
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Artificial Intelligence Security: Threats and Countermeasures
Yupeng Hu, Wenxin Kuang, Zheng Qin, et al.
ACM Computing Surveys (2021) Vol. 55, Iss. 1, pp. 1-36
Closed Access | Times Cited: 90
Yupeng Hu, Wenxin Kuang, Zheng Qin, et al.
ACM Computing Surveys (2021) Vol. 55, Iss. 1, pp. 1-36
Closed Access | Times Cited: 90
Showing 1-25 of 90 citing articles:
The Role of Machine Learning in Cybersecurity
Giovanni Apruzzese, Pavel Laskov, Edgardo Montes de, et al.
Digital Threats Research and Practice (2022) Vol. 4, Iss. 1, pp. 1-38
Open Access | Times Cited: 122
Giovanni Apruzzese, Pavel Laskov, Edgardo Montes de, et al.
Digital Threats Research and Practice (2022) Vol. 4, Iss. 1, pp. 1-38
Open Access | Times Cited: 122
Generative AI in Medical Practice: In-Depth Exploration of Privacy and Security Challenges
Yan Chen, Pouyan Esmaeilzadeh
Journal of Medical Internet Research (2024) Vol. 26, pp. e53008-e53008
Open Access | Times Cited: 92
Yan Chen, Pouyan Esmaeilzadeh
Journal of Medical Internet Research (2024) Vol. 26, pp. e53008-e53008
Open Access | Times Cited: 92
Artificial Intelligence
Sarvesh Kumar, U. S. Gupta, Arvind Kumar Singh, et al.
Deleted Journal (2023) Vol. 2, Iss. 3, pp. 31-42
Open Access | Times Cited: 75
Sarvesh Kumar, U. S. Gupta, Arvind Kumar Singh, et al.
Deleted Journal (2023) Vol. 2, Iss. 3, pp. 31-42
Open Access | Times Cited: 75
APMSA: Adversarial Perturbation Against Model Stealing Attacks
Jiliang Zhang, Shuang Peng, Yansong Gao, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 18, pp. 1667-1679
Closed Access | Times Cited: 66
Jiliang Zhang, Shuang Peng, Yansong Gao, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 18, pp. 1667-1679
Closed Access | Times Cited: 66
Generative Artificial Intelligence in Education: From Deceptive to Disruptive
Marc Alier, Francisco José García‐Peñalvo, Jorge D. Camba
International Journal of Interactive Multimedia and Artificial Intelligence (2024) Vol. 8, Iss. 5, pp. 5-5
Open Access | Times Cited: 41
Marc Alier, Francisco José García‐Peñalvo, Jorge D. Camba
International Journal of Interactive Multimedia and Artificial Intelligence (2024) Vol. 8, Iss. 5, pp. 5-5
Open Access | Times Cited: 41
Explainable AI for cybersecurity automation, intelligence and trustworthiness in digital twin: Methods, taxonomy, challenges and prospects
Iqbal H. Sarker, Helge Janicke, Ahmad Mohsin, et al.
ICT Express (2024) Vol. 10, Iss. 4, pp. 935-958
Open Access | Times Cited: 21
Iqbal H. Sarker, Helge Janicke, Ahmad Mohsin, et al.
ICT Express (2024) Vol. 10, Iss. 4, pp. 935-958
Open Access | Times Cited: 21
Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems
Hang Thanh Bui, Hamed Aboutorab, Arash Mahboubi, et al.
Computers & Security (2024) Vol. 140, pp. 103754-103754
Open Access | Times Cited: 19
Hang Thanh Bui, Hamed Aboutorab, Arash Mahboubi, et al.
Computers & Security (2024) Vol. 140, pp. 103754-103754
Open Access | Times Cited: 19
Explainable AI for Cybersecurity
Siva Raja Sindiramutty, Chong Eng Tan, Sei Ping Lau, et al.
Advances in computational intelligence and robotics book series (2024), pp. 31-97
Closed Access | Times Cited: 15
Siva Raja Sindiramutty, Chong Eng Tan, Sei Ping Lau, et al.
Advances in computational intelligence and robotics book series (2024), pp. 31-97
Closed Access | Times Cited: 15
On the ICN-IoT with federated learning integration of communication: Concepts, security-privacy issues, applications, and future perspectives
Anichur Rahman, Kamrul Hasan, Dipanjali Kundu, et al.
Future Generation Computer Systems (2022) Vol. 138, pp. 61-88
Closed Access | Times Cited: 66
Anichur Rahman, Kamrul Hasan, Dipanjali Kundu, et al.
Future Generation Computer Systems (2022) Vol. 138, pp. 61-88
Closed Access | Times Cited: 66
Adversarial Attacks and Defenses in Deep Learning: From a Perspective of Cybersecurity
Shuai Zhou, Chi Liu, Dayong Ye, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 8, pp. 1-39
Closed Access | Times Cited: 61
Shuai Zhou, Chi Liu, Dayong Ye, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 8, pp. 1-39
Closed Access | Times Cited: 61
Adversarial Deep Learning: A Survey on Adversarial Attacks and Defense Mechanisms on Image Classification
Samer Khamaiseh, Derek Bagagem, Abdullah Al-Alaj, et al.
IEEE Access (2022) Vol. 10, pp. 102266-102291
Open Access | Times Cited: 38
Samer Khamaiseh, Derek Bagagem, Abdullah Al-Alaj, et al.
