
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Adversarial Machine Learning in Wireless Communications Using RF Data: A Review
Damilola Adesina, Chung-Chu Hsieh, Yalin E. Sagduyu, et al.
IEEE Communications Surveys & Tutorials (2022) Vol. 25, Iss. 1, pp. 77-100
Open Access | Times Cited: 72
Damilola Adesina, Chung-Chu Hsieh, Yalin E. Sagduyu, et al.
IEEE Communications Surveys & Tutorials (2022) Vol. 25, Iss. 1, pp. 77-100
Open Access | Times Cited: 72
Showing 1-25 of 72 citing articles:
Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems
Mayra Macas, Chunming Wu, Walter Fuertes
Expert Systems with Applications (2023) Vol. 238, pp. 122223-122223
Closed Access | Times Cited: 44
Mayra Macas, Chunming Wu, Walter Fuertes
Expert Systems with Applications (2023) Vol. 238, pp. 122223-122223
Closed Access | Times Cited: 44
Vulnerability of Machine Learning Approaches Applied in IoT-Based Smart Grid: A Review
Zhenyong Zhang, Mengxiang Liu, Mingyang Sun, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 11, pp. 18951-18975
Open Access | Times Cited: 16
Zhenyong Zhang, Mengxiang Liu, Mingyang Sun, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 11, pp. 18951-18975
Open Access | Times Cited: 16
Fuzzy decision-making framework for explainable golden multi-machine learning models for real-time adversarial attack detection in Vehicular Ad-hoc Networks
A. S. Albahri, Rula A. Hamid, Ahmed Raheem Abdulnabi, et al.
Information Fusion (2023) Vol. 105, pp. 102208-102208
Open Access | Times Cited: 23
A. S. Albahri, Rula A. Hamid, Ahmed Raheem Abdulnabi, et al.
Information Fusion (2023) Vol. 105, pp. 102208-102208
Open Access | Times Cited: 23
A Systematic Survey on 5G and 6G Security Considerations, Challenges, Trends, and Research Areas
Paul Scalise, Matthew Boeding, Michael Hempel, et al.
Future Internet (2024) Vol. 16, Iss. 3, pp. 67-67
Open Access | Times Cited: 13
Paul Scalise, Matthew Boeding, Michael Hempel, et al.
Future Internet (2024) Vol. 16, Iss. 3, pp. 67-67
Open Access | Times Cited: 13
A Deep Ensemble-Based Wireless Receiver Architecture for Mitigating Adversarial Attacks in Automatic Modulation Classification
Rajeev Sahay, Christopher G. Brinton, David J. Love
IEEE Transactions on Cognitive Communications and Networking (2021) Vol. 8, Iss. 1, pp. 71-85
Open Access | Times Cited: 31
Rajeev Sahay, Christopher G. Brinton, David J. Love
IEEE Transactions on Cognitive Communications and Networking (2021) Vol. 8, Iss. 1, pp. 71-85
Open Access | Times Cited: 31
How to Attack and Defend NextG Radio Access Network Slicing With Reinforcement Learning
Yi Shi, Yalin E. Sagduyu, Tugba Erpek, et al.
IEEE Open Journal of Vehicular Technology (2022) Vol. 4, pp. 181-192
Open Access | Times Cited: 22
Yi Shi, Yalin E. Sagduyu, Tugba Erpek, et al.
IEEE Open Journal of Vehicular Technology (2022) Vol. 4, pp. 181-192
Open Access | Times Cited: 22
Is Semantic Communication Secure? A Tale of Multi-Domain Adversarial Attacks
Yalin E. Sagduyu, Tugba Erpek, Şennur Ulukuş, et al.
IEEE Communications Magazine (2023) Vol. 61, Iss. 11, pp. 50-55
Closed Access | Times Cited: 12
Yalin E. Sagduyu, Tugba Erpek, Şennur Ulukuş, et al.
