
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Adversarial Attacks and Defenses on Graphs
Wei Jin, Yaxing Li, Han Xu, et al.
ACM SIGKDD Explorations Newsletter (2021) Vol. 22, Iss. 2, pp. 19-34
Closed Access | Times Cited: 111
Wei Jin, Yaxing Li, Han Xu, et al.
ACM SIGKDD Explorations Newsletter (2021) Vol. 22, Iss. 2, pp. 19-34
Closed Access | Times Cited: 111
Showing 1-25 of 111 citing articles:
A Comprehensive Survey on Deep Graph Representation Learning
Wei Ju, Zheng Fang, Yiyang Gu, et al.
Neural Networks (2024) Vol. 173, pp. 106207-106207
Open Access | Times Cited: 130
Wei Ju, Zheng Fang, Yiyang Gu, et al.
Neural Networks (2024) Vol. 173, pp. 106207-106207
Open Access | Times Cited: 130
Simple Contrastive Graph Clustering
Yue Liu, Xihong Yang, Sihang Zhou, et al.
IEEE Transactions on Neural Networks and Learning Systems (2023) Vol. 35, Iss. 10, pp. 13789-13800
Open Access | Times Cited: 74
Yue Liu, Xihong Yang, Sihang Zhou, et al.
IEEE Transactions on Neural Networks and Learning Systems (2023) Vol. 35, Iss. 10, pp. 13789-13800
Open Access | Times Cited: 74
Trustworthy Graph Neural Networks: Aspects, Methods, and Trends
He Zhang, Bang Ye Wu, Xingliang Yuan, et al.
Proceedings of the IEEE (2024) Vol. 112, Iss. 2, pp. 97-139
Open Access | Times Cited: 29
He Zhang, Bang Ye Wu, Xingliang Yuan, et al.
Proceedings of the IEEE (2024) Vol. 112, Iss. 2, pp. 97-139
Open Access | Times Cited: 29
TDGIA: Effective Injection Attacks on Graph Neural Networks
Xu Zou, Qinkai Zheng, Yuxiao Dong, et al.
(2021)
Open Access | Times Cited: 59
Xu Zou, Qinkai Zheng, Yuxiao Dong, et al.
(2021)
Open Access | Times Cited: 59
GANI: Global Attacks on Graph Neural Networks via Imperceptible Node Injections
Junyuan Fang, Haixian Wen, Jiajing Wu, et al.
IEEE Transactions on Computational Social Systems (2024) Vol. 11, Iss. 4, pp. 5374-5387
Open Access | Times Cited: 10
Junyuan Fang, Haixian Wen, Jiajing Wu, et al.
IEEE Transactions on Computational Social Systems (2024) Vol. 11, Iss. 4, pp. 5374-5387
Open Access | Times Cited: 10
Explainability-based adversarial attack on graphs through edge perturbation
Dibaloke Chanda, Saba Heidari Gheshlaghi, Nasim Soltani
Knowledge-Based Systems (2025), pp. 112895-112895
Open Access | Times Cited: 1
Dibaloke Chanda, Saba Heidari Gheshlaghi, Nasim Soltani
Knowledge-Based Systems (2025), pp. 112895-112895
Open Access | Times Cited: 1
Single Node Injection Attack against Graph Neural Networks
Shuchang Tao, Qi Cao, Huawei Shen, et al.
(2021), pp. 1794-1803
Open Access | Times Cited: 41
Shuchang Tao, Qi Cao, Huawei Shen, et al.
(2021), pp. 1794-1803
Open Access | Times Cited: 41
Trustworthy Graph Neural Networks: Aspects, Methods and Trends
He Zhang, Bang Ye Wu, Xingliang Yuan, et al.
arXiv (Cornell University) (2022)
Open Access | Times Cited: 35
He Zhang, Bang Ye Wu, Xingliang Yuan, et al.
arXiv (Cornell University) (2022)
Open Access | Times Cited: 35
PAGCL: An unsupervised graph poisoned attack for graph contrastive learning model
Qing Li, Ziyue Wang, Zehao Li
Future Generation Computer Systems (2023) Vol. 149, pp. 240-249
Closed Access | Times Cited: 20
Qing Li, Ziyue Wang, Zehao Li
Future Generation Computer Systems (2023) Vol. 149, pp. 240-249
Closed Access | Times Cited: 20
Adversarial camouflage for node injection attack on graphs
Shuchang Tao, Qi Cao, Huawei Shen, et al.
Information Sciences (2023) Vol. 649, pp. 119611-119611
Open Access | Times Cited: 19
Shuchang Tao, Qi Cao, Huawei Shen, et al.
Information Sciences (2023) Vol. 649, pp. 119611-119611
Open Access | Times Cited: 19
Model Inversion Attacks Against Graph Neural Networks
Zaixi Zhang, Qi Liu, Zhenya Huang, et al.
IEEE Transactions on Knowledge and Data Engineering (2022) Vol. 35, Iss. 9, pp. 8729-8741
Open Access | Times Cited: 23
Zaixi Zhang, Qi Liu, Zhenya Huang, et al.
