OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Study of Pre-Processing Defenses Against Adversarial Attacks on State-of-the-Art Speaker Recognition Systems
Sonal Joshi, Jesús Villalba, Piotr Żelasko, et al.
IEEE Transactions on Information Forensics and Security (2021) Vol. 16, pp. 4811-4826
Open Access | Times Cited: 33

Showing 1-25 of 33 citing articles:

ASVspoof 2021: Towards Spoofed and Deepfake Speech Detection in the Wild
Xuechen Liu, Xin Wang, Md Sahidullah, et al.
IEEE/ACM Transactions on Audio Speech and Language Processing (2023) Vol. 31, pp. 2507-2522
Open Access | Times Cited: 90

Defense strategies for Adversarial Machine Learning: A survey
Panagiotis Bountakas, Apostolis Zarras, Alexios Lekidis, et al.
Computer Science Review (2023) Vol. 49, pp. 100573-100573
Closed Access | Times Cited: 23

Toward Understanding and Boosting Adversarial Transferability From a Distribution Perspective
Yao Zhu, Yuefeng Chen, Xiaodan Li, et al.
IEEE Transactions on Image Processing (2022) Vol. 31, pp. 6487-6501
Open Access | Times Cited: 34

Adversarial Attack and Defense Strategies of Speaker Recognition Systems: A Survey
Hao Tan, Le Wang, Huan Zhang, et al.
Electronics (2022) Vol. 11, Iss. 14, pp. 2183-2183
Open Access | Times Cited: 31

Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition
Guangke Chen, Zhe Zhao, Fu Song, et al.
IEEE Transactions on Dependable and Secure Computing (2022) Vol. 20, Iss. 5, pp. 3970-3987
Open Access | Times Cited: 23

Textual variations in social media text processing applications: challenges, solutions, and trends
Jebran Khan, Kashif Ahmad, Senthil Kumar Jagatheesaperumal, et al.
Artificial Intelligence Review (2025) Vol. 58, Iss. 3
Open Access

Symmetric Saliency-Based Adversarial Attack to Speaker Identification
Jiadi Yao, Xing Chen, Xiao-Lei Zhang, et al.
IEEE Signal Processing Letters (2023) Vol. 30, pp. 1-5
Open Access | Times Cited: 11

The Best Defense is a Good Offense: Adversarial Augmentation Against Adversarial Attacks
Iuri Frosio, Jan Kautz
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2023) Vol. 33, pp. 4067-4076
Open Access | Times Cited: 7

Diffusion-Based Adversarial Purification for Speaker Verification
Yibo Bai, Xiao-Lei Zhang, Xuelong Li
IEEE Signal Processing Letters (2024) Vol. 31, pp. 2300-2304
Closed Access | Times Cited: 2

A Smart Mirror for Emotion Monitoring in Home Environments
Simone Bianco, Luigi Celona, Gianluigi Ciocca, et al.
Sensors (2021) Vol. 21, Iss. 22, pp. 7453-7453
Open Access | Times Cited: 16

Guided Erasable Adversarial Attack (GEAA) Toward Shared Data Protection
Mengnan Zhao, Bo Wang, Wei Wang, et al.
IEEE Transactions on Information Forensics and Security (2022) Vol. 17, pp. 2468-2482
Closed Access | Times Cited: 10

Adversarial Perturbation Elimination with GAN Based Defense in Continuous-Variable Quantum Key Distribution Systems
Xun Tang, Pengzhi Yin, Zehao Zhou, et al.
Electronics (2023) Vol. 12, Iss. 11, pp. 2437-2437
Open Access | Times Cited: 4

On the Detection of Adaptive Adversarial Attacks in Speaker Verification Systems
Zesheng Chen
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 18, pp. 16271-16283
Open Access | Times Cited: 3

LMD: A Learnable Mask Network to Detect Adversarial Examples for Speaker Verification
Xing Chen, Jie Wang, Xiao-Lei Zhang, et al.
IEEE/ACM Transactions on Audio Speech and Language Processing (2023) Vol. 31, pp. 2476-2490
Open Access | Times Cited: 3

Adversarial Attacks in Underwater Acoustic Target Recognition with Deep Learning Models
Sheng Feng, Xiaoqian Zhu, Shuqing Ma, et al.
Remote Sensing (2023) Vol. 15, Iss. 22, pp. 5386-5386
Open Access | Times Cited: 3

Defending against FakeBob Adversarial Attacks in Speaker Verification Systems with Noise-Adding
Zesheng Chen, Li-Chi Chang, Chao Chen, et al.
Algorithms (2022) Vol. 15, Iss. 8, pp. 293-293
Open Access | Times Cited: 5

Raspberry Pi-based robust speech command recognition for normal and hearing-impaired (HI)
A. Revathi, N. Sasikaladevi, D. Arunprasanth, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 17, pp. 51589-51613
Closed Access | Times Cited: 2

AdvEst: Adversarial Perturbation Estimation to Classify and Detect Adversarial Attacks against Speaker Identification
Sonal Joshi, Saurabh Kataria, Jesús Villalba, et al.
Interspeech 2022 (2022), pp. 5060-5064
Open Access | Times Cited: 4

Integrating confidence calibration and adversarial robustness via adversarial calibration entropy
Yong Chen, Peng Hu, Zhong Yuan, et al.
Information Sciences (2024) Vol. 668, pp. 120532-120532
Closed Access

An attack-agnostic defense method against adversarial attacks on speaker verification by fusing downsampling and upsampling of speech signals
Yihao Li, Xiongwei Zhang, Meng Sun, et al.
Information Sciences (2024) Vol. 670, pp. 120618-120618
Closed Access

Enhancing cross-domain transferability of black-box adversarial attacks on speaker recognition systems using linearized backpropagation
Umang Patel, Shruti Bhilare, Avik Hati
Pattern Analysis and Applications (2024) Vol. 27, Iss. 2
Closed Access

Experimental & Comparative Study of Adversarial Attacks on Automatic Speech Recognition Systems
Anunya Sharma, Kiran Malik, Poonam Bansal
Soft Computing Research Society eBooks (2024), pp. 349-358
Open Access

Ensemble Adversarial Defenses and Attacks in Speaker Verification Systems
Zesheng Chen, Jack Li, Chao Chen
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 20, pp. 32645-32655
Closed Access

Robust IoT Botnet Detection Framework Resilient to Gradient Based Adversarial Attacks
Deepa Krishnan, Pravin Shrinath
SN Computer Science (2024) Vol. 5, Iss. 7
Closed Access

Page 1 - Next Page

Scroll to top