IEEE Communications Magazine (2023) Vol. 61, Iss. 11, pp. 50-55
Closed Access | Times Cited: 12
An Exploratory Analysis of Effect of Adversarial Machine Learning Attack on IoT-enabled Industrial Control Systems
Sandeep Trivedi, Tien Anh Tran, Nuruzzaman Faruqui, et al.
(2023)
Closed Access | Times Cited: 11
Sandeep Trivedi, Tien Anh Tran, Nuruzzaman Faruqui, et al.
(2023)
Closed Access | Times Cited: 11
AIChronoLens: Advancing Explainability for Time Series AI Forecasting in Mobile Networks
Claudio Fiandrino, Eloy Pérez Gómez, P. Pérez, et al.
IEEE INFOCOM 2022 - IEEE Conference on Computer Communications (2024), pp. 1521-1530
Closed Access | Times Cited: 4
Claudio Fiandrino, Eloy Pérez Gómez, P. Pérez, et al.
IEEE INFOCOM 2022 - IEEE Conference on Computer Communications (2024), pp. 1521-1530
Closed Access | Times Cited: 4
Securing Semantic Communications Against Adversarial Attacks
Yalin E. Sagduyu, Aylin Yener, Şennur Ulukuş
(2025), pp. 309-338
Closed Access
Yalin E. Sagduyu, Aylin Yener, Şennur Ulukuş
(2025), pp. 309-338
Closed Access
A Survey on Physical Layer Security for 5G/6G Communications over Different Fading Channels: Approaches, Challenges, and Future Directions
Parmila Devi, Manoranjan Rai Bharti, Dikshant Gautam
Vehicular Communications (2025), pp. 100891-100891
Closed Access
Parmila Devi, Manoranjan Rai Bharti, Dikshant Gautam
Vehicular Communications (2025), pp. 100891-100891
Closed Access
Adaptive Jamming Mitigation for Clustered Energy-Efficient LoRa-BLE Hybrid Wireless Sensor Networks
Carolina Del-Valle-Soto, Leonardo J. Valdivia, Ramiro Velázquez, et al.
Sensors (2025) Vol. 25, Iss. 6, pp. 1931-1931
Open Access
Carolina Del-Valle-Soto, Leonardo J. Valdivia, Ramiro Velázquez, et al.
Sensors (2025) Vol. 25, Iss. 6, pp. 1931-1931
Open Access
Adversarial Sample Generation Method for Modulated Signals Based on Edge-Linear Combination
Tianyi Wei, Yong Li, Yingtao Niu
Electronics (2025) Vol. 14, Iss. 7, pp. 1260-1260
Open Access
Tianyi Wei, Yong Li, Yingtao Niu
Electronics (2025) Vol. 14, Iss. 7, pp. 1260-1260
Open Access
XAI for network management
Claudio Fiandrino, P. Pérez, Marco Fiore, et al.
Elsevier eBooks (2025), pp. 113-128
Closed Access
Claudio Fiandrino, P. Pérez, Marco Fiore, et al.
Elsevier eBooks (2025), pp. 113-128
Closed Access
Evasion Attack and Defense on Machine Learning Models in Cyber-Physical Systems: A Survey
Shunyao Wang, Ryan K. L. Ko, Guangdong Bai, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 26, Iss. 2, pp. 930-966
Open Access | Times Cited: 10
Shunyao Wang, Ryan K. L. Ko, Guangdong Bai, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 26, Iss. 2, pp. 930-966
Open Access | Times Cited: 10
Channel-Robust Class-Universal Spectrum-Focused Frequency Adversarial Attacks on Modulated Classification Models
Sicheng Zhang, Jiangzhi Fu, Jiarun Yu, et al.
IEEE Transactions on Cognitive Communications and Networking (2024) Vol. 10, Iss. 4, pp. 1280-1293
Closed Access | Times Cited: 3
Sicheng Zhang, Jiangzhi Fu, Jiarun Yu, et al.
IEEE Transactions on Cognitive Communications and Networking (2024) Vol. 10, Iss. 4, pp. 1280-1293
Closed Access | Times Cited: 3
Explanation-Guided Backdoor Attacks on Model-Agnostic RF Fingerprinting
Tianya Zhao, Xuyu Wang, Junqing Zhang, et al.
