OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Adversarial Attacks and Defenses in Images, Graphs and Text: A Review
Han Xu, Yao Ma, Hao-Chen Liu, et al.
International Journal of Automation and Computing (2020) Vol. 17, Iss. 2, pp. 151-178
Open Access | Times Cited: 538

Showing 1-25 of 538 citing articles:

Digital Twin: Values, Challenges and Enablers From a Modeling Perspective
Adil Rasheed, Omer San, Trond Kvamsdal
IEEE Access (2020) Vol. 8, pp. 21980-22012
Open Access | Times Cited: 1211

On the Detection of Digital Face Manipulation
Hao Dang, Feng Liu, Joel Stehouwer, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2020)
Open Access | Times Cited: 503

Advances in Adversarial Attacks and Defenses in Computer Vision: A Survey
Naveed Akhtar, Ajmal Mian, Navid Kardan, et al.
IEEE Access (2021) Vol. 9, pp. 155161-155196
Open Access | Times Cited: 189

Deep Learning Algorithms for Cybersecurity Applications: A Technological and Status Review
Priyanka Dixit, Sanjay Silakari
Computer Science Review (2020) Vol. 39, pp. 100317-100317
Closed Access | Times Cited: 182

Anomalous Example Detection in Deep Learning: A Survey
Saikiran Bulusu, Bhavya Kailkhura, Bo Li, et al.
IEEE Access (2020) Vol. 8, pp. 132330-132347
Open Access | Times Cited: 155

The Duo of Artificial Intelligence and Big Data for Industry 4.0: Applications, Techniques, Challenges, and Future Research Directions
Senthil Kumar Jagatheesaperumal, Mohamed Rahouti, Kashif Ahmad, et al.
IEEE Internet of Things Journal (2021) Vol. 9, Iss. 15, pp. 12861-12885
Closed Access | Times Cited: 149

Trustworthy AI: A Computational Perspective
Haochen Liu, Yiqi Wang, Wenqi Fan, et al.
ACM Transactions on Intelligent Systems and Technology (2022) Vol. 14, Iss. 1, pp. 1-59
Open Access | Times Cited: 133

Adversarial example detection for DNN models: a review and experimental comparison
Ahmed Aldahdooh, Wassim Hamidouche, Sid Ahmed Fezza, et al.
Artificial Intelligence Review (2022) Vol. 55, Iss. 6, pp. 4403-4462
Closed Access | Times Cited: 105

Adversarial Machine Learning in Wireless Communications Using RF Data: A Review
Damilola Adesina, Chung-Chu Hsieh, Yalin E. Sagduyu, et al.
IEEE Communications Surveys & Tutorials (2022) Vol. 25, Iss. 1, pp. 77-100
Open Access | Times Cited: 72

A Survey of Adversarial Defenses and Robustness in NLP
Shreya Goyal, Sumanth Doddapaneni, Mitesh M. Khapra, et al.
ACM Computing Surveys (2023) Vol. 55, Iss. 14s, pp. 1-39
Closed Access | Times Cited: 55

When Deep Learning-Based Soft Sensors Encounter Reliability Challenges: A Practical Knowledge-Guided Adversarial Attack and Its Defense
Runyuan Guo, Han Liu, Ding Liu
IEEE Transactions on Industrial Informatics (2023) Vol. 20, Iss. 2, pp. 2702-2714
Closed Access | Times Cited: 46

A survey of safety and trustworthiness of large language models through the lens of verification and validation
Xiaowei Huang, Wenjie Ruan, Wei Huang, et al.
Artificial Intelligence Review (2024) Vol. 57, Iss. 7
Open Access | Times Cited: 30

Synthetic Data in Human Analysis: A Survey
Indu Joshi, Marcel Grimmer, Christian Rathgeb, et al.
IEEE Transactions on Pattern Analysis and Machine Intelligence (2024) Vol. 46, Iss. 7, pp. 4957-4976
Open Access | Times Cited: 24

A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks
Hassan Khazane, Mohammed Ridouani, Fatima Salahdine, et al.
Future Internet (2024) Vol. 16, Iss. 1, pp. 32-32
Open Access | Times Cited: 19

How Deep Learning Sees the World: A Survey on Adversarial Attacks & Defenses
Joana C. Costa, Tiago Roxo, Hugo Proença, et al.
IEEE Access (2024) Vol. 12, pp. 61113-61136
Open Access | Times Cited: 16

Detecting Human Driver Inattentive and Aggressive Driving Behavior Using Deep Learning: Recent Advances, Requirements and Open Challenges
Monagi H. Alkinani, Wazir Zada Khan, Quratulain Arshad
IEEE Access (2020) Vol. 8, pp. 105008-105030
Open Access | Times Cited: 103

Hidden Killer: Invisible Textual Backdoor Attacks with Syntactic Trigger
Fanchao Qi, Mukai Li, Yangyi Chen, et al.
(2021)
Open Access | Times Cited: 97

Artificial Intelligence Security: Threats and Countermeasures
Yupeng Hu, Wenxin Kuang, Zheng Qin, et al.
ACM Computing Surveys (2021) Vol. 55, Iss. 1, pp. 1-36
Closed Access | Times Cited: 90

Self-Attention Context Network: Addressing the Threat of Adversarial Attacks for Hyperspectral Image Classification
Yonghao Xu, Bo Du, Liangpei Zhang
IEEE Transactions on Image Processing (2021) Vol. 30, pp. 8671-8685
Closed Access | Times Cited: 89

DeepRobust: A PyTorch Library for Adversarial Attacks and Defenses
Yaxin Li, Wei Jin, Han Xu, et al.
arXiv (Cornell University) (2020)
Open Access | Times Cited: 77

Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style Transfer
Fanchao Qi, Yang‐Yi Chen, Xurui Zhang, et al.
Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing (2021)
Open Access | Times Cited: 65

Universal Adversarial Examples in Remote Sensing: Methodology and Benchmark
Yonghao Xu, Pedram Ghamisi
IEEE Transactions on Geoscience and Remote Sensing (2022) Vol. 60, pp. 1-15
Open Access | Times Cited: 65

Adversarial Attacks and Defenses in Deep Learning: From a Perspective of Cybersecurity
Shuai Zhou, Chi Liu, Dayong Ye, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 8, pp. 1-39
Closed Access | Times Cited: 61

Adversarial machine learning for network intrusion detection: A comparative study
Houda Jmila, Mohamed Ibn Khedher
Computer Networks (2022) Vol. 214, pp. 109073-109073
Open Access | Times Cited: 58

Deep Learning on Graphs
Yao Ma, Jiliang Tang
(2021)
Open Access | Times Cited: 57

Page 1 - Next Page

Scroll to top