
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Adversarial machine learning :
Apostol Vassilev, Alina Oprea, Alie Jean Fordyce, et al.
(2024)
Open Access | Times Cited: 43
Apostol Vassilev, Alina Oprea, Alie Jean Fordyce, et al.
(2024)
Open Access | Times Cited: 43
Showing 1-25 of 43 citing articles:
A Comparative Analysis of Large Language Models to Evaluate Robustness and Reliability in Adversarial Conditions
Takeshi Goto, Kensuke Ono, Akira Morita
(2024)
Open Access | Times Cited: 18
Takeshi Goto, Kensuke Ono, Akira Morita
(2024)
Open Access | Times Cited: 18
Security and Privacy Challenges of Large Language Models: A Survey
Badhan Chandra Das, M. Hadi Amini, Yanzhao Wu
ACM Computing Surveys (2025)
Open Access | Times Cited: 9
Badhan Chandra Das, M. Hadi Amini, Yanzhao Wu
ACM Computing Surveys (2025)
Open Access | Times Cited: 9
SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
Hadi Abdullah, Kevin Warren, Vincent Bindschaedler, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2021), pp. 730-747
Open Access | Times Cited: 72
Hadi Abdullah, Kevin Warren, Vincent Bindschaedler, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2021), pp. 730-747
Open Access | Times Cited: 72
An Evaluation of the Safety of ChatGPT with Malicious Prompt Injection
Jiang Han, Mingming Guo
Research Square (Research Square) (2024)
Open Access | Times Cited: 11
Jiang Han, Mingming Guo
Research Square (Research Square) (2024)
Open Access | Times Cited: 11
Exploiting Privacy Vulnerabilities in Open Source LLMs Using Maliciously Crafted Prompts
Géraud Choquet, Aimée Aizier, Gwenaëlle Bernollin
Research Square (Research Square) (2024)
Open Access | Times Cited: 11
Géraud Choquet, Aimée Aizier, Gwenaëlle Bernollin
Research Square (Research Square) (2024)
Open Access | Times Cited: 11
Evaluating Privacy Compliance in Commercial Large Language Models - ChatGPT, Claude, and Gemini
Oliver Cartwright, H. Flanders Dunbar, Theo Radcliffe
Research Square (Research Square) (2024)
Open Access | Times Cited: 11
Oliver Cartwright, H. Flanders Dunbar, Theo Radcliffe
Research Square (Research Square) (2024)
Open Access | Times Cited: 11
Enhancing network intrusion detection: a dual-ensemble approach with CTGAN-balanced data and weak classifiers
Mohammad Reza Abbaszadeh Bavil Soflaei, Arash Salehpour, Karim Samadzamini
The Journal of Supercomputing (2024) Vol. 80, Iss. 11, pp. 16301-16333
Closed Access | Times Cited: 7
Mohammad Reza Abbaszadeh Bavil Soflaei, Arash Salehpour, Karim Samadzamini
The Journal of Supercomputing (2024) Vol. 80, Iss. 11, pp. 16301-16333
Closed Access | Times Cited: 7
Strengthening LLM Trust Boundaries: A Survey of Prompt Injection Attacks Surender Suresh Kumar Dr. M.L. Cummings Dr. Alexander Stimpson
Surender Suresh Kumar, M. L. Cummings, Alexander J. Stimpson
(2024), pp. 1-6
Closed Access | Times Cited: 7
Surender Suresh Kumar, M. L. Cummings, Alexander J. Stimpson
(2024), pp. 1-6
Closed Access | Times Cited: 7
Implementing Automated Safety Circuit Breakers of Large Language Models for Prompt Integrity
Gaoshan Han, Qingchun Zhang, Baisen Deng, et al.
Research Square (Research Square) (2024)
Open Access | Times Cited: 6
Gaoshan Han, Qingchun Zhang, Baisen Deng, et al.
Research Square (Research Square) (2024)
Open Access | Times Cited: 6
Backdoor Attacks in Peer-to-Peer Federated Learning
Georgios Syros, Gökberk Yar, Simona Boboila, et al.
ACM Transactions on Privacy and Security (2024)
Open Access | Times Cited: 6
Georgios Syros, Gökberk Yar, Simona Boboila, et al.
ACM Transactions on Privacy and Security (2024)
Open Access | Times Cited: 6
Auditing Large Language Models for Privacy Compliance with Specially Crafted Prompts
Simon Chard, Brent Johnson, Daniel C. Lewis
(2024)
Open Access | Times Cited: 5
Simon Chard, Brent Johnson, Daniel C. Lewis
(2024)
Open Access | Times Cited: 5
Summon a demon and bind it: A grounded theory of LLM red teaming
Nanna Inie, Jonathan Stray, Leon Derczynski
PLoS ONE (2025) Vol. 20, Iss. 1, pp. e0314658-e0314658
Open Access
Nanna Inie, Jonathan Stray, Leon Derczynski
PLoS ONE (2025) Vol. 20, Iss. 1, pp. e0314658-e0314658
Open Access
Three Challenges to Secure AI Systems in the Context of AI Regulations
Ronan Hamon, H. Junklewitz, Josep Soler Garrido, et al.