IEEE INFOCOM 2022 - IEEE Conference on Computer Communications (2024), pp. 221-230
Closed Access | Times Cited: 3
Tianya Zhao, Xuyu Wang, Junqing Zhang, et al.
IEEE INFOCOM 2022 - IEEE Conference on Computer Communications (2024), pp. 221-230
Closed Access | Times Cited: 3
Vulnerabilities of Deep Learning-Driven Semantic Communications to Backdoor (Trojan) Attacks
Yalin E. Sagduyu, Tugba Erpek, Şennur Ulukuş, et al.
(2023)
Open Access | Times Cited: 7
Yalin E. Sagduyu, Tugba Erpek, Şennur Ulukuş, et al.
(2023)
Open Access | Times Cited: 7
How Potent are Evasion Attacks for Poisoning Federated Learning-Based Signal Classifiers?
Su Wang, Rajeev Sahay, Christopher G. Brinton
ICC 2022 - IEEE International Conference on Communications (2023), pp. 2376-2381
Open Access | Times Cited: 7
Su Wang, Rajeev Sahay, Christopher G. Brinton
ICC 2022 - IEEE International Conference on Communications (2023), pp. 2376-2381
Open Access | Times Cited: 7
Security of AI-Driven Beam Selection for Distributed MIMO in an Adversarial Setting
Ömer Faruk Tuna, Fehmi Emre Kadan
IEEE Access (2024) Vol. 12, pp. 42028-42041
Open Access | Times Cited: 2
Ömer Faruk Tuna, Fehmi Emre Kadan
IEEE Access (2024) Vol. 12, pp. 42028-42041
Open Access | Times Cited: 2
HORCRUX: Accurate Cross Band Channel Prediction
Avishek Banerjee, Xingya Zhao, Vishnu Chhabra, et al.
Proceedings of the 28th Annual International Conference on Mobile Computing And Networking (2024), pp. 1-15
Open Access | Times Cited: 2
Avishek Banerjee, Xingya Zhao, Vishnu Chhabra, et al.
Proceedings of the 28th Annual International Conference on Mobile Computing And Networking (2024), pp. 1-15
Open Access | Times Cited: 2
Will 6G be Semantic Communications? Opportunities and Challenges from Task Oriented and Secure Communications to Integrated Sensing
Yalin E. Sagduyu, Tugba Erpek, Aylin Yener, et al.
IEEE Network (2024) Vol. 38, Iss. 6, pp. 72-80
Open Access | Times Cited: 2
Yalin E. Sagduyu, Tugba Erpek, Aylin Yener, et al.
IEEE Network (2024) Vol. 38, Iss. 6, pp. 72-80
Open Access | Times Cited: 2
Jamming Attacks on NextG Radio Access Network Slicing with Reinforcement Learning
Yi Shi, Yalin E. Sagduyu, Tugba Erpek, et al.
(2022)
Closed Access | Times Cited: 10
Yi Shi, Yalin E. Sagduyu, Tugba Erpek, et al.
(2022)
Closed Access | Times Cited: 10
Seamless Connectivity: The Power of Integrating Power Line and Wireless Communications
Moisés V. Ribeiro, Mateus de L. Filomeno, Ândrei Camponogara, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 26, Iss. 1, pp. 1-40
Closed Access | Times Cited: 6
Moisés V. Ribeiro, Mateus de L. Filomeno, Ândrei Camponogara, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 26, Iss. 1, pp. 1-40
Closed Access | Times Cited: 6
Lightweight Radio Frequency Fingerprint Identification Scheme for V2X Based on Temporal Correlation
Xinyu Qi, Aiqun Hu, Tianshu Chen
IEEE Transactions on Information Forensics and Security (2023) Vol. 19, pp. 1056-1070
Closed Access | Times Cited: 6
Xinyu Qi, Aiqun Hu, Tianshu Chen
IEEE Transactions on Information Forensics and Security (2023) Vol. 19, pp. 1056-1070
Closed Access | Times Cited: 6