
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Semi-fragile neural network watermarking for content authentication and tampering localization
Zihan Yuan, Xinpeng Zhang, Zichi Wang, et al.
Expert Systems with Applications (2023) Vol. 236, pp. 121315-121315
Closed Access | Times Cited: 11
Zihan Yuan, Xinpeng Zhang, Zichi Wang, et al.
Expert Systems with Applications (2023) Vol. 236, pp. 121315-121315
Closed Access | Times Cited: 11
Showing 11 citing articles:
Frequency-domain attention-guided adaptive robust watermarking model
Hong Zhang, Mohamed Meyer Kana Kone, X. Ma, et al.
Journal of the Franklin Institute (2025), pp. 107511-107511
Closed Access | Times Cited: 2
Hong Zhang, Mohamed Meyer Kana Kone, X. Ma, et al.
Journal of the Franklin Institute (2025), pp. 107511-107511
Closed Access | Times Cited: 2
Digital to quantum watermarking: A journey from past to present and into the future
Swapnaneel Dhar, Aditya Kumar Sahu
Computer Science Review (2024) Vol. 54, pp. 100679-100679
Closed Access | Times Cited: 5
Swapnaneel Dhar, Aditya Kumar Sahu
Computer Science Review (2024) Vol. 54, pp. 100679-100679
Closed Access | Times Cited: 5
Securing IP in edge AI: neural network watermarking for multimodal models
Hewang Nie, Songfeng Lu
Applied Intelligence (2024) Vol. 54, Iss. 21, pp. 10455-10472
Closed Access | Times Cited: 3
Hewang Nie, Songfeng Lu
Applied Intelligence (2024) Vol. 54, Iss. 21, pp. 10455-10472
Closed Access | Times Cited: 3
Trade-off independent image watermarking using enhanced structured matrix decomposition
Ahmed Khan, KokSheik Wong, Vishnu Monn Baskaran
Multimedia Tools and Applications (2024)
Open Access | Times Cited: 1
Ahmed Khan, KokSheik Wong, Vishnu Monn Baskaran
Multimedia Tools and Applications (2024)
Open Access | Times Cited: 1
ISWP: Novel high-fidelity adversarial examples generated by incorporating invisible and secure watermark perturbations
Jinchao Liang, Yang Liu, Lu Gao, et al.
Applied Intelligence (2024) Vol. 55, Iss. 1
Closed Access | Times Cited: 1
Jinchao Liang, Yang Liu, Lu Gao, et al.
Applied Intelligence (2024) Vol. 55, Iss. 1
Closed Access | Times Cited: 1
Towards Legal Regulations of Generative AI in the Creative Industry
N. I. Shumakova, Jacqui Lloyd, E. V. Titova
Journal of Digital Technologies and Law (2023) Vol. 1, Iss. 4, pp. 880-908
Open Access | Times Cited: 3
N. I. Shumakova, Jacqui Lloyd, E. V. Titova
Journal of Digital Technologies and Law (2023) Vol. 1, Iss. 4, pp. 880-908
Open Access | Times Cited: 3
An Adaptive Blind Color Watermarking Scheme Based on Hadamard Transform and Information Mapping System
Yu Xia, Xiaojie Tian, Gang Wang, et al.
Circuits Systems and Signal Processing (2024)
Closed Access
Yu Xia, Xiaojie Tian, Gang Wang, et al.
Circuits Systems and Signal Processing (2024)
Closed Access
An Improved Tamper Detection with Iwt for Semi-Fragile Image Watermarking
Agit Amrullah, Ferda Ernawan
(2024)
Closed Access
Agit Amrullah, Ferda Ernawan
(2024)
Closed Access
A destructive active defense algorithm for deepfake face images
Yang Yang, Norisma Idris, Chang Liu, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e2356-e2356
Open Access
Yang Yang, Norisma Idris, Chang Liu, et al.
PeerJ Computer Science (2024) Vol. 10, pp. e2356-e2356
Open Access
Image Integrity Checking Using Watermarking in Cloud Computing: A Review
Jyoti Rani, Rajender Nath
Lecture notes in networks and systems (2024), pp. 85-93
Closed Access
Jyoti Rani, Rajender Nath
Lecture notes in networks and systems (2024), pp. 85-93
Closed Access
Soft integrity authentication for neural network models
Lin Huang, Fengyong Li, Heng Yao, et al.
Expert Systems with Applications (2024), pp. 126172-126172
Closed Access
Lin Huang, Fengyong Li, Heng Yao, et al.
Expert Systems with Applications (2024), pp. 126172-126172
Closed Access