
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Adversarial Attacks and Defenses in Deep Learning: From a Perspective of Cybersecurity
Shuai Zhou, Chi Liu, Dayong Ye, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 8, pp. 1-39
Closed Access | Times Cited: 64
Shuai Zhou, Chi Liu, Dayong Ye, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 8, pp. 1-39
Closed Access | Times Cited: 64
Showing 1-25 of 64 citing articles:
Artificial Intelligence
Sarvesh Kumar, U. S. Gupta, Arvind Kumar Singh, et al.
Deleted Journal (2023) Vol. 2, Iss. 3, pp. 31-42
Open Access | Times Cited: 77
Sarvesh Kumar, U. S. Gupta, Arvind Kumar Singh, et al.
Deleted Journal (2023) Vol. 2, Iss. 3, pp. 31-42
Open Access | Times Cited: 77
Local differential privacy and its applications: A comprehensive survey
Mengmeng Yang, Taolin Guo, Tianqing Zhu, et al.
Computer Standards & Interfaces (2023) Vol. 89, pp. 103827-103827
Open Access | Times Cited: 72
Mengmeng Yang, Taolin Guo, Tianqing Zhu, et al.
Computer Standards & Interfaces (2023) Vol. 89, pp. 103827-103827
Open Access | Times Cited: 72
When Deep Learning-Based Soft Sensors Encounter Reliability Challenges: A Practical Knowledge-Guided Adversarial Attack and Its Defense
Runyuan Guo, Han Liu, Ding Liu
IEEE Transactions on Industrial Informatics (2023) Vol. 20, Iss. 2, pp. 2702-2714
Closed Access | Times Cited: 47
Runyuan Guo, Han Liu, Ding Liu
IEEE Transactions on Industrial Informatics (2023) Vol. 20, Iss. 2, pp. 2702-2714
Closed Access | Times Cited: 47
How Deep Learning Sees the World: A Survey on Adversarial Attacks & Defenses
Joana C. Costa, Tiago Roxo, Hugo Proença, et al.
IEEE Access (2024) Vol. 12, pp. 61113-61136
Open Access | Times Cited: 18
Joana C. Costa, Tiago Roxo, Hugo Proença, et al.
IEEE Access (2024) Vol. 12, pp. 61113-61136
Open Access | Times Cited: 18
AI-driven fusion with cybersecurity: Exploring current trends, advanced techniques, future directions, and policy implications for evolving paradigms– A comprehensive review
Sijjad Ali, Jia Wang, Victor Chung Ming Leung
Information Fusion (2025), pp. 102922-102922
Closed Access | Times Cited: 2
Sijjad Ali, Jia Wang, Victor Chung Ming Leung
Information Fusion (2025), pp. 102922-102922
Closed Access | Times Cited: 2
Digital security by design
Petar Radanliev
Security Journal (2024) Vol. 37, Iss. 4, pp. 1640-1679
Open Access | Times Cited: 15
Petar Radanliev
Security Journal (2024) Vol. 37, Iss. 4, pp. 1640-1679
Open Access | Times Cited: 15
Enhancing Cybersecurity through AI and ML: Strategies, Challenges, and Future Directions
Maryam Roshanaei, Mahir R. Khan, Natalie N. Sylvester
Journal of Information Security (2024) Vol. 15, Iss. 03, pp. 320-339
Open Access | Times Cited: 13
Maryam Roshanaei, Mahir R. Khan, Natalie N. Sylvester
Journal of Information Security (2024) Vol. 15, Iss. 03, pp. 320-339
Open Access | Times Cited: 13
NIDS-DA: Detecting functionally preserved adversarial examples for network intrusion detection system using deep autoencoders
Vivek Kumar, Kamal Kumar, Maheep Singh, et al.
Expert Systems with Applications (2025), pp. 126513-126513
Closed Access | Times Cited: 1
Vivek Kumar, Kamal Kumar, Maheep Singh, et al.
Expert Systems with Applications (2025), pp. 126513-126513
Closed Access | Times Cited: 1
Towards regulatory generative AI in ophthalmology healthcare: a security and privacy perspective
Yueye Wang, Chi Liu, Keyao Zhou, et al.
British Journal of Ophthalmology (2024) Vol. 108, Iss. 10, pp. 1349-1353
Closed Access | Times Cited: 7
Yueye Wang, Chi Liu, Keyao Zhou, et al.
British Journal of Ophthalmology (2024) Vol. 108, Iss. 10, pp. 1349-1353
Closed Access | Times Cited: 7
Label-Only Model Inversion Attacks: Attack With the Least Information
Tianqing Zhu, Dayong Ye, Shuai Zhou, et al.
IEEE Transactions on Information Forensics and Security (2022) Vol. 18, pp. 991-1005
Closed Access | Times Cited: 24
Tianqing Zhu, Dayong Ye, Shuai Zhou, et al.
IEEE Transactions on Information Forensics and Security (2022) Vol. 18, pp. 991-1005
Closed Access | Times Cited: 24
Resilience and Resilient Systems of Artificial Intelligence: Taxonomy, Models and Methods
Viacheslav Moskalenko, Vyacheslav Kharchenko, Alona Moskalenko, et al.
Algorithms (2023) Vol. 16, Iss. 3, pp. 165-165
Open Access | Times Cited: 14
Viacheslav Moskalenko, Vyacheslav Kharchenko, Alona Moskalenko, et al.
Algorithms (2023) Vol. 16, Iss. 3, pp. 165-165
Open Access | Times Cited: 14
Boosting Model Inversion Attacks With Adversarial Examples
Shuai Zhou, Tianqing Zhu, Dayong Ye, et al.
