
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Bandit-based data poisoning attack against federated learning for autonomous driving models
Shuo Wang, Qianmu Li, Zhiyong Cui, et al.
Expert Systems with Applications (2023) Vol. 227, pp. 120295-120295
Closed Access | Times Cited: 14
Shuo Wang, Qianmu Li, Zhiyong Cui, et al.
Expert Systems with Applications (2023) Vol. 227, pp. 120295-120295
Closed Access | Times Cited: 14
Showing 14 citing articles:
Towards Compact Single Image Dehazing via Task-related Contrastive Network
Weichao Yi, Liquan Dong, Ming Liu, et al.
Expert Systems with Applications (2023) Vol. 235, pp. 121130-121130
Closed Access | Times Cited: 14
Weichao Yi, Liquan Dong, Ming Liu, et al.
Expert Systems with Applications (2023) Vol. 235, pp. 121130-121130
Closed Access | Times Cited: 14
Deep learning adversarial attacks and defenses in autonomous vehicles: a systematic literature review from a safety perspective
Ahmed Dawod Mohammed Ibrahum, Manzoor Hussain, Jang‐Eui Hong
Artificial Intelligence Review (2024) Vol. 58, Iss. 1
Open Access | Times Cited: 4
Ahmed Dawod Mohammed Ibrahum, Manzoor Hussain, Jang‐Eui Hong
Artificial Intelligence Review (2024) Vol. 58, Iss. 1
Open Access | Times Cited: 4
Adaptive precision layering for efficient adversarial training of deep learning models in intelligent vehicles
Manzoor Hussain, Zhengyu Shang, Jang‐Eui Hong
Expert Systems with Applications (2025), pp. 126752-126752
Open Access
Manzoor Hussain, Zhengyu Shang, Jang‐Eui Hong
Expert Systems with Applications (2025), pp. 126752-126752
Open Access
An Overview of Artificial Intelligence Security Issues
Zhihui Wang, Yongqiang Dong, Zhining Xiang, et al.
Frontiers in artificial intelligence and applications (2024)
Open Access | Times Cited: 1
Zhihui Wang, Yongqiang Dong, Zhining Xiang, et al.
Frontiers in artificial intelligence and applications (2024)
Open Access | Times Cited: 1
Challenges and Countermeasures of Federated Learning Data Poisoning Attack Situation Prediction
Jian Wu, Jiahe Jin, Chunming Wu
Mathematics (2024) Vol. 12, Iss. 6, pp. 901-901
Open Access | Times Cited: 1
Jian Wu, Jiahe Jin, Chunming Wu
Mathematics (2024) Vol. 12, Iss. 6, pp. 901-901
Open Access | Times Cited: 1
LFGurad: A defense against label flipping attack in federated learning for vehicular network
Sameera K.M., P. Vinod, Rafidha Rehiman K. A., et al.
Computer Networks (2024) Vol. 254, pp. 110768-110768
Closed Access | Times Cited: 1
Sameera K.M., P. Vinod, Rafidha Rehiman K. A., et al.
Computer Networks (2024) Vol. 254, pp. 110768-110768
Closed Access | Times Cited: 1
Dual-polarization defogging method based on frequency division and blind separation of polarization information
Feng Huang, Chaozhen Ke, Xianyu Wu, et al.
Optics Express (2024) Vol. 32, Iss. 5, pp. 7594-7594
Open Access
Feng Huang, Chaozhen Ke, Xianyu Wu, et al.
Optics Express (2024) Vol. 32, Iss. 5, pp. 7594-7594
Open Access
FASDSA: A Flexible Adaptive and Secure Data Sharing Architecture
Z. Wang, Pan Wang, Zhixin Sun, et al.
ACM Transactions on Autonomous and Adaptive Systems (2024)
Open Access
Z. Wang, Pan Wang, Zhixin Sun, et al.
ACM Transactions on Autonomous and Adaptive Systems (2024)
Open Access
A Secure and Fair Client Selection Based on DDPG for Federated Learning
Tao Wan, Shun Feng, Weichuan Liao, et al.
International Journal of Intelligent Systems (2024) Vol. 2024, Iss. 1
Open Access
Tao Wan, Shun Feng, Weichuan Liao, et al.
International Journal of Intelligent Systems (2024) Vol. 2024, Iss. 1
Open Access
Poisoning Attacks on Federated Learning for Autonomous Driving
Sonakshi Garg, Hugo Jönsson, Gustav Kalander, et al.
Linköping electronic conference proceedings (2024) Vol. 208, pp. 11-18
Open Access
Sonakshi Garg, Hugo Jönsson, Gustav Kalander, et al.
Linköping electronic conference proceedings (2024) Vol. 208, pp. 11-18
Open Access
Evaluating Port Emissions Prediction Model Resilience Against Cyberthreats
Venkata Sai Sandeep Vennam, Carlos D. Paternina-Arboleda, Morteza Safaei Pour
Lecture notes in computer science (2024), pp. 189-207
Closed Access
Venkata Sai Sandeep Vennam, Carlos D. Paternina-Arboleda, Morteza Safaei Pour
Lecture notes in computer science (2024), pp. 189-207
Closed Access
Decomposing texture and semantic for out-of-distribution detection
Jeong-Hyeon Moon, Namhyuk Ahn, Kyung-Ah Sohn
Expert Systems with Applications (2023) Vol. 238, pp. 121829-121829
Open Access | Times Cited: 1
Jeong-Hyeon Moon, Namhyuk Ahn, Kyung-Ah Sohn
Expert Systems with Applications (2023) Vol. 238, pp. 121829-121829
Open Access | Times Cited: 1
Predicting the Impact of Data Poisoning Attacks in Blockchain-Enabled Supply Chain Networks
Usman Javed Butt, Osama Akram Amin Metwally Hussien, Krison Hasanaj, et al.
Algorithms (2023) Vol. 16, Iss. 12, pp. 549-549
Open Access
Usman Javed Butt, Osama Akram Amin Metwally Hussien, Krison Hasanaj, et al.
Algorithms (2023) Vol. 16, Iss. 12, pp. 549-549
Open Access
DaBA: Data-free Backdoor Attack against Federated Learning via Malicious Server
Kuiqi Chen, Liming Fang, Mengxin Wang, et al.
2022 International Conference on Image Processing, Computer Vision and Machine Learning (ICICML) (2023), pp. 882-890
Closed Access
Kuiqi Chen, Liming Fang, Mengxin Wang, et al.
2022 International Conference on Image Processing, Computer Vision and Machine Learning (ICICML) (2023), pp. 882-890
Closed Access