OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Survey on Physical Adversarial Attack in Computer Vision
Donghua Wang, Wen Yao, Tingsong Jiang, et al.
Research Square (Research Square) (2023)
Open Access | Times Cited: 23

Showing 23 citing articles:

A Tutorial on Federated Learning from Theory to Practice: Foundations, Software Frameworks, Exemplary Use Cases, and Selected Trends
M. Victoria Luzón, Nuria Rodríguez-Barroso, Alberto Argente-Garrido, et al.
IEEE/CAA Journal of Automatica Sinica (2024) Vol. 11, Iss. 4, pp. 824-850
Closed Access | Times Cited: 19

Adversarial Attacks and Defenses in Machine Learning-Empowered Communication Systems and Networks: A Contemporary Survey
Yulong Wang, Tong Sun, Shenghong Li, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 25, Iss. 4, pp. 2245-2298
Closed Access | Times Cited: 38

A Comprehensive Study on the Robustness of Image Classification and Object Detection in Remote Sensing: Surveying and Benchmarking
Shaohui Mei, Jiawei Lian, Xiaofei Wang, et al.
Journal of Remote Sensing (2024) Vol. 4
Open Access | Times Cited: 10

Physical Adversarial Attacks for Camera-Based Smart Systems: Current Trends, Categorization, Applications, Research Challenges, and Future Outlook
Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, et al.
IEEE Access (2023) Vol. 11, pp. 109617-109668
Open Access | Times Cited: 13

Deep learning adversarial attacks and defenses in autonomous vehicles: a systematic literature review from a safety perspective
Ahmed Dawod Mohammed Ibrahum, Manzoor Hussain, Jang‐Eui Hong
Artificial Intelligence Review (2024) Vol. 58, Iss. 1
Open Access | Times Cited: 5

Adversarial Manhole: Challenging Monocular Depth Estimation and Semantic Segmentation Models with Patch Attack
Naufal Suryanto, Andro Aprila Adiputra, Ahmada Yusril Kadiptya, et al.
Lecture notes in computer science (2025), pp. 299-310
Closed Access

ConstScene: A Dataset and Model for Advancing Robust Semantic Segmentation in Construction Environment
Maghsood Salimi, Mohammad Loni, Sara Afshar, et al.
Lecture notes in computer science (2025), pp. 242-253
Closed Access

Physical Adversarial Attack Meets Computer Vision: A Decade Survey
Hui Wei, Hao Tang, Xuemei Jia, et al.
IEEE Transactions on Pattern Analysis and Machine Intelligence (2024) Vol. 46, Iss. 12, pp. 9797-9817
Open Access | Times Cited: 4

A review of black-box adversarial attacks on image classification
Yanfei Zhu, Yaochi Zhao, Zhuhua Hu, et al.
Neurocomputing (2024) Vol. 610, pp. 128512-128512
Closed Access | Times Cited: 4

Increasing Neural-Based Pedestrian Detectors’ Robustness to Adversarial Patch Attacks Using Anomaly Localization
O. V. Ilina, М. В. Терешонок, Vadim Ziyadinov
Journal of Imaging (2025) Vol. 11, Iss. 1, pp. 26-26
Open Access

Security Risk and Attacks in AI: A Survey of Security and Privacy
Md. Mostafizur Rahman, Aiasha Siddika Arshi, Md. Mehedi Hasan, et al.
2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) (2023), pp. 1834-1839
Closed Access | Times Cited: 9

ACTIVE: Towards Highly Transferable 3D Physical Camouflage for Universal and Robust Vehicle Evasion
Naufal Suryanto, Yongsu Kim, Harashta Tatimma Larasati, et al.
2021 IEEE/CVF International Conference on Computer Vision (ICCV) (2023), pp. 4282-4291
Open Access | Times Cited: 9

Energy-Efficient Resource Allocation in Generative AI-Aided Secure Semantic Mobile Networks
Jie Zheng, Baoxia Du, Hongyang Du, et al.
IEEE Transactions on Mobile Computing (2024) Vol. 23, Iss. 12, pp. 11422-11435
Closed Access | Times Cited: 3

From Pixel to Peril: Investigating Adversarial Attacks on Aerial Imagery Through Comprehensive Review and Prospective Trajectories
Syed M Kazam Abbas Kazmi, Nayyer Aafaq, Mansoor Ahmed Khan, et al.
IEEE Access (2023) Vol. 11, pp. 81256-81278
Open Access | Times Cited: 4

Segmentation-based ID preserving iris synthesis using generative adversarial networks
Vijay Kakani, Cheng‐Bin Jin, Hakil Kim
Multimedia Tools and Applications (2023) Vol. 83, Iss. 9, pp. 27589-27617
Closed Access | Times Cited: 4

Attention-Based Real-Time Defenses for Physical Adversarial Attacks in Vision Applications
Giulio Rossolini, Alessandro Biondi, Giorgio Buttazzo
(2024), pp. 23-32
Open Access | Times Cited: 1

Physical Adversarial Attacks against Aerial Object Detection with Feature-aligned Expandable Textures
Yu Zhang, Jianqi Chen, Zhenbang Peng, et al.
IEEE Transactions on Geoscience and Remote Sensing (2024) Vol. 62, pp. 1-15
Closed Access | Times Cited: 1

A Human-in-the-Middle Attack against Object Detection Systems
Han Wu, Sareh Rowlands, Johan Wahlström
IEEE Transactions on Artificial Intelligence (2024) Vol. 5, Iss. 10, pp. 4884-4892
Open Access | Times Cited: 1

Adversarial Attacks on Aerial Imagery : The State-of-the-Art and Perspective
Syed M. Kazam Abbas Kazmi, Nayyer Aafaq, Mansoor Ahmad Khan, et al.
(2023), pp. 95-102
Closed Access | Times Cited: 2

Benchmarking Image Classifiers for Physical Out-of-Distribution Examples Detection
Ojaswee, Akshay Agarwal, Nalini Ratha
(2023), pp. 4429-4437
Closed Access | Times Cited: 2

Black box phase-based adversarial attacks on image classifiers
Scott G. Hodes, Kory J. Blose, Timothy J. Kane
(2024)
Closed Access

An Evolutionary Algorithm with Variable-Length Chromosome for Multi-objective Minimalistic Attack
Chengyu Zhou, Yaqing Hou, Wenqiang Ma, et al.
(2024), pp. 195-199
Closed Access

Deceiving Airborne Object Detectors Using Adversarial AI
Syed M Kazam Abbas Kazmi, Nayyer Aafaq, Mansoor Ahmed Khan, et al.
(2023), pp. 227-234
Closed Access

Page 1

Scroll to top