
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Transferable Graph Backdoor Attack
Shuiqiao Yang, Bao Gia Doan, Paul Montague, et al.
(2022), pp. 321-332
Open Access | Times Cited: 20
Shuiqiao Yang, Bao Gia Doan, Paul Montague, et al.
(2022), pp. 321-332
Open Access | Times Cited: 20
Showing 20 citing articles:
Robust cross-network node classification via constrained graph mutual information
Shuiqiao Yang, Borui Cai, Taotao Cai, et al.
Knowledge-Based Systems (2022) Vol. 257, pp. 109852-109852
Closed Access | Times Cited: 43
Shuiqiao Yang, Borui Cai, Taotao Cai, et al.
Knowledge-Based Systems (2022) Vol. 257, pp. 109852-109852
Closed Access | Times Cited: 43
Multi-target label backdoor attacks on graph neural networks
Kaiyang Wang, Huaxin Deng, Yijia Xu, et al.
Pattern Recognition (2024) Vol. 152, pp. 110449-110449
Closed Access | Times Cited: 6
Kaiyang Wang, Huaxin Deng, Yijia Xu, et al.
Pattern Recognition (2024) Vol. 152, pp. 110449-110449
Closed Access | Times Cited: 6
A graph backdoor detection method for data collection scenarios
Xiaogang Xing, Ming Xu, Yujing Bai, et al.
Cybersecurity (2025) Vol. 8, Iss. 1
Open Access
Xiaogang Xing, Ming Xu, Yujing Bai, et al.
Cybersecurity (2025) Vol. 8, Iss. 1
Open Access
Lurker: Backdoor attack-based explainable rumor detection on online media
Yao Lin, Wenhui Xue, Congrui Bai, et al.
Science Progress (2025) Vol. 108, Iss. 1
Open Access
Yao Lin, Wenhui Xue, Congrui Bai, et al.
Science Progress (2025) Vol. 108, Iss. 1
Open Access
Unleashing the power of indirect attacks against trust prediction via preferential path
Yu Bu, Yulin Zhu, Longling Geng, et al.
Knowledge and Information Systems (2025)
Open Access
Yu Bu, Yulin Zhu, Longling Geng, et al.
Knowledge and Information Systems (2025)
Open Access
Feature-Based Graph Backdoor Attack in the Node Classification Task
Yang Chen, Zhonglin Ye, Haixing Zhao, et al.
International Journal of Intelligent Systems (2023) Vol. 2023, pp. 1-13
Open Access | Times Cited: 8
Yang Chen, Zhonglin Ye, Haixing Zhao, et al.
International Journal of Intelligent Systems (2023) Vol. 2023, pp. 1-13
Open Access | Times Cited: 8
Link-Backdoor: Backdoor Attack on Link Prediction via Node Injection
Haibin Zheng, Haiyang Xiong, Haonan Ma, et al.
IEEE Transactions on Computational Social Systems (2023) Vol. 11, Iss. 2, pp. 1816-1831
Open Access | Times Cited: 7
Haibin Zheng, Haiyang Xiong, Haonan Ma, et al.
IEEE Transactions on Computational Social Systems (2023) Vol. 11, Iss. 2, pp. 1816-1831
Open Access | Times Cited: 7
A semantic backdoor attack against graph convolutional networks
Jiazhu Dai, Zhipeng Xiong, Chenhong Cao
Neurocomputing (2024) Vol. 600, pp. 128133-128133
Open Access | Times Cited: 2
Jiazhu Dai, Zhipeng Xiong, Chenhong Cao
Neurocomputing (2024) Vol. 600, pp. 128133-128133
Open Access | Times Cited: 2
State of the art on adversarial attacks and defenses in graphs
Zhengli Zhai, Penghui Li, Feng Shu
Neural Computing and Applications (2023) Vol. 35, Iss. 26, pp. 18851-18872
Closed Access | Times Cited: 5
Zhengli Zhai, Penghui Li, Feng Shu
Neural Computing and Applications (2023) Vol. 35, Iss. 26, pp. 18851-18872
Closed Access | Times Cited: 5
Effective Backdoor Attack on Graph Neural Networks in Spectral Domain
Xiangyu Zhao, Hanzhou Wu, Xinpeng Zhang
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 7, pp. 12102-12114
Closed Access | Times Cited: 3
Xiangyu Zhao, Hanzhou Wu, Xinpeng Zhang
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 7, pp. 12102-12114
Closed Access | Times Cited: 3
Imperceptible graph injection attack on graph neural networks
Yang Chen, Zhonglin Ye, Zhaoyang Wang, et al.
