OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Comprehensive Survey on Poisoning Attacks and Countermeasures in Machine Learning
Zhiyi Tian, Lei Cui, Jie Liang, et al.
ACM Computing Surveys (2022) Vol. 55, Iss. 8, pp. 1-35
Closed Access | Times Cited: 127

Showing 1-25 of 127 citing articles:

A Survey on ChatGPT: AI–Generated Contents, Challenges, and Solutions
Yuntao Wang, Yanghe Pan, Miao Yan, et al.
IEEE Open Journal of the Computer Society (2023) Vol. 4, pp. 280-302
Open Access | Times Cited: 133

A Survey on Digital Twins: Architecture, Enabling Technologies, Security and Privacy, and Future Prospects
Yuntao Wang, Zhou Su, Shaolong Guo, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 17, pp. 14965-14987
Open Access | Times Cited: 108

Unleashing the Power of Edge-Cloud Generative AI in Mobile Networks: A Survey of AIGC Services
Minrui Xu, Hongyang Du, Dusit Niyato, et al.
IEEE Communications Surveys & Tutorials (2024) Vol. 26, Iss. 2, pp. 1127-1170
Open Access | Times Cited: 94

Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning
Antonio Emanuele Cinà, Kathrin Grosse, Ambra Demontis, et al.
ACM Computing Surveys (2023) Vol. 55, Iss. 13s, pp. 1-39
Open Access | Times Cited: 66

When Federated Learning Meets Privacy-Preserving Computation
Jingxue Chen, Hang Yan, Z. Liu, et al.
ACM Computing Surveys (2024) Vol. 56, Iss. 12, pp. 1-36
Closed Access | Times Cited: 43

Adversarial attacks and defenses in explainable artificial intelligence: A survey
Hubert Baniecki, Przemysław Biecek
Information Fusion (2024) Vol. 107, pp. 102303-102303
Open Access | Times Cited: 42

Backdoor attacks and defenses in federated learning: Survey, challenges and future research directions
Thuy Dung Nguyen, Tuan Nguyen, Phi Le Nguyen, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 127, pp. 107166-107166
Open Access | Times Cited: 41

Dual-domain based backdoor attack against federated learning
Guorui Li, Ray-I Chang, Ying Wang, et al.
Neurocomputing (2025), pp. 129424-129424
Closed Access | Times Cited: 1

AIsmosis and the pas de deux of human-AI interaction: Exploring the communicative dance between society and artificial intelligence
Ayşe Aslı Bozdağ
Online Journal of Communication and Media Technologies (2023) Vol. 13, Iss. 4, pp. e202340-e202340
Open Access | Times Cited: 18

Data-Agnostic Model Poisoning Against Federated Learning: A Graph Autoencoder Approach
Kai Li, Jingjing Zheng, Xin Yuan, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 3465-3480
Open Access | Times Cited: 8

A comprehensive review on Federated Learning for Data-Sensitive Application: Open issues & challenges
Manu Narula, Jasraj Meena, Dinesh Kumar Vishwakarma
Engineering Applications of Artificial Intelligence (2024) Vol. 133, pp. 108128-108128
Closed Access | Times Cited: 7

Towards regulatory generative AI in ophthalmology healthcare: a security and privacy perspective
Yueye Wang, Chi Liu, Keyao Zhou, et al.
British Journal of Ophthalmology (2024) Vol. 108, Iss. 10, pp. 1349-1353
Closed Access | Times Cited: 7

Reclaiming the Digital Commons: A Public Data Trust for Training Data
Alan Chan, Herbie Bradley, Nitarshan Rajkumar
(2023), pp. 855-868
Open Access | Times Cited: 15

Data poisoning attacks in intelligent transportation systems: A survey
Feilong Wang, Xin Wang, Xuegang Ban
Transportation Research Part C Emerging Technologies (2024) Vol. 165, pp. 104750-104750
Closed Access | Times Cited: 6

Poisoned ChatGPT Finds Work for Idle Hands: Exploring Developers’ Coding Practices with Insecure Suggestions from Poisoned AI Models
Sanghak Oh, Ki-Ho Lee, Seonhye Park, et al.
2022 IEEE Symposium on Security and Privacy (SP) (2024), pp. 1141-1159
Closed Access | Times Cited: 6

Efficient and Privacy-Preserving Federated Learning Against Poisoning Adversaries
Jiaqi Zhao, Hui Zhu, Fengwei Wang, et al.
IEEE Transactions on Services Computing (2024) Vol. 17, Iss. 5, pp. 2320-2333
Closed Access | Times Cited: 5

Evaluating Realistic Adversarial Attacks against Machine Learning Models for Windows PE Malware Detection
Muhammad Imran, Annalisa Appice, Donato Malerba
Future Internet (2024) Vol. 16, Iss. 5, pp. 168-168
Open Access | Times Cited: 5

Semantics-Empowered Communications: A Tutorial-Cum-Survey
Zhilin Lu, Rongpeng Li, Kun Lü, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 26, Iss. 1, pp. 41-79
Closed Access | Times Cited: 13

Untargeted Backdoor Attack Against Object Detection
Chengxiao Luo, Yiming Li, Yong Jiang, et al.
ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2023)
Open Access | Times Cited: 12

A Robust and Privacy-Aware Federated Learning Framework for Non-Intrusive Load Monitoring
Vidushi Agarwal, Omid Ardakanian, Sujata Pal
IEEE Transactions on Sustainable Computing (2024) Vol. 9, Iss. 5, pp. 766-777
Closed Access | Times Cited: 4

DART: A Solution for decentralized federated learning model robustness analysis
Chao Feng, Alberto Huertas Celdrán, Jan von der Assen, et al.
Array (2024) Vol. 23, pp. 100360-100360
Open Access | Times Cited: 4

Enhancing Brain Tumor Detection Through Custom Convolutional Neural Networks and Interpretability-Driven Analysis
Kavinda Ashan Kulasinghe Wasalamuni Dewage, Raza Hasan, Bacha Rehman, et al.
Information (2024) Vol. 15, Iss. 10, pp. 653-653
Open Access | Times Cited: 4

A Novel Data Sanitization Method Based on Dynamic Dataset Partition and Inspection Against Data Poisoning Attacks
J.S. Lee, Youngho Cho, Richard C. T. Lee, et al.
Electronics (2025) Vol. 14, Iss. 2, pp. 374-374
Open Access

Page 1 - Next Page

Scroll to top