OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

SneakyPrompt: Jailbreaking Text-to-image Generative Models
Yuchen Yang, Bo Hui, Haolin Yuan, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2024), pp. 897-912
Closed Access | Times Cited: 8

Showing 8 citing articles:

On Large Language Models’ Resilience to Coercive Interrogation
Zhuo Zhang, Guangyu Shen, Guanhong Tao, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2024), pp. 826-844
Closed Access | Times Cited: 5

DeepGuard: Identification and Attribution of AI-Generated Synthetic Images
Yasmine Namani, Ikram Reghioua, Gueltoum Bendiab, et al.
Electronics (2025) Vol. 14, Iss. 4, pp. 665-665
Open Access

When Anti-Fraud Laws Become a Barrier to Computer Science Research
Madelyne Xiao, Andrew Sellars, Sarah Scheffler
(2025), pp. 1-16
Closed Access

Latent Guard: A Safety Framework for Text-to-Image Generation
Runtao Liu, Ashkan Khakzar, Jindong Gu, et al.
Lecture notes in computer science (2024), pp. 93-109
Closed Access | Times Cited: 1

Arondight: Red Teaming Large Vision Language Models with Auto-generated Multi-modal Jailbreak Prompts
Yi Liu, Chengjun Cai, Xiaoli Zhang, et al.
(2024), pp. 3578-3586
Closed Access

All in How You Ask for It: Simple Black-Box Method for Jailbreak Attacks
Kazuhiro Takemoto
Applied Sciences (2024) Vol. 14, Iss. 9, pp. 3558-3558
Open Access

EvilPromptFuzzer: generating inappropriate content based on text-to-image models
Juntao He, Haoran Dai, Runqi Sui, et al.
Cybersecurity (2024) Vol. 7, Iss. 1
Open Access

Page 1

Scroll to top