OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Adversarial Attacks and Defenses in Deep Learning: From a Perspective of Cybersecurity
Shuai Zhou, Chi Liu, Dayong Ye, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 8, pp. 1-39
Closed Access | Times Cited: 64

Showing 1-25 of 64 citing articles:

Artificial Intelligence
Sarvesh Kumar, U. S. Gupta, Arvind Kumar Singh, et al.
Deleted Journal (2023) Vol. 2, Iss. 3, pp. 31-42
Open Access | Times Cited: 77

Local differential privacy and its applications: A comprehensive survey
Mengmeng Yang, Taolin Guo, Tianqing Zhu, et al.
Computer Standards & Interfaces (2023) Vol. 89, pp. 103827-103827
Open Access | Times Cited: 72

When Deep Learning-Based Soft Sensors Encounter Reliability Challenges: A Practical Knowledge-Guided Adversarial Attack and Its Defense
Runyuan Guo, Han Liu, Ding Liu
IEEE Transactions on Industrial Informatics (2023) Vol. 20, Iss. 2, pp. 2702-2714
Closed Access | Times Cited: 47

How Deep Learning Sees the World: A Survey on Adversarial Attacks & Defenses
Joana C. Costa, Tiago Roxo, Hugo Proença, et al.
IEEE Access (2024) Vol. 12, pp. 61113-61136
Open Access | Times Cited: 18

AI-driven fusion with cybersecurity: Exploring current trends, advanced techniques, future directions, and policy implications for evolving paradigms– A comprehensive review
Sijjad Ali, Jia Wang, Victor Chung Ming Leung
Information Fusion (2025), pp. 102922-102922
Closed Access | Times Cited: 2

Digital security by design
Petar Radanliev
Security Journal (2024) Vol. 37, Iss. 4, pp. 1640-1679
Open Access | Times Cited: 15

Enhancing Cybersecurity through AI and ML: Strategies, Challenges, and Future Directions
Maryam Roshanaei, Mahir R. Khan, Natalie N. Sylvester
Journal of Information Security (2024) Vol. 15, Iss. 03, pp. 320-339
Open Access | Times Cited: 13

NIDS-DA: Detecting functionally preserved adversarial examples for network intrusion detection system using deep autoencoders
Vivek Kumar, Kamal Kumar, Maheep Singh, et al.
Expert Systems with Applications (2025), pp. 126513-126513
Closed Access | Times Cited: 1

Towards regulatory generative AI in ophthalmology healthcare: a security and privacy perspective
Yueye Wang, Chi Liu, Keyao Zhou, et al.
British Journal of Ophthalmology (2024) Vol. 108, Iss. 10, pp. 1349-1353
Closed Access | Times Cited: 7

Label-Only Model Inversion Attacks: Attack With the Least Information
Tianqing Zhu, Dayong Ye, Shuai Zhou, et al.
IEEE Transactions on Information Forensics and Security (2022) Vol. 18, pp. 991-1005
Closed Access | Times Cited: 24

Resilience and Resilient Systems of Artificial Intelligence: Taxonomy, Models and Methods
Viacheslav Moskalenko, Vyacheslav Kharchenko, Alona Moskalenko, et al.
Algorithms (2023) Vol. 16, Iss. 3, pp. 165-165
Open Access | Times Cited: 14

Boosting Model Inversion Attacks With Adversarial Examples
Shuai Zhou, Tianqing Zhu, Dayong Ye, et al.
IEEE Transactions on Dependable and Secure Computing (2023) Vol. 21, Iss. 3, pp. 1451-1468
Open Access | Times Cited: 12

Enhancing Brain Tumor Detection Through Custom Convolutional Neural Networks and Interpretability-Driven Analysis
Kavinda Ashan Kulasinghe Wasalamuni Dewage, Raza Hasan, Bacha Rehman, et al.
Information (2024) Vol. 15, Iss. 10, pp. 653-653
Open Access | Times Cited: 4

Safeguarding Sensitive Data in the DevSecOps Pipelines
A Patel, Pravin Pandey
IGI Global eBooks (2025), pp. 215-240
Closed Access

Gentle local robustness implies generalization
Khoat Than, Dat Phan, Giang Vu
Machine Learning (2025) Vol. 114, Iss. 6
Closed Access

Black-box Adversarial Attack Defense Approach: An Empirical Analysis from Cybersecurity Perceptive
Kousik Barik, Sanjay Misra, Inés López-Baldominos
Results in Engineering (2025), pp. 105177-105177
Open Access

Hybrid resampling and weighted majority voting for multi-class anomaly detection on imbalanced malware and network traffic data
Liang Xue, Tianqing Zhu
Engineering Applications of Artificial Intelligence (2023) Vol. 128, pp. 107568-107568
Closed Access | Times Cited: 10

Evasion Attack and Defense on Machine Learning Models in Cyber-Physical Systems: A Survey
Shunyao Wang, Ryan K. L. Ko, Guangdong Bai, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 26, Iss. 2, pp. 930-966
Open Access | Times Cited: 10

Defending against gradient inversion attacks in federated learning via statistical machine unlearning
Kun Gao, Tianqing Zhu, Dayong Ye, et al.
Knowledge-Based Systems (2024) Vol. 299, pp. 111983-111983
Closed Access | Times Cited: 3

Deep Learning in Palmprint Recognition-A Comprehensive Survey
Chengrui Gao, Ziyuan Yang, Wei Jia, et al.
(2025)
Open Access

A Scheme of Dynamic Location Privacy-Preserving with Blockchain in Intelligent Transportation System
Xuhan Zuo, Minghao Wang, Dayong Ye, et al.
Lecture notes in computer science (2025), pp. 21-39
Closed Access

A survey on machine unlearning: Techniques and new emerged privacy risks
Hengzhu Liu, Ping Xiong, Tianqing Zhu, et al.
Journal of Information Security and Applications (2025) Vol. 90, pp. 104010-104010
Closed Access

Proposition of a Novel Type of Attacks Targetting Explainable AI Algorithms in Cybersecurity
Sebastian Szelest, Marek Pawlicki, Aleksandra Pawlicka, et al.
Lecture notes in computer science (2025), pp. 289-304
Closed Access

Page 1 - Next Page

Scroll to top