OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Potential cyber threats of adversarial attacks on autonomous driving models
Eldar Boltachev
Journal of Computer Virology and Hacking Techniques (2023) Vol. 20, Iss. 3, pp. 363-373
Closed Access | Times Cited: 8

Showing 8 citing articles:

Next gen cybersecurity paradigm towards artificial general intelligence: Russian market challenges and future global technological trends
Е. В. Плешакова, Aleksey Osipov, Sergey Gataullin, et al.
Journal of Computer Virology and Hacking Techniques (2024) Vol. 20, Iss. 3, pp. 429-440
Closed Access | Times Cited: 21

Machine learning methods for the industrial robotic systems security
Dmitry Tsapin, K. V. Pitelinskiy, S. V. Suvorov, et al.
Journal of Computer Virology and Hacking Techniques (2023) Vol. 20, Iss. 3, pp. 397-414
Closed Access | Times Cited: 12

Road Type Classification of Driving Data Using Neural Networks
Dávid Tollner, Máté Zöldy
Computers (2025) Vol. 14, Iss. 2, pp. 70-70
Open Access

Machine Learning Methods Based on Geophysical Monitoring Data in Low Time Delay Mode for Drilling Optimization
Aleksey Osipov, Екатерина Плешакова, Artem Bykov, et al.
IEEE Access (2023) Vol. 11, pp. 60349-60364
Open Access | Times Cited: 12

Machine learning methods for speech emotion recognition on telecommunication systems
Aleksey Osipov, Е. В. Плешакова, Yang Liu, et al.
Journal of Computer Virology and Hacking Techniques (2023) Vol. 20, Iss. 3, pp. 415-428
Closed Access | Times Cited: 10

DEFENSE ARTIFICIAL NEURAL NETWORKS FROM ADVERSARIAL ATTACKS BY USING DEEP LEARNING CLASSIFICATION TECHNIQUES
Kanika Bansal
International Research Journal of Modernization in Engineering Technology and Science (2024)
Open Access

Autonomous Vehicle Sensor Network Security Framework Using Anomaly Detection and Resource Limitation
Clement Alabi, Imonkhae Ugboya
SSRN Electronic Journal (2024)
Closed Access

MAMGD: Gradient-Based Optimization Method Using Exponential Decay
Nikita Sakovich, Dmitry Aksenov, Е. В. Плешакова, et al.
Technologies (2024) Vol. 12, Iss. 9, pp. 154-154
Open Access

Page 1

Scroll to top