
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Image Transformation based Defense Against Adversarial Perturbation on Deep Learning Models
Akshay Agarwal, Richa Singh, Mayank Vatsa, et al.
IEEE Transactions on Dependable and Secure Computing (2020), pp. 1-1
Closed Access | Times Cited: 46
Akshay Agarwal, Richa Singh, Mayank Vatsa, et al.
IEEE Transactions on Dependable and Secure Computing (2020), pp. 1-1
Closed Access | Times Cited: 46
Showing 1-25 of 46 citing articles:
Adversarial Attack and Defence through Adversarial Training and Feature Fusion for Diabetic Retinopathy Recognition
Sheeba Lal, Saeed Ur Rehman, Jamal Hussain Shah, et al.
Sensors (2021) Vol. 21, Iss. 11, pp. 3922-3922
Open Access | Times Cited: 101
Sheeba Lal, Saeed Ur Rehman, Jamal Hussain Shah, et al.
Sensors (2021) Vol. 21, Iss. 11, pp. 3922-3922
Open Access | Times Cited: 101
Biometrics: Trust, But Verify
Anil K. Jain, Debayan Deb, Joshua J. Engelsma
IEEE Transactions on Biometrics Behavior and Identity Science (2021) Vol. 4, Iss. 3, pp. 303-323
Open Access | Times Cited: 78
Anil K. Jain, Debayan Deb, Joshua J. Engelsma
IEEE Transactions on Biometrics Behavior and Identity Science (2021) Vol. 4, Iss. 3, pp. 303-323
Open Access | Times Cited: 78
Adversarial examples: attacks and defences on medical deep learning systems
Murali Krishna Puttagunta, S. Ravi, C. Nelson Kennedy Babu
Multimedia Tools and Applications (2023) Vol. 82, Iss. 22, pp. 33773-33809
Closed Access | Times Cited: 24
Murali Krishna Puttagunta, S. Ravi, C. Nelson Kennedy Babu
Multimedia Tools and Applications (2023) Vol. 82, Iss. 22, pp. 33773-33809
Closed Access | Times Cited: 24
Universal Adversarial Patch Attack for Automatic Checkout Using Perceptual and Attentional Bias
Jiakai Wang, Aishan Liu, Xiao Bai, et al.
IEEE Transactions on Image Processing (2021) Vol. 31, pp. 598-611
Closed Access | Times Cited: 33
Jiakai Wang, Aishan Liu, Xiao Bai, et al.
IEEE Transactions on Image Processing (2021) Vol. 31, pp. 598-611
Closed Access | Times Cited: 33
Unified Detection of Digital and Physical Face Attacks
Debayan Deb, Xiaoming Liu, Anil K. Jain
(2023), pp. 1-8
Open Access | Times Cited: 15
Debayan Deb, Xiaoming Liu, Anil K. Jain
(2023), pp. 1-8
Open Access | Times Cited: 15
TPET: Two-stage Perceptual Enhancement Transformer Network for Low-light Image Enhancement
Hengshuai Cui, Jinjiang Li, Zhen Hua, et al.
Engineering Applications of Artificial Intelligence (2022) Vol. 116, pp. 105411-105411
Closed Access | Times Cited: 19
Hengshuai Cui, Jinjiang Li, Zhen Hua, et al.
Engineering Applications of Artificial Intelligence (2022) Vol. 116, pp. 105411-105411
Closed Access | Times Cited: 19
EVADE: A novel method to detect adversarial and OOD samples in medical image segmentation
Sneha Shukla, Puneet Gupta
Expert Systems with Applications (2025), pp. 127319-127319
Closed Access
Sneha Shukla, Puneet Gupta
Expert Systems with Applications (2025), pp. 127319-127319
Closed Access
FaceGuard: A Self-Supervised Defense Against Adversarial Face Images
Debayan Deb, Xiaoming Liu, Anil K. Jain
(2023), pp. 1-8
Open Access | Times Cited: 10
Debayan Deb, Xiaoming Liu, Anil K. Jain
(2023), pp. 1-8
Open Access | Times Cited: 10
PrivacyProber: Assessment and Detection of Soft–Biometric Privacy–Enhancing Techniques
Peter Rot, Klemen Grm, Peter Peer, et al.
IEEE Transactions on Dependable and Secure Computing (2023) Vol. 21, Iss. 4, pp. 2869-2887
Open Access | Times Cited: 8
Peter Rot, Klemen Grm, Peter Peer, et al.
IEEE Transactions on Dependable and Secure Computing (2023) Vol. 21, Iss. 4, pp. 2869-2887
Open Access | Times Cited: 8
Defeating DeepFakes via Adversarial Visual Reconstruction
Ziwen He, Wei Wang, Weinan Guan, et al.
Proceedings of the 30th ACM International Conference on Multimedia (2022), pp. 2464-2472
Closed Access | Times Cited: 13
Ziwen He, Wei Wang, Weinan Guan, et al.
Proceedings of the 30th ACM International Conference on Multimedia (2022), pp. 2464-2472
Closed Access | Times Cited: 13
DAMAD: Database, Attack, and Model Agnostic Adversarial Perturbation Detector
Akshay Agarwal, Gaurav Goswami, Mayank Vatsa, et al.
IEEE Transactions on Neural Networks and Learning Systems (2021) Vol. 33, Iss. 8, pp. 3277-3289
Closed Access | Times Cited: 15
Akshay Agarwal, Gaurav Goswami, Mayank Vatsa, et al.
IEEE Transactions on Neural Networks and Learning Systems (2021) Vol. 33, Iss. 8, pp. 3277-3289
Closed Access | Times Cited: 15
Parameter agnostic stacked wavelet transformer for detecting singularities
Akshay Agarwal, Mayank Vatsa, Richa Singh, et al.
