi, Muhammad Mudassar Yamin, Sule Yildirim Yayilgan
AI and Ethics (2024)
Open Access | Times Cited: 12
Ehtesham Hashmi, Muhammad Mudassar Yamin, Sule Yildirim Yayilgan
AI and Ethics (2024)
Open Access | Times Cited: 12
Network intrusion detection: An optimized deep learning approach using big data analytics
D. Suja Mary, L. Jaya Singh Dhas, A. Deepa, et al.
Expert Systems with Applications (2024) Vol. 251, pp. 123919-123919
Closed Access | Times Cited: 9
D. Suja Mary, L. Jaya Singh Dhas, A. Deepa, et al.
Expert Systems with Applications (2024) Vol. 251, pp. 123919-123919
Closed Access | Times Cited: 9
A Deep Learning-Based Approach for the Detection of Various Internet of Things Intrusion Attacks Through Optical Networks
Nouman Imtiaz, Abdul Wahid, Syed Zain Ul Abideen, et al.
Photonics (2025) Vol. 12, Iss. 1, pp. 35-35
Open Access | Times Cited: 1
Nouman Imtiaz, Abdul Wahid, Syed Zain Ul Abideen, et al.
Photonics (2025) Vol. 12, Iss. 1, pp. 35-35
Open Access | Times Cited: 1
Enhanced Hybrid Deep Learning Models-Based Anomaly Detection Method for Two-Stage Binary and Multi-Class Classification of Attacks in Intrusion Detection Systems
Hesham M. Kamal, Maggie Mashaly
Algorithms (2025) Vol. 18, Iss. 2, pp. 69-69
Open Access | Times Cited: 1
Hesham M. Kamal, Maggie Mashaly
Algorithms (2025) Vol. 18, Iss. 2, pp. 69-69
Open Access | Times Cited: 1
Machine Learning-Based Adaptive Synthetic Sampling Technique for Intrusion Detection
Mohammed Zakariah, Salman A. AlQahtani, Mabrook Al‐Rakhami
Applied Sciences (2023) Vol. 13, Iss. 11, pp. 6504-6504
Open Access | Times Cited: 22
Mohammed Zakariah, Salman A. AlQahtani, Mabrook Al‐Rakhami
Applied Sciences (2023) Vol. 13, Iss. 11, pp. 6504-6504
Open Access | Times Cited: 22
APELID: Enhancing real-time intrusion detection with augmented WGAN and parallel ensemble learning
Hoang V. Vo, Hanh P. Du, Hoa N. Nguyen
Computers & Security (2023) Vol. 136, pp. 103567-103567
Closed Access | Times Cited: 19
Hoang V. Vo, Hanh P. Du, Hoa N. Nguyen
Computers & Security (2023) Vol. 136, pp. 103567-103567
Closed Access | Times Cited: 19
Deep learning-based network anomaly detection and classification in an imbalanced cloud environment
Amol D. Vibhute, Vikram Nakum
Procedia Computer Science (2024) Vol. 232, pp. 1636-1645
Open Access | Times Cited: 8
Amol D. Vibhute, Vikram Nakum
Procedia Computer Science (2024) Vol. 232, pp. 1636-1645
Open Access | Times Cited: 8
Ensemble technique of intrusion detection for IoT-edge platform
Abdulaziz Aldaej, Imdad Ullah, Tariq Ahamed Ahanger, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 7
Abdulaziz Aldaej, Imdad Ullah, Tariq Ahamed Ahanger, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 7
Anomaly-Based Intrusion Detection System using One-Dimensional Convolutional Neural Network
Ahmed Tamer Assy, Yahia Mostafa, Ahmed Abd El-khaleq, et al.
Procedia Computer Science (2023) Vol. 220, pp. 78-85
Open Access | Times Cited: 13
Ahmed Tamer Assy, Yahia Mostafa, Ahmed Abd El-khaleq, et al.
Procedia Computer Science (2023) Vol. 220, pp. 78-85
Open Access | Times Cited: 13
An LSTM ‐based novel near‐real‐time multiclass network intrusion detection system for complex cloud environments
Amol D. Vibhute, Minhaj Khan, Anuradha Kanade, et al.
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 11
Closed Access | Times Cited: 5
Amol D. Vibhute, Minhaj Khan, Anuradha Kanade, et al.
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 11
Closed Access | Times Cited: 5
Automated Network Intrusion Detection for Internet of Things: Security Enhancements
Louai A. Maghrabi
IEEE Access (2024) Vol. 12, pp. 30839-30851
Open Access | Times Cited: 5
Louai A. Maghrabi
IEEE Access (2024) Vol. 12, pp. 30839-30851
Open Access | Times Cited: 5
Multi-task learning for IoT traffic classification: A comparative analysis of deep autoencoders
Huiyao Dong, Igor Kotenko
Future Generation Computer Systems (2024) Vol. 158, pp. 242-254
Closed Access | Times Cited: 5
Huiyao Dong, Igor Kotenko
Future Generation Computer Systems (2024) Vol. 158, pp. 242-254
Closed Access | Times Cited: 5