
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
The Impact of Adversarial Attacks on Federated Learning: A Survey
K. Naveen Kumar, C. Krishna Mohan, Linga Reddy Cenkeramaddi
IEEE Transactions on Pattern Analysis and Machine Intelligence (2023) Vol. 46, Iss. 5, pp. 2672-2691
Closed Access | Times Cited: 58
K. Naveen Kumar, C. Krishna Mohan, Linga Reddy Cenkeramaddi
IEEE Transactions on Pattern Analysis and Machine Intelligence (2023) Vol. 46, Iss. 5, pp. 2672-2691
Closed Access | Times Cited: 58
Showing 1-25 of 58 citing articles:
Securing modern power systems: Implementing comprehensive strategies to enhance resilience and reliability against cyber-attacks
Sobhy M. Abdelkader, Jeremiah Amissah, Sammy Kinga, et al.
Results in Engineering (2024) Vol. 23, pp. 102647-102647
Open Access | Times Cited: 25
Sobhy M. Abdelkader, Jeremiah Amissah, Sammy Kinga, et al.
Results in Engineering (2024) Vol. 23, pp. 102647-102647
Open Access | Times Cited: 25
Federated Learning for IoT: A Survey of Techniques, Challenges, and Applications
Ηλίας Δρίτσας, Μαρία Τρίγκα
Journal of Sensor and Actuator Networks (2025) Vol. 14, Iss. 1, pp. 9-9
Open Access | Times Cited: 2
Ηλίας Δρίτσας, Μαρία Τρίγκα
Journal of Sensor and Actuator Networks (2025) Vol. 14, Iss. 1, pp. 9-9
Open Access | Times Cited: 2
A multi-center federated learning mechanism based on consortium blockchain for data secure sharing
Yinglin Wang, Zhao Tian, Xinrui Liu, et al.
Knowledge-Based Systems (2025), pp. 112962-112962
Closed Access | Times Cited: 1
Yinglin Wang, Zhao Tian, Xinrui Liu, et al.
Knowledge-Based Systems (2025), pp. 112962-112962
Closed Access | Times Cited: 1
Enhanced Adversarial Attack Resilience in Energy Networks through Energy and Privacy Aware Federated Learning
Habib Ullah Manzoor, Kamran Arshad, Khaled Assaleh, et al.
(2024)
Open Access | Times Cited: 7
Habib Ullah Manzoor, Kamran Arshad, Khaled Assaleh, et al.
(2024)
Open Access | Times Cited: 7
A Survey of Security Strategies in Federated Learning: Defending Models, Data, and Privacy
Habib Ullah Manzoor, Attia Shabbir, Ao Chen, et al.
Future Internet (2024) Vol. 16, Iss. 10, pp. 374-374
Open Access | Times Cited: 6
Habib Ullah Manzoor, Attia Shabbir, Ao Chen, et al.
Future Internet (2024) Vol. 16, Iss. 10, pp. 374-374
Open Access | Times Cited: 6
Federated Learning-enabled Network Incident Anomaly Detection Optimization for Drone Swarms
Kevin Kostage, R S Adepu, Jenaya Monroe, et al.
(2025), pp. 104-114
Closed Access
Kevin Kostage, R S Adepu, Jenaya Monroe, et al.
(2025), pp. 104-114
Closed Access
Elastic Balancing of Communication Efficiency and Performance in Federated Learning with Staged Clustering
Ying Zhou, Fang Cui, Junlin Che, et al.
Electronics (2025) Vol. 14, Iss. 4, pp. 745-745
Open Access
Ying Zhou, Fang Cui, Junlin Che, et al.
Electronics (2025) Vol. 14, Iss. 4, pp. 745-745
Open Access
Malicious Node Detection and Robust Federated Aggregation Algorithm Based on TD3
Fan Sun, Hong Wen, Wenjing Hou, et al.
Lecture notes in electrical engineering (2025), pp. 375-383
Open Access
Fan Sun, Hong Wen, Wenjing Hou, et al.
Lecture notes in electrical engineering (2025), pp. 375-383
Open Access
A defense mechanism for federated learning in AIoT through critical gradient dimension extraction
Jian Xu, Bing Guo, Fei Chen, et al.
Computer Communications (2025) Vol. 236, pp. 108114-108114
Closed Access
Jian Xu, Bing Guo, Fei Chen, et al.
Computer Communications (2025) Vol. 236, pp. 108114-108114
Closed Access
DART: A Solution for decentralized federated learning model robustness analysis
Chao Feng, Alberto Huertas Celdrán, Jan von der Assen, et al.
