
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Improving Transferability of Universal Adversarial Perturbation With Feature Disruption
Donghua Wang, Wen Yao, Tingsong Jiang, et al.
IEEE Transactions on Image Processing (2023) Vol. 33, pp. 722-737
Closed Access | Times Cited: 7
Donghua Wang, Wen Yao, Tingsong Jiang, et al.
IEEE Transactions on Image Processing (2023) Vol. 33, pp. 722-737
Closed Access | Times Cited: 7
Showing 7 citing articles:
Physically Realizable Adversarial Creating Attack against Vision-based BEV Space 3D Object Detection
Jian Wang, Fan Li, Song Lv, et al.
IEEE Transactions on Image Processing (2025) Vol. 34, pp. 538-551
Closed Access | Times Cited: 13
Jian Wang, Fan Li, Song Lv, et al.
IEEE Transactions on Image Processing (2025) Vol. 34, pp. 538-551
Closed Access | Times Cited: 13
Adversarial Infrared Catmull-Rom Spline: A Black-Box Attack on Infrared Pedestrian Detectors in the Physical World
Zhe Jia, Chengyin Hu, Jiarui Zhang, et al.
(2025)
Closed Access
Zhe Jia, Chengyin Hu, Jiarui Zhang, et al.
(2025)
Closed Access
DIB-UAP: enhancing the transferability of universal adversarial perturbation via deep information bottleneck
Yang Wang, Yunfei Zheng, Lei Chen, et al.
Complex & Intelligent Systems (2024) Vol. 10, Iss. 5, pp. 6825-6837
Open Access
Yang Wang, Yunfei Zheng, Lei Chen, et al.
Complex & Intelligent Systems (2024) Vol. 10, Iss. 5, pp. 6825-6837
Open Access
Perturbation defense ultra high-speed weak target recognition
Bin Xue, Qinghua Zheng, Z. Li, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 138, pp. 109420-109420
Closed Access
Bin Xue, Qinghua Zheng, Z. Li, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 138, pp. 109420-109420
Closed Access
Generate universal adversarial perturbations by shortest-distance soft maximum direction attack
Dengbo Liu, Zhi Li, Daoyun Xu
Computers & Security (2024), pp. 104168-104168
Closed Access
Dengbo Liu, Zhi Li, Daoyun Xu
Computers & Security (2024), pp. 104168-104168
Closed Access
Evaluating Transferability of Attacks across Generative Models
Rohith Vallabhaneni
Engineering and Technology Journal (2024) Vol. 09, Iss. 06
Open Access
Rohith Vallabhaneni
Engineering and Technology Journal (2024) Vol. 09, Iss. 06
Open Access
DBI-Attack: Dynamic Bi-Level Integrated Attack for Intensive Multi-Scale UAV Object Detection
Zhengyang Zhao, Buhong Wang, Zhen Wang, et al.
Remote Sensing (2024) Vol. 16, Iss. 14, pp. 2570-2570
Open Access
Zhengyang Zhao, Buhong Wang, Zhen Wang, et al.
Remote Sensing (2024) Vol. 16, Iss. 14, pp. 2570-2570
Open Access