
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks
Hassan Khazane, Mohammed Ridouani, Fatima Salahdine, et al.
Future Internet (2024) Vol. 16, Iss. 1, pp. 32-32
Open Access | Times Cited: 20
Hassan Khazane, Mohammed Ridouani, Fatima Salahdine, et al.
Future Internet (2024) Vol. 16, Iss. 1, pp. 32-32
Open Access | Times Cited: 20
Showing 20 citing articles:
Machine Learning and Deep Learning Techniques for Internet of Things Network Anomaly Detection—Current Research Trends
Saida Hafsa Rafique, Amira Mahamat Abdallah, Nura Shifa Musa, et al.
Sensors (2024) Vol. 24, Iss. 6, pp. 1968-1968
Open Access | Times Cited: 20
Saida Hafsa Rafique, Amira Mahamat Abdallah, Nura Shifa Musa, et al.
Sensors (2024) Vol. 24, Iss. 6, pp. 1968-1968
Open Access | Times Cited: 20
Combining Edge Computing-Assisted Internet of Things Security with Artificial Intelligence: Applications, Challenges, and Opportunities
Dulana Rupanetti, Naima Kaabouch
Applied Sciences (2024) Vol. 14, Iss. 16, pp. 7104-7104
Open Access | Times Cited: 11
Dulana Rupanetti, Naima Kaabouch
Applied Sciences (2024) Vol. 14, Iss. 16, pp. 7104-7104
Open Access | Times Cited: 11
Effective Feature Engineering Framework for Securing MQTT Protocol in IoT Environments
Abdulelah Al Hanif, Mohammad Ilyas
Sensors (2024) Vol. 24, Iss. 6, pp. 1782-1782
Open Access | Times Cited: 5
Abdulelah Al Hanif, Mohammad Ilyas
Sensors (2024) Vol. 24, Iss. 6, pp. 1782-1782
Open Access | Times Cited: 5
Adversarial Attacks in Machine Learning: Key Insights and Defense Approaches
Yahya Layth Khaleel, Mustafa Abdulfattah Habeeb, Hussein Alnabulsi
Applied Data Science and Analysis (2024) Vol. 2024, pp. 121-147
Closed Access | Times Cited: 5
Yahya Layth Khaleel, Mustafa Abdulfattah Habeeb, Hussein Alnabulsi
Applied Data Science and Analysis (2024) Vol. 2024, pp. 121-147
Closed Access | Times Cited: 5
Security Considerations in Generative AI for Web Applications
Siva Raja Sindiramutty, Krishna Raj V. Prabagaran, N. Z. Jhanjhi, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 281-332
Closed Access | Times Cited: 4
Siva Raja Sindiramutty, Krishna Raj V. Prabagaran, N. Z. Jhanjhi, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 281-332
Closed Access | Times Cited: 4
A two-tier optimization strategy for feature selection in robust adversarial attack mitigation on internet of things network security
K. Sai Prasad, P. Udayakumar, E. Laxmi Lydia, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
K. Sai Prasad, P. Udayakumar, E. Laxmi Lydia, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Enhancing Security Against Adversarial Attacks Using Robust Machine Learning
Himanshu Tripathi, Chandra Kishor Pandey
International Journal of Advanced Engineering and Nano Technology (2025) Vol. 12, Iss. 1, pp. 1-4
Closed Access
Himanshu Tripathi, Chandra Kishor Pandey
International Journal of Advanced Engineering and Nano Technology (2025) Vol. 12, Iss. 1, pp. 1-4
Closed Access
Future Trends in AI Security
Siva Raja Sindiramutty, N. Z. Jhanjhi, Navid Ali Khan
Advances in information security, privacy, and ethics book series (2025), pp. 229-262
Closed Access
Siva Raja Sindiramutty, N. Z. Jhanjhi, Navid Ali Khan
Advances in information security, privacy, and ethics book series (2025), pp. 229-262
Closed Access
Comprehensive review on machine learning and deep learning techniques for malware detection in android and IoT devices
Wesam Almobaideen, Orieb Abu Alghanam, Muhammad Abdullah, et al.
International Journal of Information Security (2025) Vol. 24, Iss. 3
Closed Access
Wesam Almobaideen, Orieb Abu Alghanam, Muhammad Abdullah, et al.