Array (2024) Vol. 23, pp. 100360-100360
Open Access | Times Cited: 4
Chao Feng, Alberto Huertas Celdrán, Jan von der Assen, et al.
Array (2024) Vol. 23, pp. 100360-100360
Open Access | Times Cited: 4
Efficiency of Federated Learning and Blockchain in Preserving Privacy and Enhancing the Performance of Credit Card Fraud Detection (CCFD) Systems
Tahani Baabdullah, Amani Alzahrani, Danda B. Rawat, et al.
Future Internet (2024) Vol. 16, Iss. 6, pp. 196-196
Open Access | Times Cited: 3
Tahani Baabdullah, Amani Alzahrani, Danda B. Rawat, et al.
Future Internet (2024) Vol. 16, Iss. 6, pp. 196-196
Open Access | Times Cited: 3
A survey on privacy-preserving federated learning against poisoning attacks
Xia Feng, Wenhao Cheng
Cluster Computing (2024) Vol. 27, Iss. 10, pp. 13565-13582
Closed Access | Times Cited: 2
Xia Feng, Wenhao Cheng
Cluster Computing (2024) Vol. 27, Iss. 10, pp. 13565-13582
Closed Access | Times Cited: 2
Research on Network Information Security Algorithms based Intrusion Detection using Deep Learning
Kexian Pan
(2024), pp. 1-5
Closed Access | Times Cited: 1
Kexian Pan
(2024), pp. 1-5
Closed Access | Times Cited: 1
OEM Supply Chain Elastic Operation and Improvement Strategies Under the Background of Internet of Things
Yanhong Wu
(2024), pp. 1-5
Closed Access | Times Cited: 1
Yanhong Wu
(2024), pp. 1-5
Closed Access | Times Cited: 1
Evaluation and Optimization of Machine Learning Algorithms in Personalized Marketing
Chunxiang Guo, Pengfei Jiao
(2024) Vol. 10, pp. 1-5
Closed Access | Times Cited: 1
Chunxiang Guo, Pengfei Jiao
(2024) Vol. 10, pp. 1-5
Closed Access | Times Cited: 1
Design of Computer Network Security Management System based on Neural Network Technology
Jie Liu
(2024), pp. 1-5
Closed Access
Jie Liu
(2024), pp. 1-5
Closed Access
Construction of Neural Network Model for Exercise Load Monitoring and Rehabilitation Therapy under Intelligent Medical Information Fusion Algorithm
Weixing Wang, Guomei Yin, Jun Wang
(2024), pp. 1-6
Closed Access
Weixing Wang, Guomei Yin, Jun Wang
(2024), pp. 1-6
Closed Access
Hybrid Grey Wolf Optimizer with Ant Lion Optimization Algorithm based Deep Learning for Face Expression Recognition
Jyoti Jyoti -, P Vishwanath, Laith H. Alzubaidi, et al.
(2024), pp. 1-6
Closed Access
Jyoti Jyoti -, P Vishwanath, Laith H. Alzubaidi, et al.
(2024), pp. 1-6
Closed Access
Recommendation of Music Teaching Content in Universities Based on Recurrent Neural Network
Jing Zhang
(2024), pp. 1-9
Closed Access
Jing Zhang
(2024), pp. 1-9
Closed Access
A Cross border Trade Supply Chain Information Platform Based on Artificial Intelligence
Wei Ji
(2024), pp. 1-4
Closed Access
Wei Ji
(2024), pp. 1-4
Closed Access
Research on Laboratory Environment Remote Monitoring System Based on Internet of Things
Haiyan Dang
(2024), pp. 1-7
Closed Access
Haiyan Dang
(2024), pp. 1-7
Closed Access
Modified Glowworm Swarm Optimization Algorithm based on Task Scheduling for Cyber-Physical System
D Anitha, Mohammed Al-Farouni, N Shilpa, et al.
(2024), pp. 1-5
Closed Access
D Anitha, Mohammed Al-Farouni, N Shilpa, et al.
(2024), pp. 1-5
Closed Access
Design of Computer Wireless Network Teaching System based on Collaborative Filtering Optimization Algorithm
Yufei Cao
(2024), pp. 1-5
Closed Access
Yufei Cao
(2024), pp. 1-5
Closed Access
Traffic Flow Prediction and Intelligent Road Network Optimization Under Artificial Intelligence
Weiwei Zhan
(2024), pp. 1-5
Closed Access
Weiwei Zhan
(2024), pp. 1-5
Closed Access
The Interaction of Big Data and AI Intelligent Technology in Visual Design Systems
Yuanji Zhu
(2024), pp. 1-5
Closed Access
Yuanji Zhu
(2024), pp. 1-5
Closed Access