OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Comprehensive Survey on Poisoning Attacks and Countermeasures in Machine Learning
Zhiyi Tian, Lei Cui, Jie Liang, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 8, pp. 1-35
Closed Access | Times Cited: 127

Showing 26-50 of 127 citing articles:

Recent Advances of Differential Privacy in Centralized Deep Learning: A Systematic Survey
Lea Demelius, Roman Kern, Andreas Trügler
ACM Computing Surveys (2025)
Open Access

Software vulnerability detection under poisoning attacks using CNN-based image processing
Lorena González‐Manzano, Joaquin Garcia‐Alfaro
International Journal of Information Security (2025) Vol. 24, Iss. 2
Open Access

Latent diffusion model-based data poisoning attack against QoS-aware cloud API recommender system
Zhen Chen, Jiadi Yu, Simone Fan, et al.
Computer Networks (2025), pp. 111120-111120
Closed Access

Identifying and assessing the risks of artificial intelligence applications in smart libraries: Perspective of technostress
Xu Wang, Xie Fang, Cheng Guoquan, et al.
Information Development (2025)
Closed Access

Data Glitches Discovery using Influence-based Model Explanations
Nikolaos Myrtakis, Ioannis Tsamardinos, Vassilis Christophides
(2025), pp. 1068-1079
Closed Access

Security and Privacy Challenges of AIGC in Metaverse: A Comprehensive Survey
Shoulong Zhang, Haomin Li, Kaiwen Sun, et al.
ACM Computing Surveys (2025)
Closed Access

FullCert: Deterministic End-to-End Certification for Training and Inference of Neural Networks
Tobias Lorenz, Marta Kwiatkowska, Mario Fritz
Lecture notes in computer science (2025), pp. 71-85
Closed Access

Advancing Federated Learning: A Comprehensive Solution for Model Aggregation, Heterogeneity, Privacy, and Security
Bifta Sama Bari, Kumar Yelamarthi
SN Computer Science (2025) Vol. 6, Iss. 5
Closed Access

A Contextual Framework to Standardise the Communication of Machine Learning Cyber Security Characteristics
Omar Alshaikh, Simon Parkinson, Saad Khan
Computer Standards & Interfaces (2025), pp. 104015-104015
Open Access

Decline Now: A Combinatorial Model for Algorithmic Collective Action
Dorothee Sigg, Moritz Hardt, Celestine Dünner
(2025), pp. 1-17
Open Access

DOBEL: detecting backdoors in ensemble learning
S. H. Kim, Changhee Hahn
Cluster Computing (2025) Vol. 28, Iss. 5
Closed Access

Adversarial machine learning: a review of methods, tools, and critical industry sectors
Sotiris Pelekis, Thanos Koutroubas, Afroditi Blika, et al.
Artificial Intelligence Review (2025) Vol. 58, Iss. 8
Open Access

Exploring perceptions of decision-makers and specialists in defensive machine learning cybersecurity applications: The need for a standardised approach
Omar Alshaikh, Simon Parkinson, Saad Khan
Computers & Security (2023) Vol. 139, pp. 103694-103694
Open Access | Times Cited: 9

From Opacity to Clarity: Leveraging XAI for Robust Network Traffic Classification
Chamara Sandeepa, Thulitha Senevirathna, Bartlomiej Siniarski, et al.
Communications in computer and information science (2024), pp. 125-138
Closed Access | Times Cited: 3

The Role of Human-Centered AI in User Modeling, Adaptation, and Personalization—Models, Frameworks, and Paradigms
Helma Torkamaan, Mohammad Tahaei, Stefan Buijsman, et al.
Human-computer interaction series (2024), pp. 43-84
Closed Access | Times Cited: 3

Adversarial Attacks and Defenses in Fault Detection and Diagnosis: A Comprehensive Benchmark on the Tennessee Eastman Process
Vitaliy Pozdnyakov, Aleksandr Kovalenko, Ilya Makarov, et al.
IEEE Open Journal of the Industrial Electronics Society (2024) Vol. 5, pp. 428-440
Open Access | Times Cited: 3

A survey on privacy-preserving federated learning against poisoning attacks
Xia Feng, Wenhao Cheng
Cluster Computing (2024) Vol. 27, Iss. 10, pp. 13565-13582
Closed Access | Times Cited: 3

The revolution and vision of explainable AI for Android malware detection and protection
Shamsher Ullah, Jianqiang Li, Farhan Ullah, et al.
Internet of Things (2024) Vol. 27, pp. 101320-101320
Closed Access | Times Cited: 3

A Red Teaming Framework for Securing AI in Maritime Autonomous Systems
Mathew J. Walter, Aaron C. Barrett, Kimberly Tam
Applied Artificial Intelligence (2024) Vol. 38, Iss. 1
Open Access | Times Cited: 3

Backdoor Attacks against Voice Recognition Systems: A Survey
Baochen Yan, Jiahe Lan, Zheng Yan
ACM Computing Surveys (2024)
Open Access | Times Cited: 3

Distributed computing in multi-agent systems: a survey of decentralized machine learning approaches
Ijaz Ahmed, Miswar Akhtar Syed, Muhammad Maaruf, et al.
Computing (2024) Vol. 107, Iss. 1
Closed Access | Times Cited: 3

Unleashing the Full Potential of Artificial Intelligence and Machine Learning in Cybersecurity Vulnerability Management
Mohammed Elbes, Samar Hendawi, Shadi AlZu’bi, et al.
(2023), pp. 276-283
Closed Access | Times Cited: 7

IoT Device Identification and Cybersecurity: Advancements, Challenges, and an LSTM-MLP Solution
Shaya A. Alshaya
Engineering Technology & Applied Science Research (2023) Vol. 13, Iss. 6, pp. 11992-12000
Open Access | Times Cited: 7

Attacking Social Media via Behavior Poisoning
Chenwang Wu, Defu Lian, Yong Ge, et al.
ACM Transactions on Knowledge Discovery from Data (2024) Vol. 18, Iss. 7, pp. 1-27
Open Access | Times Cited: 2

Scroll to top