
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Imperceptible Adversarial Attack via Invertible Neural Networks
Zihan Chen, Ziyue Wang, Junjie Huang, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2023) Vol. 37, Iss. 1, pp. 414-424
Open Access | Times Cited: 15
Zihan Chen, Ziyue Wang, Junjie Huang, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2023) Vol. 37, Iss. 1, pp. 414-424
Open Access | Times Cited: 15
Showing 15 citing articles:
SPA: A poisoning attack framework for graph neural networks through searching and pairing
Xiao Liu, Junjie Huang, Wentao Zhao, et al.
Machine Learning (2025) Vol. 114, Iss. 1
Open Access
Xiao Liu, Junjie Huang, Wentao Zhao, et al.
Machine Learning (2025) Vol. 114, Iss. 1
Open Access
Invertible Mosaic Image Hiding Network for Very Large Capacity Image Steganography
Zihan Chen, Tianrui Liu, Junjie Huang, et al.
ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2024), pp. 4520-4524
Open Access | Times Cited: 3
Zihan Chen, Tianrui Liu, Junjie Huang, et al.
ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2024), pp. 4520-4524
Open Access | Times Cited: 3
DeMPAA: Deployable Multi-Mini-Patch Adversarial Attack for Remote Sensing Image Classification
Junjie Huang, Ziyue Wang, Tianrui Liu, et al.
IEEE Transactions on Geoscience and Remote Sensing (2024) Vol. 62, pp. 1-13
Open Access | Times Cited: 3
Junjie Huang, Ziyue Wang, Tianrui Liu, et al.
IEEE Transactions on Geoscience and Remote Sensing (2024) Vol. 62, pp. 1-13
Open Access | Times Cited: 3
Security Risk and Attacks in AI: A Survey of Security and Privacy
Md. Mostafizur Rahman, Aiasha Siddika Arshi, Md. Mehedi Hasan, et al.
2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) (2023), pp. 1834-1839
Closed Access | Times Cited: 9
Md. Mostafizur Rahman, Aiasha Siddika Arshi, Md. Mehedi Hasan, et al.
2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) (2023), pp. 1834-1839
Closed Access | Times Cited: 9
Taxonomy Driven Fast Adversarial Training
Kun Tong, Chengze Jiang, Jie Gui, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2024) Vol. 38, Iss. 6, pp. 5233-5242
Open Access | Times Cited: 2
Kun Tong, Chengze Jiang, Jie Gui, et al.
Proceedings of the AAAI Conference on Artificial Intelligence (2024) Vol. 38, Iss. 6, pp. 5233-5242
Open Access | Times Cited: 2
Semantic Deep Hiding for Robust Unlearnable Examples
Ruohan Meng, Chenyu Yi, Yi Yu, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 6545-6558
Open Access | Times Cited: 2
Ruohan Meng, Chenyu Yi, Yi Yu, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 6545-6558
Open Access | Times Cited: 2
Adversarial image generation by spatial transformation in perceptual colorspaces
Ayberk Aydın, Alptekin Temizel
Pattern Recognition Letters (2023) Vol. 174, pp. 92-98
Open Access | Times Cited: 4
Ayberk Aydın, Alptekin Temizel
Pattern Recognition Letters (2023) Vol. 174, pp. 92-98
Open Access | Times Cited: 4
Multi-patch Adversarial Attack for Remote Sensing Image Classification
Ziyue Wang, Junjie Huang, Tianrui Liu, et al.
Lecture notes in computer science (2024), pp. 377-391
Closed Access | Times Cited: 1
Ziyue Wang, Junjie Huang, Tianrui Liu, et al.
Lecture notes in computer science (2024), pp. 377-391
Closed Access | Times Cited: 1
Harmonizing Transferability and Imperceptibility: A Novel Ensemble Adversarial Attack
Rui Zhang, Hui Xia, Zi Kang, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 15, pp. 25625-25636
Closed Access
Rui Zhang, Hui Xia, Zi Kang, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 15, pp. 25625-25636
Closed Access
DURRNET: Deep Unfolded Single Image Reflection Removal Network with Joint Prior
Junjie Huang, Tianrui Liu, Jingyuan Xia, et al.
ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2024), pp. 5235-5239
Closed Access
Junjie Huang, Tianrui Liu, Jingyuan Xia, et al.
ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2024), pp. 5235-5239
Closed Access
OADAS: Optimizing Global Perturbation Attacks with Dual-Path Attribution Synergy
Xinlei Gao, Jing Liu
ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2024), pp. 6130-6134
Closed Access
Xinlei Gao, Jing Liu
ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2024), pp. 6130-6134
Closed Access
AdvShadow: Evading DeepFake Detection via Adversarial Shadow Attack
Jiatong Liu, Mingcheng Zhang, Jianpeng Ke, et al.
ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2024), pp. 4640-4644
Closed Access
Jiatong Liu, Mingcheng Zhang, Jianpeng Ke, et al.
ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (2024), pp. 4640-4644
Closed Access
MGBS: Multi-granularity Beam Search for NMT Model Attack
Wen Li Han, Xinghao Yang, Baodi Liu, et al.
2022 4th International Conference on Natural Language Processing (ICNLP) (2024), pp. 90-96
Closed Access
Wen Li Han, Xinghao Yang, Baodi Liu, et al.
2022 4th International Conference on Natural Language Processing (ICNLP) (2024), pp. 90-96
Closed Access
Visual Prompt Engineering for Enhancing Facial Recognition Systems Robustness against Evasion Attacks
Sandeep Gupta, Kiran Raja, Roberto Passerone
IEEE Access (2024) Vol. 12, pp. 152212-152223
Open Access
Sandeep Gupta, Kiran Raja, Roberto Passerone
IEEE Access (2024) Vol. 12, pp. 152212-152223
Open Access
Imperceptible adversarial attack via spectral sensitivity of human visual system
Chen-Kuo Chiang, Ying–Dar Lin, Ren‐Hung Hwang, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 20, pp. 59291-59315
Closed Access | Times Cited: 1
Chen-Kuo Chiang, Ying–Dar Lin, Ren‐Hung Hwang, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 20, pp. 59291-59315
Closed Access | Times Cited: 1