OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Threats on Machine Learning Technique by Data Poisoning Attack: A Survey
Ibrahim M. Ahmed, Manar Kashmoola
Communications in computer and information science (2021), pp. 586-600
Closed Access | Times Cited: 27

Showing 1-25 of 27 citing articles:

Bilinear Pooling With Poisoning Detection Module for Automatic Side Scan Sonar Data Analysis
Dawid Połap, Antoni Jaszcz, Natalia Wawrzyniak, et al.
IEEE Access (2023) Vol. 11, pp. 72477-72484
Open Access | Times Cited: 29

Physical Layer Security for 6G: Towards Achieving Intelligent Native Security at Layer-1
Israt Ara, Brian Kelley
IEEE Access (2024) Vol. 12, pp. 82800-82824
Open Access | Times Cited: 5

USB-GATE: USB-based GAN-augmented transformer reinforced defense framework for adversarial keystroke injection attacks
Anil Kumar Chillara, Paresh Saxena, Rajib Ranjan Maiti
International Journal of Information Security (2025) Vol. 24, Iss. 2
Closed Access

Poisoning QoS-aware cloud API recommender system with generative adversarial network attack
Zhen Chen, Taiyu Bao, Wenchao Qi, et al.
Expert Systems with Applications (2023) Vol. 238, pp. 121630-121630
Closed Access | Times Cited: 7

Fake Resume Attacks: Data Poisoning on Online Job Platforms
Michiharu Yamashita, Thanh Tran, Dongwon Lee
Proceedings of the ACM Web Conference 2022 (2024), pp. 1734-1745
Open Access | Times Cited: 2

Mitigating Label Flipping Attacks in Malicious URL Detectors Using Ensemble Trees
Ehsan Nowroozi, Nada Jadalla, Samaneh Ghelichkhani, et al.
IEEE Transactions on Network and Service Management (2024) Vol. 21, Iss. 6, pp. 6875-6884
Open Access | Times Cited: 2

Enhancing Privacy and Security in Large-Language Models: A Zero-Knowledge Proof Approach
Shridhar Singh
International Conference on Cyber Warfare and Security (2024) Vol. 19, Iss. 1, pp. 574-582
Open Access | Times Cited: 1

Impacting Robustness in Deep Learning-Based NIDS through Poisoning Attacks
Shahad Alahmed, Qutaiba Alasad, J.S. Yuan, et al.
Algorithms (2024) Vol. 17, Iss. 4, pp. 155-155
Open Access | Times Cited: 1

Sensitivity of Machine Learning Approaches to Fake and Untrusted Data in Healthcare Domain
Fiammetta Marulli, S. Marrone, Laura Verde
Journal of Sensor and Actuator Networks (2022) Vol. 11, Iss. 2, pp. 21-21
Open Access | Times Cited: 7

AST-SafeSec: Adaptive Stress Testing for Safety and Security Co-Analysis of Cyber-Physical Systems
Nektaria Kaloudi, Jingyue Li
IEEE Transactions on Information Forensics and Security (2023) Vol. 18, pp. 5567-5579
Open Access | Times Cited: 3

Investigated Insider and Outsider Attacks on the Federated Learning Systems
Ibrahim M. Ahmed, Manar Kashmoola
(2022), pp. 438-443
Closed Access | Times Cited: 4

Artificial Intelligence Working to Secure Small Enterprises
Kai Rasmus
(2024), pp. 165-188
Closed Access

Enhancing Algorithmic Resilience Against Data Poisoning Using CNN
J. Jayapradha, Lakshmi Vadhanie, Yukta Kulkarni, et al.
Advances in IT standards and standardization research (AISSR) book series/Advances in IT standards and standardization research series (2024), pp. 131-157
Closed Access

Improved Collaborative Recommender systems for Healthcare application
Adari Ramesh, C K Subbaraya, G K Ravi Kumar Principal
(2024), pp. 1-7
Closed Access

Invisible Threats in the Data: A Study on Data Poisoning Attacks in Deep Generative Models
Zhijia Yang, Jie Zhang, Wei Wang, et al.
Applied Sciences (2024) Vol. 14, Iss. 19, pp. 8742-8742
Open Access

Securing Machine Learning Against Data Poisoning Attacks
Nasser Allheeib
International Journal of Data Warehousing and Mining (2024) Vol. 20, Iss. 1, pp. 1-21
Open Access

A Compound Data Poisoning Technique with Significant Adversarial Effects on Transformer-based Sentiment Classification Tasks
Edmon Begoli, Maria Mahbub, Linsey Passarella, et al.
Journal of Data and Information Quality (2024) Vol. 16, Iss. 4, pp. 1-15
Open Access

An Investigation of Recent Backdoor Attacks and Defenses in Federated Learning
Qiuxian Chen, Yizheng Tao
(2023), pp. 262-269
Closed Access | Times Cited: 1

Detecting Data Poisoning Attacks using Federated Learning with Deep Neural Networks: An Empirical Study
Hatim Alsuwat
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 11
Open Access | Times Cited: 1

Data Poisoning Attacks over Diabetic Retinopathy Images Classification
Fabio Martinelli, Francesco Mercaldo, Marcello Di Giammarco, et al.
2021 IEEE International Conference on Big Data (Big Data) (2023), pp. 3698-3703
Closed Access | Times Cited: 1

Homomorphic encryption based privacy-aware intelligent forwarding mechanism for NDN-VANET
Guo Xian, Baobao Wang, Yongbo Jiang, et al.
Computer Science and Information Systems (2022) Vol. 20, Iss. 1, pp. 1-24
Open Access | Times Cited: 2

A Compound Data Poisoning Technique with Significant Adversarial Effects on Transformer-based Text Classification Tasks
Edmon Begoli, Maria Mahbub, Sudarshan Sriniva, et al.
Research Square (Research Square) (2023)
Open Access

Investigation of Layer-wise Feature Analysis for Backdoor Attacks Detection in Deep Neural Networks
S Preetha, M K Nalini, Bodireddy Mahalakshmi, et al.
IJARCCE (2023) Vol. 12, Iss. 8
Open Access

Page 1 - Next Page

Scroll to top