
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Adversarial Robustness of Deep Learning: Theory, Algorithms, and Applications
Wenjie Ruan, Xinping Yi, Xiaowei Huang
(2021), pp. 4866-4869
Open Access | Times Cited: 15
Wenjie Ruan, Xinping Yi, Xiaowei Huang
(2021), pp. 4866-4869
Open Access | Times Cited: 15
Showing 15 citing articles:
AI-Powered Surveillance for Smart Cities
Vipin Gautam, S. Sunidhi, Shitala Prasad
Lecture notes in intelligent transportation and infrastructure (2025), pp. 245-265
Closed Access
Vipin Gautam, S. Sunidhi, Shitala Prasad
Lecture notes in intelligent transportation and infrastructure (2025), pp. 245-265
Closed Access
Adversarial Robustness of Neural Networks From the Perspective of Lipschitz Calculus: A Survey
Monty-Maximilian Zühlke, Daniel Kudenko⋆
ACM Computing Surveys (2024)
Open Access | Times Cited: 3
Monty-Maximilian Zühlke, Daniel Kudenko⋆
ACM Computing Surveys (2024)
Open Access | Times Cited: 3
Reachability Analysis of Neural Network Control Systems
Chi Zhang, Wenjie Ruan, Peipei Xu
Proceedings of the AAAI Conference on Artificial Intelligence (2023) Vol. 37, Iss. 12, pp. 15287-15295
Open Access | Times Cited: 7
Chi Zhang, Wenjie Ruan, Peipei Xu
Proceedings of the AAAI Conference on Artificial Intelligence (2023) Vol. 37, Iss. 12, pp. 15287-15295
Open Access | Times Cited: 7
Quantifying safety risks of deep neural networks
Peipei Xu, Wenjie Ruan, Xiaowei Huang
Complex & Intelligent Systems (2022) Vol. 9, Iss. 4, pp. 3801-3818
Open Access | Times Cited: 11
Peipei Xu, Wenjie Ruan, Xiaowei Huang
Complex & Intelligent Systems (2022) Vol. 9, Iss. 4, pp. 3801-3818
Open Access | Times Cited: 11
Reward Certification for Policy Smoothed Reinforcement Learning
Ronghui Mu, Leandro Soriano Marcolino, Yanghao Zhang, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2024) Vol. 38, Iss. 19, pp. 21429-21437
Open Access | Times Cited: 1
Ronghui Mu, Leandro Soriano Marcolino, Yanghao Zhang, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2024) Vol. 38, Iss. 19, pp. 21429-21437
Open Access | Times Cited: 1
Enhancing robustness in video recognition models: Sparse adversarial attacks and beyond
Ronghui Mu, Leandro Soriano Marcolino, Qiang Ni, et al.
Neural Networks (2023) Vol. 171, pp. 127-143
Open Access | Times Cited: 4
Ronghui Mu, Leandro Soriano Marcolino, Qiang Ni, et al.
Neural Networks (2023) Vol. 171, pp. 127-143
Open Access | Times Cited: 4
Towards Verifying the Geometric Robustness of Large-Scale Neural Networks
Fu Wang, Peipei Xu, Wenjie Ruan, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2023) Vol. 37, Iss. 12, pp. 15197-15205
Open Access | Times Cited: 3
Fu Wang, Peipei Xu, Wenjie Ruan, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2023) Vol. 37, Iss. 12, pp. 15197-15205
Open Access | Times Cited: 3
Sparse Adversarial Video Attacks with Spatial Transformations
Ronghui Mu, Wenjie Ruan, Leandro Soriano Marcolino, et al.
arXiv (Cornell University) (2021)
Open Access | Times Cited: 6
Ronghui Mu, Wenjie Ruan, Leandro Soriano Marcolino, et al.
arXiv (Cornell University) (2021)
Open Access | Times Cited: 6
The Path to Defence: A Roadmap to Characterising Data Poisoning Attacks on Victim Models
Tarek Chaalan, Shaoning Pang, Joarder Kamruzzaman, et al.
ACM Computing Surveys (2023) Vol. 56, Iss. 7, pp. 1-39
Open Access | Times Cited: 2
Tarek Chaalan, Shaoning Pang, Joarder Kamruzzaman, et al.
ACM Computing Surveys (2023) Vol. 56, Iss. 7, pp. 1-39
Open Access | Times Cited: 2
Defenses Against Artificial Intelligence Attacks
Michail Tsikerdekis, Sherali Zeadally, Iyad Katib
Computer (2024) Vol. 57, Iss. 11, pp. 49-59
Closed Access
Michail Tsikerdekis, Sherali Zeadally, Iyad Katib
Computer (2024) Vol. 57, Iss. 11, pp. 49-59
Closed Access
SymDNN: Simple & Effective Adversarial Robustness for Embedded Systems
S. Dey, Pallab Dasgupta, P. P. Chakrabarti
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2022), pp. 3598-3608
Closed Access | Times Cited: 2
S. Dey, Pallab Dasgupta, P. P. Chakrabarti
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW) (2022), pp. 3598-3608
Closed Access | Times Cited: 2
Poison Neural Network-Based mmWave Beam Selection and Detoxification With Machine Unlearning
Zhengming Zhang, Muchen Tian, Chunguo Li, et al.
IEEE Transactions on Communications (2022) Vol. 71, Iss. 2, pp. 877-892
Closed Access | Times Cited: 2
Zhengming Zhang, Muchen Tian, Chunguo Li, et al.
IEEE Transactions on Communications (2022) Vol. 71, Iss. 2, pp. 877-892
Closed Access | Times Cited: 2
AccelAT: A Framework for Accelerating the Adversarial Training of Deep Neural Networks Through Accuracy Gradient
Farzad Nikfam, Alberto Marchisio, Maurizio Martina, et al.
IEEE Access (2022) Vol. 10, pp. 108997-109007
Open Access | Times Cited: 1
Farzad Nikfam, Alberto Marchisio, Maurizio Martina, et al.
IEEE Access (2022) Vol. 10, pp. 108997-109007
Open Access | Times Cited: 1
Survey on Reliability Engineering for AI Software Systems: An Extension Based on the IEEE 1633 Standard
Cong Pan, Jun You, Yan Gao
(2023), pp. 116-121
Closed Access
Cong Pan, Jun You, Yan Gao
(2023), pp. 116-121
Closed Access
On One-Pixel Attacking Medical Images against Deep Learning Models
Yisong Wang, Wei Wang, X. Wang, et al.
(2023), pp. 248-257
Closed Access
Yisong Wang, Wei Wang, X. Wang, et al.
(2023), pp. 248-257
Closed Access