OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Backdoor attacks and defenses in federated learning: Survey, challenges and future research directions
Thuy Dung Nguyen, Tuan Nguyen, Phi Le Nguyen, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 127, pp. 107166-107166
Open Access | Times Cited: 41

Showing 1-25 of 41 citing articles:

Data and Model Poisoning Backdoor Attacks on Wireless Federated Learning, and the Defense Mechanisms: A Comprehensive Survey
Yichen Wan, Youyang Qu, Wei Ni, et al.
IEEE Communications Surveys & Tutorials (2024) Vol. 26, Iss. 3, pp. 1861-1897
Open Access | Times Cited: 20

A survey on vulnerability of federated learning: A learning algorithm perspective
Xianghua Xie, Chen Hu, Hanchi Ren, et al.
Neurocomputing (2024) Vol. 573, pp. 127225-127225
Open Access | Times Cited: 14

Survey: federated learning data security and privacy-preserving in edge-Internet of Things
Haiao Li, Lina Ge, Lei Tian
Artificial Intelligence Review (2024) Vol. 57, Iss. 5
Open Access | Times Cited: 9

Dual-domain based backdoor attack against federated learning
Guorui Li, Ray-I Chang, Ying Wang, et al.
Neurocomputing (2025), pp. 129424-129424
Closed Access | Times Cited: 1

A survey of security threats in federated learning
Yifei Feng, Yanming Guo, Y. R. Hou, et al.
Complex & Intelligent Systems (2025) Vol. 11, Iss. 2
Open Access | Times Cited: 1

A contemporary survey of recent advances in federated learning: Taxonomies, applications, and challenges
Mohammed H. Alsharif, Raju Kannadasan, Wei Wei, et al.
Internet of Things (2024) Vol. 27, pp. 101251-101251
Closed Access | Times Cited: 6

Trustworthy Federated Learning: A Comprehensive Review, Architecture, Key Challenges, and Future Research Prospects
Asadullah Tariq, Mohamed Adel Serhani, Farag Sallabi, et al.
IEEE Open Journal of the Communications Society (2024) Vol. 5, pp. 4920-4998
Open Access | Times Cited: 4

Exploring Adversarial Attacks in Federated Learning for Medical Imaging
Erfan Darzi, Florian Dubost, Nanna M. Sijtsema, et al.
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 12, pp. 13591-13599
Open Access | Times Cited: 4

DART: A Solution for decentralized federated learning model robustness analysis
Chao Feng, Alberto Huertas Celdrán, Jan von der Assen, et al.
Array (2024) Vol. 23, pp. 100360-100360
Open Access | Times Cited: 4

Federated Learning-enabled Network Incident Anomaly Detection Optimization for Drone Swarms
Kevin Kostage, R S Adepu, Jenaya Monroe, et al.
(2025), pp. 104-114
Closed Access

A Comparative Study of Privacy-Preserving Techniques in Federated Learning: A Performance and Security Analysis
Eman Shalabi, Walid I. Khedr, Ehab R. Mohamed, et al.
Information (2025) Vol. 16, Iss. 3, pp. 244-244
Open Access

Advancing Evasion: Distributed Backdoor Attacks in Federated Learning
Jian Wang, Hong Shen, Kexiang Wei
Lecture notes in computer science (2025), pp. 372-382
Closed Access

Privacy-Enhancing Technologies for Federated Learning
Zahra Batool, Baturalp Buyukates, Reza Nourmohammadi, et al.
Studies in computational intelligence (2025), pp. 129-146
Closed Access

Backdoor attacks and defense mechanisms in federated learning: A survey
Zhaozheng Li, Jiahe Lan, Zheng Yan, et al.
Information Fusion (2025), pp. 103248-103248
Closed Access

On the Effectiveness of Invisible Backdoor Attacks in Federated Learning
Mattjis Marinus, Vasileios Tsouvalas, Nirvana Meratnia
Communications in computer and information science (2025), pp. 174-190
Closed Access

A bipolar neutrosophic combined compromise solution-based hybrid model for identifying blockchain application barriers and Benchmarking consensus algorithms
Ahmet Ayteki̇n, Eda Bozkurt, Erhan Orakçı, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 133, pp. 108343-108343
Closed Access | Times Cited: 3

A survey on privacy-preserving federated learning against poisoning attacks
Xia Feng, Wenhao Cheng
Cluster Computing (2024) Vol. 27, Iss. 10, pp. 13565-13582
Closed Access | Times Cited: 3

ANODYNE: Mitigating backdoor attacks in federated learning
Zhipin Gu, Jiangyong Shi, Yuexiang Yang
Expert Systems with Applications (2024) Vol. 259, pp. 125359-125359
Closed Access | Times Cited: 3

Decentralized medical image classification system using dual-input CNN enhanced by spatial attention and heuristic support
Dawid Połap, Antoni Jaszcz
Expert Systems with Applications (2024) Vol. 253, pp. 124343-124343
Closed Access | Times Cited: 2

One-Shot Backdoor Removal for Federated Learning
Zijie Pan, Zuobin Ying, Yajie Wang, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 23, pp. 37718-37730
Closed Access | Times Cited: 2

MiraiBotGuard: Federated Learning for Intelligent Defense Against Mirai Threats
Parineeta Dahiya, Saurav Bhattacharya
(2024), pp. 1-6
Closed Access | Times Cited: 1

Security threats to agricultural artificial intelligence: Position and perspective
Yansong Gao, Seyit Camtepe, Nazatul Haque Sultan, et al.
Computers and Electronics in Agriculture (2024) Vol. 227, pp. 109557-109557
Open Access | Times Cited: 1

An Investigation of Recent Backdoor Attacks and Defenses in Federated Learning
Qiuxian Chen, Yizheng Tao
(2023), pp. 262-269
Closed Access | Times Cited: 2

Page 1 - Next Page

Scroll to top