
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Adversarial machine learning :
Apostol Vassilev, Alina Oprea, Alie Jean Fordyce, et al.
(2024)
Open Access | Times Cited: 43
Apostol Vassilev, Alina Oprea, Alie Jean Fordyce, et al.
(2024)
Open Access | Times Cited: 43
Showing 26-50 of 43 citing articles:
Advancing Radar Cybersecurity: Defending Against Adversarial Attacks in SAR Ship Recognition Using Explainable AI and Ensemble Learning
Amir Hosein Oveis, Giulio Meucci, Francesco Mancuso, et al.
(2024) Vol. 9, pp. 1-7
Closed Access | Times Cited: 1
Amir Hosein Oveis, Giulio Meucci, Francesco Mancuso, et al.
(2024) Vol. 9, pp. 1-7
Closed Access | Times Cited: 1
Fast labeling pipeline approach for a huge aerial sensed dataset
A. M. Fedulin, Natalia Voloshina
Scientific and technical journal of information technologies mechanics and optics (2024) Vol. 24, Iss. 2, pp. 190-197
Open Access
A. M. Fedulin, Natalia Voloshina
Scientific and technical journal of information technologies mechanics and optics (2024) Vol. 24, Iss. 2, pp. 190-197
Open Access
Machine Learning with Confidential Computing: A Systematization of Knowledge
Fan Mo, Zahra Tarkhani, Hamed Haddadi
ACM Computing Surveys (2024) Vol. 56, Iss. 11, pp. 1-40
Open Access
Fan Mo, Zahra Tarkhani, Hamed Haddadi
ACM Computing Surveys (2024) Vol. 56, Iss. 11, pp. 1-40
Open Access
Risk considerations for the department of defense's fielding of large language models
Misty Blowers, Santos Salinas, S.M. Bailey
(2024)
Closed Access
Misty Blowers, Santos Salinas, S.M. Bailey
(2024)
Closed Access
Exploiting explainability for reinforcement learning model assurance
Alexander Tapley, Joseph D. Weissman
(2024)
Closed Access
Alexander Tapley, Joseph D. Weissman
(2024)
Closed Access
Optimizing Large Language Model Scaling with Micro Batch Pipeline and Inference Parallelism
Doudou Quan, R. Wang, Zhu Lian, et al.
Research Square (Research Square) (2024)
Open Access
Doudou Quan, R. Wang, Zhu Lian, et al.
Research Square (Research Square) (2024)
Open Access
Dumb Devices/Smart Adversaries: Real Threats in Critical Infrastructure
Adam Sewall
Signals and communication technology (2024), pp. 85-111
Closed Access
Adam Sewall
Signals and communication technology (2024), pp. 85-111
Closed Access
Assessing Reasoning Capabilities of Commercial LLMs: A Comparative Study of Inductive and Deductive Tasks
Rowena Witali, Quentin Latrese, Giles Ravenscroft
Authorea (Authorea) (2024)
Open Access
Rowena Witali, Quentin Latrese, Giles Ravenscroft
Authorea (Authorea) (2024)
Open Access
Mapping Cyber Attacks on the Internet of Medical Things: A Taxonomic Review
Venkatesh Kondeti, Hayretdin Bahşi
(2024), pp. 84-91
Closed Access
Venkatesh Kondeti, Hayretdin Bahşi
(2024), pp. 84-91
Closed Access
Vehigan:Generative Adversarial Networks for Adversarially Robust V2X Misbehavior Detection Systems
Md Hasan Shahriar, Mohammad Raashid Ansari, Jean-Philippe Monteuuis, et al.
(2024), pp. 1294-1305
Closed Access
Md Hasan Shahriar, Mohammad Raashid Ansari, Jean-Philippe Monteuuis, et al.
(2024), pp. 1294-1305
Closed Access
Machine Learning Security: Threat Model, Attacks, and Challenges
Carson Koball, Yong Wang, Bhaskar Prasad Rimal, et al.
Computer (2024) Vol. 57, Iss. 10, pp. 26-35
Closed Access
Carson Koball, Yong Wang, Bhaskar Prasad Rimal, et al.
Computer (2024) Vol. 57, Iss. 10, pp. 26-35
Closed Access
Practical evasion attack against neural network-based macro-malware detection method
Mamoru Mimura, Kazuyuki Kurashina
Cluster Computing (2024) Vol. 28, Iss. 2
Open Access
Mamoru Mimura, Kazuyuki Kurashina
Cluster Computing (2024) Vol. 28, Iss. 2
Open Access
Beyond the Black Box: XAI Strategies for Safeguarding Critical Infrastructure
Arjun Singh, Sarthak Kathait, Anshi Kothari, et al.
(2024), pp. 129-154
Closed Access
Arjun Singh, Sarthak Kathait, Anshi Kothari, et al.
(2024), pp. 129-154
Closed Access
Regulating the Risks Associated with Malicious Use of Artificial Intelligence in the US, EU and China
Darya Bazarkina, Evgeny Pashentsev, Ekaterina A. Mikhalevich
Contemporary Europe (2024), Iss. 6 (127), pp. 156-167
Open Access
Darya Bazarkina, Evgeny Pashentsev, Ekaterina A. Mikhalevich
Contemporary Europe (2024), Iss. 6 (127), pp. 156-167
Open Access
Invited Paper: Security and Privacy in Large Language and Foundation Models: A Survey on GenAI Attacks
Giuseppe F. Italiano, Alessio Martino, Giorgio Piccardo
Lecture notes in computer science (2024), pp. 1-17
Closed Access
Giuseppe F. Italiano, Alessio Martino, Giorgio Piccardo
Lecture notes in computer science (2024), pp. 1-17
Closed Access
Measuring the risk of evasion and poisoning attacks on a traffic sign recognition system
Vita Santa Barletta, Christian Catalano, Mario Colucci, et al.
(2024), pp. 138-143
Closed Access
Vita Santa Barletta, Christian Catalano, Mario Colucci, et al.
(2024), pp. 138-143
Closed Access
Machine Learning-Based Malware Detection in a Production Setting
Sven Krasser, J. M. Spurlock, Marian Radu, et al.
Advances in information security (2024), pp. 119-142
Closed Access
Sven Krasser, J. M. Spurlock, Marian Radu, et al.
Advances in information security (2024), pp. 119-142
Closed Access