IEEE Access (2022) Vol. 10, pp. 102266-102291
Open Access | Times Cited: 38
Adversarial Attacks and Defenses in Machine Learning-Empowered Communication Systems and Networks: A Contemporary Survey
Yulong Wang, Tong Sun, Shenghong Li, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 4, pp. 2245-2298
Closed Access | Times Cited: 38
Yulong Wang, Tong Sun, Shenghong Li, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 4, pp. 2245-2298
Closed Access | Times Cited: 38
Integrating Building Information Modelling (BIM) with ChatGPT, Bard, and similar generative artificial intelligence in the architecture, engineering, and construction industry: applications, a novel framework, challenges, and future scope
Nitin Liladhar Rane, Saurabh Choudhary, Jayesh Rane
SSRN Electronic Journal (2023)
Closed Access | Times Cited: 24
Nitin Liladhar Rane, Saurabh Choudhary, Jayesh Rane
SSRN Electronic Journal (2023)
Closed Access | Times Cited: 24
A Survey on Physical Adversarial Attack in Computer Vision
Donghua Wang, Wen Yao, Tingsong Jiang, et al.
Research Square (Research Square) (2023)
Open Access | Times Cited: 23
Donghua Wang, Wen Yao, Tingsong Jiang, et al.
Research Square (Research Square) (2023)
Open Access | Times Cited: 23
Edge Learning for 6G-Enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses
Mohamed Amine Ferrag, Othmane Friha, Burak Kantarcı, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 4, pp. 2654-2713
Open Access | Times Cited: 22
Mohamed Amine Ferrag, Othmane Friha, Burak Kantarcı, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 4, pp. 2654-2713
Open Access | Times Cited: 22
Security and Privacy on Generative Data in AIGC: A Survey
Tao Wang, Yushu Zhang, Shuren Qi, et al.
ACM Computing Surveys (2024) Vol. 57, Iss. 4, pp. 1-34
Open Access | Times Cited: 12
Tao Wang, Yushu Zhang, Shuren Qi, et al.
ACM Computing Surveys (2024) Vol. 57, Iss. 4, pp. 1-34
Open Access | Times Cited: 12
Are artificial intelligence and blockchain the key to unlocking the box of clean energy?
Shengyao Yang, Meng Nan Zhu, Haiyan Yu
Energy Economics (2024) Vol. 134, pp. 107616-107616
Closed Access | Times Cited: 9
Shengyao Yang, Meng Nan Zhu, Haiyan Yu
Energy Economics (2024) Vol. 134, pp. 107616-107616
Closed Access | Times Cited: 9
Automation and Orchestration of Zero Trust Architecture: Potential Solutions and Challenges
Yang Cao, Shiva Raj Pokhrel, Ye Zhu, et al.
Deleted Journal (2024) Vol. 21, Iss. 2, pp. 294-317
Open Access | Times Cited: 8
Yang Cao, Shiva Raj Pokhrel, Ye Zhu, et al.
Deleted Journal (2024) Vol. 21, Iss. 2, pp. 294-317
Open Access | Times Cited: 8
Critical review of self‐diagnosis of mental health conditions using artificial intelligence
Supra Wimbarti, Bernabas H. R. Kairupan, Trina Ekawati Tallei
International Journal of Mental Health Nursing (2024) Vol. 33, Iss. 2, pp. 344-358
Closed Access | Times Cited: 8
Supra Wimbarti, Bernabas H. R. Kairupan, Trina Ekawati Tallei
International Journal of Mental Health Nursing (2024) Vol. 33, Iss. 2, pp. 344-358
Closed Access | Times Cited: 8
Blockchain, artificial intelligence, and healthcare: the tripod of future—a narrative review
Archana Bathula, Suneet Kumar Gupta, M. Suresh, et al.
Artificial Intelligence Review (2024) Vol. 57, Iss. 9
Open Access | Times Cited: 6
Archana Bathula, Suneet Kumar Gupta, M. Suresh, et al.
Artificial Intelligence Review (2024) Vol. 57, Iss. 9
Open Access | Times Cited: 6
Machine Learning Assisted Self‐Powered Identity Recognition Based on Thermogalvanic Hydrogel for Intelligent Security
Xueliang Ma, Wenxu Wang, Xiaojing Cui, et al.
Small (2024)
Closed Access | Times Cited: 5
Xueliang Ma, Wenxu Wang, Xiaojing Cui, et al.
Small (2024)
Closed Access | Times Cited: 5
Security, privacy, and robustness for trustworthy AI systems: A review
Mozamel M. Saeed, Mohammed Alsharidah
Computers & Electrical Engineering (2024) Vol. 119, pp. 109643-109643
Closed Access | Times Cited: 5
Mozamel M. Saeed, Mohammed Alsharidah
Computers & Electrical Engineering (2024) Vol. 119, pp. 109643-109643
Closed Access | Times Cited: 5
ChatGeoAI: Enabling Geospatial Analysis for Public through Natural Language, with Large Language Models
Ali Mansourian, Rachid Oucheikh
ISPRS International Journal of Geo-Information (2024) Vol. 13, Iss. 10, pp. 348-348
Open Access | Times Cited: 5
Ali Mansourian, Rachid Oucheikh
ISPRS International Journal of Geo-Information (2024) Vol. 13, Iss. 10, pp. 348-348
Open Access | Times Cited: 5
Spontaneous High-Dynamic-Range Random Current Spiking in BaF2 Memristors
Chen-Hsun Lin, Yung‐Tang Chuang, Cheng‐Yueh Chen, et al.
ACS Applied Electronic Materials (2025)
Open Access
Chen-Hsun Lin, Yung‐Tang Chuang, Cheng‐Yueh Chen, et al.
ACS Applied Electronic Materials (2025)
Open Access
Into the next generation of digital protection: AI resiliency as a public responsibility
Eli M. Noam
Telecommunications Policy (2025), pp. 102907-102907
Closed Access
Eli M. Noam
Telecommunications Policy (2025), pp. 102907-102907
Closed Access