Complex & Intelligent Systems (2023) Vol. 10, Iss. 1, pp. 869-883
Open Access | Times Cited: 3
Yang Chen, Zhonglin Ye, Zhaoyang Wang, et al.
Complex & Intelligent Systems (2023) Vol. 10, Iss. 1, pp. 869-883
Open Access | Times Cited: 3
MagicGAN: Multiagent Attacks Generate Interferential Category via GAN
Yong Chen, Xu Wang, Peng Hu, et al.
Knowledge-Based Systems (2022) Vol. 258, pp. 110023-110023
Closed Access | Times Cited: 5
Yong Chen, Xu Wang, Peng Hu, et al.
Knowledge-Based Systems (2022) Vol. 258, pp. 110023-110023
Closed Access | Times Cited: 5
Multiple-model and time-sensitive dynamic active learning for recurrent graph convolutional network model extraction attacks
Zhuo Zeng, Chengliang Wang, Fei Ma, et al.
International Journal of Machine Learning and Cybernetics (2023) Vol. 15, Iss. 2, pp. 383-404
Closed Access | Times Cited: 2
Zhuo Zeng, Chengliang Wang, Fei Ma, et al.
International Journal of Machine Learning and Cybernetics (2023) Vol. 15, Iss. 2, pp. 383-404
Closed Access | Times Cited: 2
Black-Box Graph Backdoor Defense
Xiao Yang, Gaolei Li, Xiaoyi Tao, et al.
Lecture notes in computer science (2024), pp. 163-180
Closed Access
Xiao Yang, Gaolei Li, Xiaoyi Tao, et al.
Lecture notes in computer science (2024), pp. 163-180
Closed Access
DefenseVGAE: Defending Against Adversarial Attacks on Graph Data via a Variational Graph Autoencoder
Ao Zhang, Jinwen Ma
Lecture notes in computer science (2024), pp. 313-324
Closed Access
Ao Zhang, Jinwen Ma
Lecture notes in computer science (2024), pp. 313-324
Closed Access
Unleashing the Power of Indirect Attacks against Trust Prediction via Preferential Path
Yu Bu, Yulin Zhu, Longling Geng, et al.
Research Square (Research Square) (2023)
Open Access | Times Cited: 1
Yu Bu, Yulin Zhu, Longling Geng, et al.
Research Square (Research Square) (2023)
Open Access | Times Cited: 1
A practical adversarial attack on Graph Neural Networks by attacking single node structure
Yang Chen, Zhonglin Ye, Haixing Zhao, et al.
(2022), pp. 143-152
Closed Access | Times Cited: 1
Yang Chen, Zhonglin Ye, Haixing Zhao, et al.
(2022), pp. 143-152
Closed Access | Times Cited: 1
Transferability of Evasion Attacks in Machine Learning Models
Lourdu Mahimai Doss P, M. Gunasekaran
(2023), pp. 1-6
Closed Access
Lourdu Mahimai Doss P, M. Gunasekaran
(2023), pp. 1-6
Closed Access
Research on Backdoor Attack against Deep Graph Neural Network
Yukai Gao, Jing Huang
(2023), pp. 15-18
Closed Access
Yukai Gao, Jing Huang
(2023), pp. 15-18
Closed Access
Are Graph Neural Network Explainers Robust to Graph Noises?
Yiqiao Li, Sunny Verma, Shuiqiao Yang, et al.
Lecture notes in computer science (2022), pp. 161-174
Closed Access
Yiqiao Li, Sunny Verma, Shuiqiao Yang, et al.
Lecture notes in computer science (2022), pp. 161-174
Closed Access