OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

How to Attack and Defend NextG Radio Access Network Slicing With Reinforcement Learning
Yi Shi, Yalin E. Sagduyu, Tugba Erpek, et al.
IEEE Open Journal of Vehicular Technology (2022) Vol. 4, pp. 181-192
Open Access | Times Cited: 22

Showing 22 citing articles:

Adversarial Attacks and Defenses in 6G Network-Assisted IoT Systems
Bui Duc Son, Tiến Hoa Nguyễn, Trinh Van Chien, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 11, pp. 19168-19187
Open Access | Times Cited: 9

Mitigating Jamming Attack in 5G Heterogeneous Networks: A Federated Deep Reinforcement Learning Approach
Himanshu Sharma, Neeraj Kumar, Rajkumar Tekchandani
IEEE Transactions on Vehicular Technology (2022) Vol. 72, Iss. 2, pp. 2439-2452
Closed Access | Times Cited: 32

An In-Depth Survey on Virtualization Technologies in 6G Integrated Terrestrial and Non-Terrestrial Networks
Sahar Ammar, Chun Pong Lau, Basem Shihada
IEEE Open Journal of the Communications Society (2024) Vol. 5, pp. 3690-3734
Open Access | Times Cited: 6

Explainable and Robust Artificial Intelligence for Trustworthy Resource Management in 6G Networks
Nasir Khan, Sinem Coleri, Asmaa Abdallah, et al.
IEEE Communications Magazine (2023) Vol. 62, Iss. 4, pp. 50-56
Open Access | Times Cited: 13

Security risks and countermeasures of adversarial attacks on AI-driven applications in 6G networks: A survey
Van-Tam Hoang, Yared Abera Ergu, Van-Linh Nguyen, et al.
Journal of Network and Computer Applications (2024), pp. 104031-104031
Closed Access | Times Cited: 3

Learning Near-Optimal Intrusion Responses Against Dynamic Attackers
Kim Hammar, Rolf Stadler
IEEE Transactions on Network and Service Management (2023) Vol. 21, Iss. 1, pp. 1158-1177
Open Access | Times Cited: 8

Adversarial Attacks on Graph Neural Networks based Spatial Resource Management in P2P Wireless Communications
Ahmad Ghasemi, Ehsan Zeraatkar, Majid Moradikia, et al.
IEEE Transactions on Vehicular Technology (2024) Vol. 73, Iss. 6, pp. 8847-8863
Open Access | Times Cited: 1

Against Jamming Attack in Wireless Communication Networks: A Reinforcement Learning Approach
Ma Ding, Yang Wang, Sai Wu
Electronics (2024) Vol. 13, Iss. 7, pp. 1209-1209
Open Access | Times Cited: 1

Guest Editorial Special Section on Recent Advances in Security and Privacy for 6G Networks
Lina Mohjazi, Lina Bariah, Sami Muhaidat, et al.
IEEE Open Journal of Vehicular Technology (2023) Vol. 4, pp. 470-474
Open Access | Times Cited: 3

Machine Learning-based Secure 5G Network Slicing: A Systematic Literature Review
Meshari Huwaytim Alanazi
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 12
Open Access | Times Cited: 2

Adversarial Attacks and Defenses for Wireless Signal Classifiers Using CDI-aware GANs
Sujata Sinha, Alkan Soysal
ICC 2022 - IEEE International Conference on Communications (2024), pp. 2095-2100
Open Access

Smart Jamming Attack and Mitigation on Deep Transfer Reinforcement Learning Enabled Resource Allocation for Network Slicing
Shavbo Salehi, Hao Zhou, Medhat Elsayed, et al.
IEEE Transactions on Machine Learning in Communications and Networking (2024) Vol. 2, pp. 1492-1508
Open Access

End‐to‐End Autoencoder Communications with Optimized Interference Suppression *
Kemal Davaslıoğlu, Tugba Erpek, Yalin E. Sagduyu
(2024), pp. 153-184
Closed Access

Integration of UAVs and FANETs in Disaster Management: A Review on Applications, Challenges and Future Directions
Sohail Abbas, Manar Abu Talib, Iftikhar Ahmed, et al.
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 12
Closed Access

Robust Network Slicing: Multi-Agent Policies, Adversarial Attacks, and Defensive Strategies
Feng Wang, M. Cenk Gursoy, Senem Velipasalar
IEEE Transactions on Machine Learning in Communications and Networking (2023) Vol. 2, pp. 49-63
Open Access | Times Cited: 1

Channel Aware Adversarial Attacks are Not Robust
Sujata Sinha, Alkan Soysal
MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM) (2023)
Closed Access | Times Cited: 1

Deep Reinforcement Learning for Power Control in Next-Generation WiFi Network Systems
Ziad El Jamous, Kemal Davaslıoğlu, Yalin E. Sagduyu
MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM) (2022), pp. 547-552
Open Access | Times Cited: 2

2023 Index IEEE Open Journal of Vehicular Technology Vol. 4

IEEE Open Journal of Vehicular Technology (2023) Vol. 4, pp. 936-950
Open Access

Page 1

Scroll to top