OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Untargeted Backdoor Attack Against Object Detection
Chengxiao Luo, Yiming Li, Yong Jiang, et al.
ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2023)
Open Access | Times Cited: 12

Showing 12 citing articles:

OdScan: Backdoor Scanning for Object Detection Models
Siyuan Cheng, Guangyu Shen, Guanhong Tao, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2024), pp. 1703-1721
Closed Access | Times Cited: 2

Camouflage Backdoor Attack against Pedestrian Detection
Yalun Wu, Yanfeng Gu, Yuanwan Chen, et al.
Applied Sciences (2023) Vol. 13, Iss. 23, pp. 12752-12752
Open Access | Times Cited: 4

DUPS: Data poisoning attacks with uncertain sample selection for federated learning
Heng‐Ru Zhang, Kexiong Wang, Xiang-Yu Liang, et al.
Computer Networks (2024), pp. 110909-110909
Closed Access | Times Cited: 1

Towards Robust Object Detection: Identifying and Removing Backdoors via Module Inconsistency Analysis
Xian‐Da Zhang, S. Liang, Chengyang Li
Lecture notes in computer science (2024), pp. 343-358
Closed Access | Times Cited: 1

AdaptEdge: Targeted Universal Adversarial Attacks on Time Series Data in Smart Grids
Sultan Uddin Khan, Mohammed Mynuddin, Mahmoud Nabil
(2023)
Open Access | Times Cited: 3

AdaptEdge: Targeted Universal Adversarial Attacks on Time Series Data in Smart Grids
Sultan Uddin Khan, Mohammed Mynuddin, Mahmoud Nabil
(2023)
Open Access | Times Cited: 1

From Toxic to Trustworthy: Using Self-Distillation and Semi-supervised Methods to Refine Neural Networks
Xian‐Da Zhang, Baolin Zheng, Jianbao Hu, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2024) Vol. 38, Iss. 15, pp. 16873-16880
Open Access

PBIM: Paired Backdoor Injection Method for Change Detection
Rui Huang, Mengjia Hao, Zongyu Guo, et al.
Lecture notes in computer science (2024), pp. 331-343
Closed Access

Sponge Backdoor Attack: Increasing the Latency of Object Detection Exploiting Non-Maximum Suppression
Yong Xiao, Jin Ma, Ping Yi, et al.
2022 International Joint Conference on Neural Networks (IJCNN) (2024), pp. 1-8
Closed Access

Backdoor Attack against Face Sketch Synthesis
Shengchuan Zhang, Suhang Ye
Entropy (2023) Vol. 25, Iss. 7, pp. 974-974
Open Access

Page 1

Scroll to top