International Journal of Information Security (2025) Vol. 24, Iss. 3
Closed Access
An Adversarial Training Approach for Defending Against Object Misclassification in Smart Vehicles
Bennett Akpomedaye, Atef Shalan, Lei Chen, et al.
Communications in computer and information science (2025), pp. 421-435
Closed Access
Bennett Akpomedaye, Atef Shalan, Lei Chen, et al.
Communications in computer and information science (2025), pp. 421-435
Closed Access
IMTIBOT: An Intelligent Mitigation Technique for IoT Botnets
Umang Garg, Santosh Kumar, Aniket Mahanti
Future Internet (2024) Vol. 16, Iss. 6, pp. 212-212
Open Access | Times Cited: 2
Umang Garg, Santosh Kumar, Aniket Mahanti
Future Internet (2024) Vol. 16, Iss. 6, pp. 212-212
Open Access | Times Cited: 2
Securing the Metaverse: A Deep Reinforcement Learning and Generative Adversarial Network Approach to Intrusion Detection
Tarek Ali, Mohammed Al-Khalidi, Rabab Al-Zaidi, et al.
2022 IEEE International Conference on Communications Workshops (ICC Workshops) (2024), pp. 263-268
Closed Access | Times Cited: 2
Tarek Ali, Mohammed Al-Khalidi, Rabab Al-Zaidi, et al.
2022 IEEE International Conference on Communications Workshops (ICC Workshops) (2024), pp. 263-268
Closed Access | Times Cited: 2
A contrastive learning approach for enhanced robustness for strengthening federated intelligence in internet of visual things
Ibrahim Alrashdi, Karam M. Sallam, Ali Alqazzaz, et al.
Internet of Things (2024) Vol. 26, pp. 101206-101206
Closed Access | Times Cited: 1
Ibrahim Alrashdi, Karam M. Sallam, Ali Alqazzaz, et al.
Internet of Things (2024) Vol. 26, pp. 101206-101206
Closed Access | Times Cited: 1
Detecting Unusual Repetitive Patterns of Behavior Indicative of a Loop-Based Attack in IoT
Asmaa Munshi
Sensors (2024) Vol. 24, Iss. 23, pp. 7534-7534
Open Access | Times Cited: 1
Asmaa Munshi
Sensors (2024) Vol. 24, Iss. 23, pp. 7534-7534
Open Access | Times Cited: 1
A Comprehensive Survey on Generative AI Solutions in IoT Security
Juan Luis López Delgado, Juan Antonio López Ramos
Electronics (2024) Vol. 13, Iss. 24, pp. 4965-4965
Open Access | Times Cited: 1
Juan Luis López Delgado, Juan Antonio López Ramos
Electronics (2024) Vol. 13, Iss. 24, pp. 4965-4965
Open Access | Times Cited: 1
Privacy in the Machine Learning: A Study on User Profiling and Targeted Advertising on LinkedIn
Eric UWAYEZU
(2024)
Closed Access
Eric UWAYEZU
(2024)
Closed Access
TSSAN: Time-Space Separable Attention Network for Intrusion Detection
Rui Xu, Qi Zhang, Yunjie Zhang
IEEE Access (2024) Vol. 12, pp. 98734-98749
Open Access
Rui Xu, Qi Zhang, Yunjie Zhang
IEEE Access (2024) Vol. 12, pp. 98734-98749
Open Access
Real-Time Environmental Monitoring and Prediction in IoT Networks With Graph Neural Networks
Vipashi Kansal, Layth Hussein, Álvaro Vargas-Chavarrea, et al.
(2024), pp. 1628-1633
Closed Access
Vipashi Kansal, Layth Hussein, Álvaro Vargas-Chavarrea, et al.
(2024), pp. 1628-1633
Closed Access
Evading IoT Intrusion Detection Systems with GAN
Mariama Mbow, Rodrigo Román, Takeshi Takahashi, et al.
(2024), pp. 48-55
Closed Access
Mariama Mbow, Rodrigo Román, Takeshi Takahashi, et al.
(2024), pp. 48-55
Closed Access
Pragmatic Study of Botnet Attack Detection In An IoT Environment
Rajasree Vennapureddy, Srinivasulu Tadisetty
E3S Web of Conferences (2024) Vol. 591, pp. 09012-09012
Open Access
Rajasree Vennapureddy, Srinivasulu Tadisetty
E3S Web of Conferences (2024) Vol. 591, pp. 09012-09012
Open Access