OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

NormalAttack: Curvature-Aware Shape Deformation along Normals for Imperceptible Point Cloud Attack
Keke Tang, Yawen Shi, Jianpeng Wu, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-11
Open Access | Times Cited: 9

Showing 9 citing articles:

Rethinking Perturbation Directions for Imperceptible Adversarial Attacks on Point Clouds
Keke Tang, Yawen Shi, Tianrui Lou, et al.
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 6, pp. 5158-5169
Closed Access | Times Cited: 30

Manifold Constraints for Imperceptible Adversarial Attacks on Point Clouds
Keke Tang, Xu He, Weilong Peng, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2024) Vol. 38, Iss. 6, pp. 5127-5135
Open Access | Times Cited: 5

Deep Manifold Attack on Point Clouds via Parameter Plane Stretching
Keke Tang, Jianpeng Wu, Weilong Peng, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2023) Vol. 37, Iss. 2, pp. 2420-2428
Open Access | Times Cited: 9

Adversarial Attacks and Defenses on 3D Point Cloud Classification: A Survey
Hanieh Naderi, Ivan V. Bajić
IEEE Access (2023) Vol. 11, pp. 144274-144295
Open Access | Times Cited: 3

AdvSCOD: Bayesian-Based Out-Of-Distribution Detection via Curvature Sketching and Adversarial Sample Enrichment
Jiacheng Qiao, Chengzhi Zhong, Peican Zhu, et al.
Mathematics (2023) Vol. 11, Iss. 3, pp. 692-692
Open Access | Times Cited: 2

Clustering and Segmentation of Adhesive Pests in Apple Orchards Based on GMM-DC
Yunfei Wang, Shuangxi Liu, Zhuo Ren, et al.
Agronomy (2023) Vol. 13, Iss. 11, pp. 2806-2806
Open Access | Times Cited: 2

Enhancing Adversarial Robustness via Anomaly-aware Adversarial Training
Keke Tang, Tianrui Lou, Xu He, et al.
Lecture notes in computer science (2023), pp. 328-342
Closed Access | Times Cited: 1

DBA: An Efficient Approach to Boost Transfer-Based Adversarial Attack Performance Through Information Deletion
Zepeng Fan, Peican Zhu, Chao Gao, et al.
Lecture notes in computer science (2023), pp. 276-288
Closed Access | Times Cited: 1

Are Deep Point Cloud Classifiers Suffer From Out-of-distribution Overconfidence Issue?
Xu He, Keke Tang, Yawen Shi, et al.
2022 IEEE International Conference on Systems, Man, and Cybernetics (SMC) (2023) Vol. 31, pp. 2620-2627
Closed Access | Times Cited: 1

Page 1

Scroll to top