IEEE Transactions on Dependable and Secure Computing (2023) Vol. 21, Iss. 3, pp. 1451-1468
Open Access | Times Cited: 12
Shuai Zhou, Tianqing Zhu, Dayong Ye, et al.
IEEE Transactions on Dependable and Secure Computing (2023) Vol. 21, Iss. 3, pp. 1451-1468
Open Access | Times Cited: 12
A Survey on Attacks and Their Countermeasures in Deep Learning: Applications in Deep Neural Networks, Federated, Transfer, and Deep Reinforcement Learning
Haider Ali, Dian Chen, Matthew Harrington, et al.
IEEE Access (2023) Vol. 11, pp. 120095-120130
Open Access | Times Cited: 11
Haider Ali, Dian Chen, Matthew Harrington, et al.
IEEE Access (2023) Vol. 11, pp. 120095-120130
Open Access | Times Cited: 11
Enhancing Brain Tumor Detection Through Custom Convolutional Neural Networks and Interpretability-Driven Analysis
Kavinda Ashan Kulasinghe Wasalamuni Dewage, Raza Hasan, Bacha Rehman, et al.
Information (2024) Vol. 15, Iss. 10, pp. 653-653
Open Access | Times Cited: 4
Kavinda Ashan Kulasinghe Wasalamuni Dewage, Raza Hasan, Bacha Rehman, et al.
Information (2024) Vol. 15, Iss. 10, pp. 653-653
Open Access | Times Cited: 4
Safeguarding Sensitive Data in the DevSecOps Pipelines
A Patel, Pravin Pandey
IGI Global eBooks (2025), pp. 215-240
Closed Access
A Patel, Pravin Pandey
IGI Global eBooks (2025), pp. 215-240
Closed Access
Gentle local robustness implies generalization
Khoat Than, Dat Phan, Giang Vu
Machine Learning (2025) Vol. 114, Iss. 6
Closed Access
Khoat Than, Dat Phan, Giang Vu
Machine Learning (2025) Vol. 114, Iss. 6
Closed Access
Black-box Adversarial Attack Defense Approach: An Empirical Analysis from Cybersecurity Perceptive
Kousik Barik, Sanjay Misra, Inés López-Baldominos
Results in Engineering (2025), pp. 105177-105177
Open Access
Kousik Barik, Sanjay Misra, Inés López-Baldominos
Results in Engineering (2025), pp. 105177-105177
Open Access
Hybrid resampling and weighted majority voting for multi-class anomaly detection on imbalanced malware and network traffic data
Liang Xue, Tianqing Zhu
Engineering Applications of Artificial Intelligence (2023) Vol. 128, pp. 107568-107568
Closed Access | Times Cited: 10
Liang Xue, Tianqing Zhu
Engineering Applications of Artificial Intelligence (2023) Vol. 128, pp. 107568-107568
Closed Access | Times Cited: 10
Evasion Attack and Defense on Machine Learning Models in Cyber-Physical Systems: A Survey
Shunyao Wang, Ryan K. L. Ko, Guangdong Bai, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 26, Iss. 2, pp. 930-966
Open Access | Times Cited: 10
Shunyao Wang, Ryan K. L. Ko, Guangdong Bai, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 26, Iss. 2, pp. 930-966
Open Access | Times Cited: 10
Defending against gradient inversion attacks in federated learning via statistical machine unlearning
Kun Gao, Tianqing Zhu, Dayong Ye, et al.
Knowledge-Based Systems (2024) Vol. 299, pp. 111983-111983
Closed Access | Times Cited: 3
Kun Gao, Tianqing Zhu, Dayong Ye, et al.
Knowledge-Based Systems (2024) Vol. 299, pp. 111983-111983
Closed Access | Times Cited: 3
Deep Learning in Palmprint Recognition-A Comprehensive Survey
Chengrui Gao, Ziyuan Yang, Wei Jia, et al.
(2025)
Open Access
Chengrui Gao, Ziyuan Yang, Wei Jia, et al.
(2025)
Open Access
Impact of Machine Learning and AI on Cybersecurity Risks and Opportunities
Anjana Dilhara
(2025)
Closed Access
Anjana Dilhara
(2025)
Closed Access
A Scheme of Dynamic Location Privacy-Preserving with Blockchain in Intelligent Transportation System
Xuhan Zuo, Minghao Wang, Dayong Ye, et al.
Lecture notes in computer science (2025), pp. 21-39
Closed Access
Xuhan Zuo, Minghao Wang, Dayong Ye, et al.
Lecture notes in computer science (2025), pp. 21-39
Closed Access
A survey on machine unlearning: Techniques and new emerged privacy risks
Hengzhu Liu, Ping Xiong, Tianqing Zhu, et al.
Journal of Information Security and Applications (2025) Vol. 90, pp. 104010-104010
Closed Access
Hengzhu Liu, Ping Xiong, Tianqing Zhu, et al.
Journal of Information Security and Applications (2025) Vol. 90, pp. 104010-104010
Closed Access
Proposition of a Novel Type of Attacks Targetting Explainable AI Algorithms in Cybersecurity
Sebastian Szelest, Marek Pawlicki, Aleksandra Pawlicka, et al.
Lecture notes in computer science (2025), pp. 289-304
Closed Access
Sebastian Szelest, Marek Pawlicki, Aleksandra Pawlicka, et al.
Lecture notes in computer science (2025), pp. 289-304
Closed Access