Information Fusion (2023) Vol. 95, pp. 415-425
Closed Access | Times Cited: 5
Akshay Agarwal, Mayank Vatsa, Richa Singh, et al.
Information Fusion (2023) Vol. 95, pp. 415-425
Closed Access | Times Cited: 5
Corruption depth: Analysis of DNN depth for misclassification
Akshay Agarwal, Mayank Vatsa, Richa Singh, et al.
Neural Networks (2023) Vol. 172, pp. 106013-106013
Closed Access | Times Cited: 5
Akshay Agarwal, Mayank Vatsa, Richa Singh, et al.
Neural Networks (2023) Vol. 172, pp. 106013-106013
Closed Access | Times Cited: 5
Exploring Robustness Connection between Artificial and Natural Adversarial Examples
Akshay Agarwal, Nalini Ratha, Mayank Vatsa, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2022), pp. 178-185
Closed Access | Times Cited: 8
Akshay Agarwal, Nalini Ratha, Mayank Vatsa, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2022), pp. 178-185
Closed Access | Times Cited: 8
Benchmarking Robustness Beyond $$l_p$$ Norm Adversaries
Akshay Agarwal, Nalini Ratha, Mayank Vatsa, et al.
Lecture notes in computer science (2023), pp. 342-359
Closed Access | Times Cited: 4
Akshay Agarwal, Nalini Ratha, Mayank Vatsa, et al.
Lecture notes in computer science (2023), pp. 342-359
Closed Access | Times Cited: 4
The Unseen Adversaries: Robust and Generalized Defense Against Adversarial Patches
Vishesh Kumar, Akshay Agarwal
(2024)
Closed Access | Times Cited: 1
Vishesh Kumar, Akshay Agarwal
(2024)
Closed Access | Times Cited: 1
Visual Transformer for Resilience to Adversarial Attacks in OCT Retinal Images
Yawar Abbas, Donghong Ji, Hassan Jalil Hadi, et al.
2022 International Joint Conference on Neural Networks (IJCNN) (2024) Vol. 16, pp. 1-7
Closed Access | Times Cited: 1
Yawar Abbas, Donghong Ji, Hassan Jalil Hadi, et al.
2022 International Joint Conference on Neural Networks (IJCNN) (2024) Vol. 16, pp. 1-7
Closed Access | Times Cited: 1
ATHENA: A Framework based on Diverse Weak Defenses for Building Adversarial Defense
Ying Meng, Jianhai Su, Jason M. O’Kane, et al.
arXiv (Cornell University) (2020)
Open Access | Times Cited: 11
Ying Meng, Jianhai Su, Jason M. O’Kane, et al.
arXiv (Cornell University) (2020)
Open Access | Times Cited: 11
Novel Exploit Feature-Map-Based Detection of Adversarial Attacks
Ali Saeed Almuflih, Dhairya Vyas, Viral V. Kapdia, et al.
Applied Sciences (2022) Vol. 12, Iss. 10, pp. 5161-5161
Open Access | Times Cited: 6
Ali Saeed Almuflih, Dhairya Vyas, Viral V. Kapdia, et al.
Applied Sciences (2022) Vol. 12, Iss. 10, pp. 5161-5161
Open Access | Times Cited: 6
GONE: A generic O (1) NoisE layer for protecting privacy of deep neural networks
Haibin Zheng, Jinyin Chen, Wenchang Shangguan, et al.
Computers & Security (2023) Vol. 135, pp. 103471-103471
Closed Access | Times Cited: 3
Haibin Zheng, Jinyin Chen, Wenchang Shangguan, et al.
Computers & Security (2023) Vol. 135, pp. 103471-103471
Closed Access | Times Cited: 3
Trustworthy AI
Richa Singh, Mayank Vatsa, Nalini Ratha
(2020), pp. 449-453
Closed Access | Times Cited: 7
Richa Singh, Mayank Vatsa, Nalini Ratha
(2020), pp. 449-453
Closed Access | Times Cited: 7
Intelligent and Adaptive Mixup Technique for Adversarial Robustness
Akshay Agarwal, Mayank Vatsa, Richa Singh, et al.
2022 IEEE International Conference on Image Processing (ICIP) (2021), pp. 824-828
Closed Access | Times Cited: 7
Akshay Agarwal, Mayank Vatsa, Richa Singh, et al.
2022 IEEE International Conference on Image Processing (ICIP) (2021), pp. 824-828
Closed Access | Times Cited: 7
The Path to Defence: A Roadmap to Characterising Data Poisoning Attacks on Victim Models
Tarek Chaalan, Shaoning Pang, Joarder Kamruzzaman, et al.
ACM Computing Surveys (2023) Vol. 56, Iss. 7, pp. 1-39
Open Access | Times Cited: 2
Tarek Chaalan, Shaoning Pang, Joarder Kamruzzaman, et al.
ACM Computing Surveys (2023) Vol. 56, Iss. 7, pp. 1-39
Open Access | Times Cited: 2
Benchmarking Image Classifiers for Physical Out-of-Distribution Examples Detection
Ojaswee, Akshay Agarwal, Nalini Ratha
(2023), pp. 4429-4437
Closed Access | Times Cited: 2
Ojaswee, Akshay Agarwal, Nalini Ratha
(2023), pp. 4429-4437
Closed Access | Times Cited: 2
Biometrics: Trust, but Verify
Anil K. Jain, Debayan Deb, Joshua J. Engelsma
arXiv (Cornell University) (2021)
Closed Access | Times Cited: 5
Anil K. Jain, Debayan Deb, Joshua J. Engelsma
arXiv (Cornell University) (2021)
Closed Access | Times Cited: 5