IEEE Transactions on Knowledge and Data Engineering (2022) Vol. 35, Iss. 9, pp. 8729-8741
Open Access | Times Cited: 23
Attack and Defense: Adversarial Security of Data-Driven FDC Systems
Yue Zhuo, Zhenqin Yin, Zhiqiang Ge
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 1, pp. 5-19
Closed Access | Times Cited: 22
Yue Zhuo, Zhenqin Yin, Zhiqiang Ge
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 1, pp. 5-19
Closed Access | Times Cited: 22
Temporal Dynamics-Aware Adversarial Attacks on Discrete-Time Dynamic Graph Models
Kartik Sharma, Rakshit Trivedi, Rohit Sridhar, et al.
Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (2023), pp. 2023-2035
Open Access | Times Cited: 13
Kartik Sharma, Rakshit Trivedi, Rohit Sridhar, et al.
Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (2023), pp. 2023-2035
Open Access | Times Cited: 13
Topological Vulnerability-Based Imperceptible Node Injection Attack Against Dynamic Graph Neural Network
Hui Xia, Yanan Jiang, Mingda Ma, et al.
Lecture notes in computer science (2025), pp. 551-562
Closed Access
Hui Xia, Yanan Jiang, Mingda Ma, et al.
Lecture notes in computer science (2025), pp. 551-562
Closed Access
Hardware Trojan Detection in Open-source Hardware Designs using Machine Learning
Victor Takashi Hayashi, Wilson Vicente Ruggiero
IEEE Access (2025) Vol. 13, pp. 37771-37788
Open Access
Victor Takashi Hayashi, Wilson Vicente Ruggiero
IEEE Access (2025) Vol. 13, pp. 37771-37788
Open Access
L2M-GCN: A new framework for learning robust GCN against structural attacks
Haoran Chen, Xianchen Zhou, Jiwei Zhang, et al.
Neurocomputing (2025), pp. 129962-129962
Closed Access
Haoran Chen, Xianchen Zhou, Jiwei Zhang, et al.
Neurocomputing (2025), pp. 129962-129962
Closed Access
Leveraging graph neural networks and multi-agent reinforcement learning for inventory control in supply chains
Niki Kotecha, Ehecatl Antonio del Río-Chanona
Computers & Chemical Engineering (2025), pp. 109111-109111
Open Access
Niki Kotecha, Ehecatl Antonio del Río-Chanona
Computers & Chemical Engineering (2025), pp. 109111-109111
Open Access
Decentralized Inference With Graph Neural Networks in Wireless Communication Systems
Mengyuan Lee, Guanding Yu, Huaiyu Dai
IEEE Transactions on Mobile Computing (2021) Vol. 22, Iss. 5, pp. 2582-2598
Open Access | Times Cited: 32
Mengyuan Lee, Guanding Yu, Huaiyu Dai
IEEE Transactions on Mobile Computing (2021) Vol. 22, Iss. 5, pp. 2582-2598
Open Access | Times Cited: 32
Transferable Graph Backdoor Attack
Shuiqiao Yang, Bao Gia Doan, Paul Montague, et al.
(2022), pp. 321-332
Open Access | Times Cited: 20
Shuiqiao Yang, Bao Gia Doan, Paul Montague, et al.
(2022), pp. 321-332
Open Access | Times Cited: 20
HOGDA: Boosting Semi-supervised Graph Domain Adaptation via High-Order Structure-Guided Adaptive Feature Alignment
Jun Dan, Weiming Liu, Mushui Liu, et al.
(2024), pp. 11109-11118
Closed Access | Times Cited: 4
Jun Dan, Weiming Liu, Mushui Liu, et al.
(2024), pp. 11109-11118
Closed Access | Times Cited: 4
Projective Ranking: A Transferable Evasion Attack Method on Graph Neural Networks
He Zhang, Bang Ye Wu, Xiangwen Yang, et al.
(2021), pp. 3617-3621
Closed Access | Times Cited: 23
He Zhang, Bang Ye Wu, Xiangwen Yang, et al.
(2021), pp. 3617-3621
Closed Access | Times Cited: 23
Graph Structural Attack by Perturbing Spectral Distance
Lin Lü, Ethan Blaser, Hongning Wang
Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (2022), pp. 989-998
Open Access | Times Cited: 18
Lin Lü, Ethan Blaser, Hongning Wang
Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (2022), pp. 989-998
Open Access | Times Cited: 18
Are Gradients on Graph Structure Reliable in Gray-box Attacks?
Zihan Liu, Yun Luo, Lirong Wu, et al.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management (2022)
Open Access | Times Cited: 17
Zihan Liu, Yun Luo, Lirong Wu, et al.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management (2022)
Open Access | Times Cited: 17
R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial Training
Kento Hasegawa, Seira Hidano, Kohei Nozawa, et al.
IEEE Transactions on Computers (2022) Vol. 72, Iss. 2, pp. 333-345
Open Access | Times Cited: 17
Kento Hasegawa, Seira Hidano, Kohei Nozawa, et al.
IEEE Transactions on Computers (2022) Vol. 72, Iss. 2, pp. 333-345
Open Access | Times Cited: 17
Adversarial NLP for Social Network Applications: Attacks, Defenses, and Research Directions
Izzat Alsmadi, Kashif Ahmad, Mahmoud Nazzal, et al.
IEEE Transactions on Computational Social Systems (2022) Vol. 10, Iss. 6, pp. 3089-3108
Closed Access | Times Cited: 16
Izzat Alsmadi, Kashif Ahmad, Mahmoud Nazzal, et al.
IEEE Transactions on Computational Social Systems (2022) Vol. 10, Iss. 6, pp. 3089-3108
Closed Access | Times Cited: 16