OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Robust secure transmission for multiuser MISO systems with probabilistic QoS constraints
Lijian Zhang, Liang Jin, Wenyu Luo, et al.
Science China Information Sciences (2016) Vol. 59, Iss. 2, pp. 1-13
Closed Access | Times Cited: 20

Showing 20 citing articles:

Tracking Control of Robot Manipulator with Friction Compensation Using Time-Delay Control and an Adaptive Fuzzy Logic System
Yao Sun, Xichang Liang, Yi Wan
Actuators (2023) Vol. 12, Iss. 5, pp. 184-184
Open Access | Times Cited: 8

High-Sensitivity Terahertz Biosensor Based on Plasmon-Induced Transparency Metamaterials
Mengcheng Guan, Xu Sun, Wei Jiang, et al.
Photonics (2023) Vol. 10, Iss. 11, pp. 1258-1258
Open Access | Times Cited: 5

Probabilistic-constrained robust secure transmission for energy harvesting over MISO channels
Bin Li, Zesong Fei
Science China Information Sciences (2017) Vol. 61, Iss. 2
Closed Access | Times Cited: 16

Distributed variance-constrained robust filtering with randomly occurring nonlinearities and missing measurements over sensor networks
Zhigong Wang, Dongyan Chen, Junhua Du
Neurocomputing (2018) Vol. 329, pp. 397-406
Closed Access | Times Cited: 16

Opportunistic access control for enhancing security in D2D-enabled cellular networks
Yajun Chen, Xinsheng Ji, Kaizhi Huang, et al.
Science China Information Sciences (2017) Vol. 61, Iss. 4
Closed Access | Times Cited: 13

Physarum computing and topology optimisation
Alexander Safonov, Jeff Jones
International Journal of Parallel Emergent and Distributed Systems (2016) Vol. 32, Iss. 5, pp. 448-465
Closed Access | Times Cited: 11

Robust information filtering for distributed networks using mixed Gaussian distribution
Hao Zhu, Ziqiang Wang, Xin Li
Digital Signal Processing (2023) Vol. 141, pp. 104173-104173
Closed Access | Times Cited: 3

A Novel Adaptive Sliding Mode Control for Manipulator with External Disturbance
Sen Jiang, Jing Zhao, Fei Xie, et al.
(2018), pp. 3024-3028
Closed Access | Times Cited: 7

Tamper Proofing Identification and Authenticated DICOM Image Transmission Using Wireless Channels and CR Network
Padmapriya Praveenkumar, P. Catherine Priya, Avila Jayapalan, et al.
Wireless Personal Communications (2017) Vol. 97, Iss. 4, pp. 5573-5595
Closed Access | Times Cited: 6

Adaptive multinoulli-based Kalman filter with randomly unknown delayed and lost measurements
Xin Lai, Junning Huang, Changqing Ye, et al.
Digital Signal Processing (2022) Vol. 129, pp. 103653-103653
Closed Access | Times Cited: 4

Maximum likelihood FIR filter for systems with Bernoulli distributed random delays and measurement failures
Yameng Zhu, Shunyi Zhao, Xiaoli Luan, et al.
Digital Signal Processing (2023) Vol. 134, pp. 103904-103904
Closed Access | Times Cited: 2

Information Security Protocol Based System Identification with Binary-Valued Observations
Changbao Xu, Yanlong Zhao, Ji‐Feng Zhang
Journal of Systems Science and Complexity (2017) Vol. 31, Iss. 4, pp. 946-963
Closed Access | Times Cited: 4

State estimation with multi-level vector quantisation and communication uncertainty
Zengwang Jin, Yanyan Hu, Changyin Sun, et al.
International Journal of Systems Science (2020) Vol. 52, Iss. 7, pp. 1297-1314
Closed Access | Times Cited: 3

C-differential bent functions and perfect nonlinearity
Pantelimon Stănică, Sugata Gangopadhyay, Aaron Geary, et al.
Discrete Applied Mathematics (2021) Vol. 307, pp. 160-171
Closed Access | Times Cited: 3

Pilot Contamination with MITM Attack
Yu Huang, Liang Jin, Hongquan Wei, et al.
2022 IEEE 95th Vehicular Technology Conference: (VTC2022-Spring) (2017), pp. 1-7
Closed Access | Times Cited: 2

A Physical-layer Security Scheme Based on Cross-layer Cooperation in Dense Heterogeneous Networks
Bo Zhang, Kaizhi Huang, Yajun Chen, et al.
KSII Transactions on Internet and Information Systems (2018) Vol. 12, Iss. 6
Open Access | Times Cited: 2

A recombination information process method of missing data in WSN
Changjian Deng, Dongyi Chen
International Journal of Electronics (2017) Vol. 104, Iss. 6, pp. 1063-1076
Closed Access | Times Cited: 1

Adaptive Target Tracking with Time-Varying Formation Radius
Xiaoqian Wei, Jianying Yang
(2018)
Closed Access | Times Cited: 1

Robust Secure Beamforming for Multiantenna Relay Networks with Multiple Eavesdroppers
Yuchong Li, Lijian Zhang, Wei Dong
Mathematical Problems in Engineering (2023) Vol. 2023, Iss. 1
Open Access

Secure Transmission in Reconfigurable Intelligent Surface Aided Cooperative Cognitive Radio System
Yiran Huo, Limeng Dong, Wanyu Yan, et al.
2022 IEEE Globecom Workshops (GC Wkshps) (2023), pp. 1451-1456
Closed Access

Page 1

Scroll to top