OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems
Akm Iqtidar Newaz, Nur Imtiazul Haque, Amit Kumar Sikder, et al.
GLOBECOM 2022 - 2022 IEEE Global Communications Conference (2020)
Open Access | Times Cited: 68

Showing 1-25 of 68 citing articles:

Developing future human-centered smart cities: Critical analysis of smart city security, Data management, and Ethical challenges
Kashif Ahmad, Majdi Maabreh, Mohamed Ghaly, et al.
Computer Science Review (2021) Vol. 43, pp. 100452-100452
Closed Access | Times Cited: 152

EHDHE: Enhancing security of healthcare documents in IoT-enabled digital healthcare ecosystems using blockchain
Pratima Sharma, Suyel Namasudra, Rubén González Crespo, et al.
Information Sciences (2023) Vol. 629, pp. 703-718
Closed Access | Times Cited: 121

An Overview of Cyber Threats, Attacks and Countermeasures on the Primary Domains of Smart Cities
Vasiliki Demertzi, Stavros Demertzis, Konstantinos Demertzis
Applied Sciences (2023) Vol. 13, Iss. 2, pp. 790-790
Open Access | Times Cited: 50

A Survey on Sensor-Based Threats and Attacks to Smart Devices and Applications
Amit Kumar Sikder, Giuseppe Petracca, Hidayet Aksu, et al.
IEEE Communications Surveys & Tutorials (2021) Vol. 23, Iss. 2, pp. 1125-1159
Closed Access | Times Cited: 100

Blockchain-Based Privacy Preservation for IoT-Enabled Healthcare System
Pratima Sharma, Suyel Namasudra, Naveen Chilamkurti, et al.
ACM Transactions on Sensor Networks (2022) Vol. 19, Iss. 3, pp. 1-17
Closed Access | Times Cited: 67

Explainable deep learning in healthcare: A methodological survey from an attribution view
Di Jin, Elena Sergeeva, Wei‐Hung Weng, et al.
WIREs Mechanisms of Disease (2022) Vol. 14, Iss. 3
Open Access | Times Cited: 46

Adversarial examples: attacks and defences on medical deep learning systems
Murali Krishna Puttagunta, S. Ravi, C. Nelson Kennedy Babu
Multimedia Tools and Applications (2023) Vol. 82, Iss. 22, pp. 33773-33809
Closed Access | Times Cited: 22

Adversarial Machine Learning: A Multilayer Review of the State-of-the-Art and Challenges for Wireless and Mobile Systems
Jinxin Liu, Michele Nogueira, Johan Fernandes, et al.
IEEE Communications Surveys & Tutorials (2021) Vol. 24, Iss. 1, pp. 123-159
Closed Access | Times Cited: 53

HealthGuard: An Intelligent Healthcare System Security Framework Based on Machine Learning
Amit Sundas, Sumit Badotra, Salil Bharany, et al.
Sustainability (2022) Vol. 14, Iss. 19, pp. 11934-11934
Open Access | Times Cited: 34

AI Under Attack: Metric-Driven Analysis of Cybersecurity Threats in Deep Learning Models for Healthcare Applications
Sarfraz Nawaz Brohi, Qurat-ul-ain Mastoi
Algorithms (2025) Vol. 18, Iss. 3, pp. 157-157
Open Access

Low responsiveness of machine learning models to critical or deteriorating health conditions
Tanmoy Sarkar Pias, Sharmin Afrose, Moon Das Tuli, et al.
Communications Medicine (2025) Vol. 5, Iss. 1
Open Access

An Analytical Framework for Evaluating Successful Poisoning Attacks on Machine Learning Algorithms
Surekha Venkata Mullapudi, Anil Kumar Sagar, Vineeta Khemchandani
SN Computer Science (2025) Vol. 6, Iss. 4
Closed Access

One-Dimensional W-NETR for Non-Invasive Single Channel Fetal ECG Extraction
Murad Almadani, Leontios J. Hadjileontiadis, Ahsan H. Khandoker
IEEE Journal of Biomedical and Health Informatics (2023) Vol. 27, Iss. 7, pp. 3198-3209
Closed Access | Times Cited: 11

eXplainable and Reliable Against Adversarial Machine Learning in Data Analytics
Ivan Vaccari, Alberto Carlevaro, Sara Narteni, et al.
IEEE Access (2022) Vol. 10, pp. 83949-83970
Open Access | Times Cited: 17

Adversarial learning techniques for security and privacy preservation: A comprehensive review
Jigna J. Hathaliya, Sudeep Tanwar, Priyanka Sharma
Security and Privacy (2022) Vol. 5, Iss. 3
Closed Access | Times Cited: 16

Evasion Attack and Defense on Machine Learning Models in Cyber-Physical Systems: A Survey
Shunyao Wang, Ryan K. L. Ko, Guangdong Bai, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 26, Iss. 2, pp. 930-966
Open Access | Times Cited: 10

Active Machine Learning Adversarial Attack Detection in the User Feedback Process
Victor R. Kebande, Sadi Alawadi, Feras M. Awaysheh, et al.
IEEE Access (2021) Vol. 9, pp. 36908-36923
Open Access | Times Cited: 22

TileMask: A Passive-Reflection-based Attack against mmWave Radar Object Detection in Autonomous Driving
Yi Zhu, Chenglin Miao, Hongfei Xue, et al.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2023), pp. 1317-1331
Closed Access | Times Cited: 8

An autonomous decision-making framework for gait recognition systems against adversarial attack using reinforcement learning
Muazzam Maqsood, Sadaf Yasmin, Saira Gillani, et al.
ISA Transactions (2022) Vol. 132, pp. 80-93
Open Access | Times Cited: 12

BIoTA: Control-Aware Attack Analytics for Building Internet of Things
Nur Imtiazul Haque, Mohammad Ashiqur Rahman, Dong Chen, et al.
(2021)
Open Access | Times Cited: 15

Analysis of the Impact of White Box Adversarial Attacks in ResNet While Classifying Retinal Fundus Images
D. P. Bharath Kumar, Nanda Kumar, Snofy D. Dunston, et al.
IFIP advances in information and communication technology (2022), pp. 162-175
Closed Access | Times Cited: 9

Impact Of Availability Attacks On Enabling IoT Based Healthcare Applications
Abdullah Ali Jawad Al-Abadi, Mbarka Belhaj Mohamed, Ahmed Fakhfakh
2022 International Wireless Communications and Mobile Computing (IWCMC) (2023), pp. 1666-1671
Closed Access | Times Cited: 5

Page 1 - Next Page

Scroll to top