IEEE Access (2024) Vol. 12, pp. 61022-61035
Open Access | Times Cited: 4
Ronan Hamon, H. Junklewitz, Josep Soler Garrido, et al.
IEEE Access (2024) Vol. 12, pp. 61022-61035
Open Access | Times Cited: 4
Towards an AI-Enhanced Cyber Threat Intelligence Processing Pipeline
Lampis Alevizos, Martijn Dekker
Electronics (2024) Vol. 13, Iss. 11, pp. 2021-2021
Open Access | Times Cited: 4
Lampis Alevizos, Martijn Dekker
Electronics (2024) Vol. 13, Iss. 11, pp. 2021-2021
Open Access | Times Cited: 4
Dynamic Moving Target Defense for Mitigating Targeted LLM Prompt Injection
Samuel Panterino, Matthew Fellington
(2024)
Open Access | Times Cited: 4
Samuel Panterino, Matthew Fellington
(2024)
Open Access | Times Cited: 4
Adversarial attacks and defenses for large language models (LLMs): methods, frameworks & challenges
Pranjal Kumar
International Journal of Multimedia Information Retrieval (2024) Vol. 13, Iss. 3
Closed Access | Times Cited: 4
Pranjal Kumar
International Journal of Multimedia Information Retrieval (2024) Vol. 13, Iss. 3
Closed Access | Times Cited: 4
Mitigating Hallucinations in Large Language Models with Sliding Generation and Self-Checks
F. EUGENE HARRINGTON, Elliot Rosenthal, Miles Swinburne
(2024)
Open Access | Times Cited: 4
F. EUGENE HARRINGTON, Elliot Rosenthal, Miles Swinburne
(2024)
Open Access | Times Cited: 4
USB-GATE: USB-based GAN-augmented transformer reinforced defense framework for adversarial keystroke injection attacks
Anil Kumar Chillara, Paresh Saxena, Rajib Ranjan Maiti
International Journal of Information Security (2025) Vol. 24, Iss. 2
Closed Access
Anil Kumar Chillara, Paresh Saxena, Rajib Ranjan Maiti
International Journal of Information Security (2025) Vol. 24, Iss. 2
Closed Access
STRIFE: A Socio-Technical Framework for Threat Modeling of Artificial Intelligence Systems
Rangarajan Parthasarathy, Anuradha Rangarajan, Saran Ghatak, et al.
International Journal of Intelligent Information Technologies (2025) Vol. 21, Iss. 1, pp. 1-32
Open Access
Rangarajan Parthasarathy, Anuradha Rangarajan, Saran Ghatak, et al.
International Journal of Intelligent Information Technologies (2025) Vol. 21, Iss. 1, pp. 1-32
Open Access
Adversarial Robustness Via Fisher-Rao Regularization
Marine Picot, Francisco Messina, Malik Boudiaf, et al.
IEEE Transactions on Pattern Analysis and Machine Intelligence (2022) Vol. 45, Iss. 3, pp. 2698-2710
Open Access | Times Cited: 20
Marine Picot, Francisco Messina, Malik Boudiaf, et al.
IEEE Transactions on Pattern Analysis and Machine Intelligence (2022) Vol. 45, Iss. 3, pp. 2698-2710
Open Access | Times Cited: 20
Evaluating Abstract Reasoning and Problem-Solving Abilities of Large Language Models Using Raven's Progressive Matrices
C. C. Zhang, Liuyun Wang
Research Square (Research Square) (2024)
Open Access | Times Cited: 3
C. C. Zhang, Liuyun Wang
Research Square (Research Square) (2024)
Open Access | Times Cited: 3
A Security-Oriented Overview of Federated Learning Utilizing Layered Reference Model
Jiaxing Lu, N. Fukumoto, Akihiro Nakao
IEEE Access (2024) Vol. 12, pp. 103949-103975
Open Access | Times Cited: 3
Jiaxing Lu, N. Fukumoto, Akihiro Nakao
IEEE Access (2024) Vol. 12, pp. 103949-103975
Open Access | Times Cited: 3
Evaluating the Quality of Large Language Model-Generated Cybersecurity Advice in GRC Settings
Zhiyuan Li, Xiaoxi Wang, Qingxiang Zhang
Research Square (Research Square) (2024)
Open Access | Times Cited: 2
Zhiyuan Li, Xiaoxi Wang, Qingxiang Zhang
Research Square (Research Square) (2024)
Open Access | Times Cited: 2
Artificial intelligence in intensive care medicine
André Baumgart, Grietje Beck, David Ghezel-Ahmadi
Medizinische Klinik - Intensivmedizin und Notfallmedizin (2024) Vol. 119, Iss. 3, pp. 189-198
Closed Access | Times Cited: 1
André Baumgart, Grietje Beck, David Ghezel-Ahmadi
Medizinische Klinik - Intensivmedizin und Notfallmedizin (2024) Vol. 119, Iss. 3, pp. 189-198
Closed Access | Times Cited: 1
An AI red team playbook
Anna Raney, Shiri Bendelac, Keith Manville, et al.
(2024)
Closed Access | Times Cited: 1
Anna Raney, Shiri Bendelac, Keith Manville, et al.
(2024)
Closed Access | Times Cited: 1