OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Survey of Adversarial Defenses and Robustness in NLP
Shreya Goyal, Sumanth Doddapaneni, Mitesh M. Khapra, et al.
ACM Computing Surveys (2023) Vol. 55, Iss. 14s, pp. 1-39
Closed Access | Times Cited: 53

Showing 1-25 of 53 citing articles:

How Deep Learning Sees the World: A Survey on Adversarial Attacks & Defenses
Joana C. Costa, Tiago Roxo, Hugo Proença, et al.
IEEE Access (2024) Vol. 12, pp. 61113-61136
Open Access | Times Cited: 14

Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network
Kousik Barik, Sanjay Misra, Luis Fernández Sanz
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 2353-2376
Open Access | Times Cited: 8

Digital security by design
Petar Radanliev
Security Journal (2024) Vol. 37, Iss. 4, pp. 1640-1679
Open Access | Times Cited: 8

A survey on LLM-based multi-agent systems: workflow, infrastructure, and challenges
Xinyi Li, S. Wang, Siqi Zeng, et al.
Vicinagearth. (2024) Vol. 1, Iss. 1
Open Access | Times Cited: 8

Evading text based emotion detection mechanism via adversarial attacks
Ashish Bajaj, Dinesh Kumar Vishwakarma
Neurocomputing (2023) Vol. 558, pp. 126787-126787
Closed Access | Times Cited: 17

Prompt-based learning framework for zero-shot cross-lingual text classification
Kai Feng, Lan Huang, Kangping Wang, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 133, pp. 108481-108481
Closed Access | Times Cited: 6

Inflect-text: a novel mechanism to evade neural text classifiers by leveraging word inflectional perturbations
Ashish Bajaj, Dinesh Kumar Vishwakarma
International Journal of Information Security (2025) Vol. 24, Iss. 1
Closed Access

Securing NLP Systems: A Comprehensive AI-Based Approach
Huang Jian, Chih Ted Yang, W. Z. Wang
Smart innovation, systems and technologies (2025), pp. 129-141
Closed Access

Adversarial Robustness of Neural Networks From the Perspective of Lipschitz Calculus: A Survey
Monty-Maximilian Zühlke, Daniel Kudenko⋆
ACM Computing Surveys (2024)
Open Access | Times Cited: 4

A semi-supervised framework for computational fluid dynamics prediction
Xiao Wang, Yidao Dong, Shufan Zou, et al.
Applied Soft Computing (2024) Vol. 154, pp. 111422-111422
Closed Access | Times Cited: 4

Adversarial attacks and defenses for large language models (LLMs): methods, frameworks & challenges
Pranjal Kumar
International Journal of Multimedia Information Retrieval (2024) Vol. 13, Iss. 3
Closed Access | Times Cited: 4

Dynamic Spatiotemporal Correlation Graph Convolutional Network for Traffic Speed Prediction
Chenyang Cao, Yinxin Bao, Quan Shi, et al.
Symmetry (2024) Vol. 16, Iss. 3, pp. 308-308
Open Access | Times Cited: 3

ATTACKS AND DEFENSE METHODS IN MACHINE LEARNING SYSTEMS: ANALYSIS OF MODERN RESEARCH
Igor Kotenko, Igor Saenko, Oleg Lauta, et al.
Voprosy kiberbezopasnosti (2024), Iss. 1 (59)
Open Access | Times Cited: 2

Implications of Minimum Description Length for Adversarial Attack in Natural Language Processing
Kshitiz Tiwari, Lu Zhang
Entropy (2024) Vol. 26, Iss. 5, pp. 354-354
Open Access | Times Cited: 2

RAG-Ex: A Generic Framework for Explaining Retrieval Augmented Generation
Viju Sudhi, Sinchana Ramakanth Bhat, Max Rudat, et al.
Proceedings of the 45th International ACM SIGIR Conference on Research and Development in Information Retrieval (2024), pp. 2776-2780
Closed Access | Times Cited: 2

Adversarial attacks and defenses on text-to-image diffusion models: A survey
Chenyu Zhang, Mingwang Hu, Wenhui Li, et al.
Information Fusion (2024), pp. 102701-102701
Closed Access | Times Cited: 2

ATTACKS AND DEFENSE METHODS IN MACHINE LEARNING SYSTEMS: ANALYSIS OF MODERN RESEARCH
Igor Kotenko, Igor Saenko, Oleg Lauta, et al.
Voprosy kiberbezopasnosti (2024), Iss. 1 (59)
Open Access | Times Cited: 1

Non-Alpha-Num: a novel architecture for generating adversarial examples for bypassing NLP-based clickbait detection mechanisms
Ashish Bajaj, Dinesh Kumar Vishwakarma
International Journal of Information Security (2024) Vol. 23, Iss. 4, pp. 2711-2737
Closed Access | Times Cited: 1

A Survey of Adversarial Attacks: An Open Issue for Deep Learning Sentiment Analysis Models
Monserrat Vázquez-Hernández, Luis Alberto Morales-Rosales, Ignacio Algredo‐Badillo, et al.
Applied Sciences (2024) Vol. 14, Iss. 11, pp. 4614-4614
Open Access | Times Cited: 1

LUNA: A Model-Based Universal Analysis Framework for Large Language Models
Da Song, Xuan Xie, Jiayang Song, et al.
IEEE Transactions on Software Engineering (2024) Vol. 50, Iss. 7, pp. 1921-1948
Closed Access | Times Cited: 1

TextJuggler: Fooling text classification tasks by generating high-quality adversarial examples
Hao Peng, Zhe Wang, Chao Wei, et al.
Knowledge-Based Systems (2024) Vol. 300, pp. 112188-112188
Closed Access | Times Cited: 1

Generative AI in Network Security and Intrusion Detection
Siva Raja Sindiramutty, Krishna Raj V. Prabagaran, N. Z. Jhanjhi, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 77-124
Closed Access | Times Cited: 1

Page 1 - Next Page

Scroll to top