
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Optimal DoS attack schedules on remote state estimation under multi-sensor round-robin protocol
Junhui Zhang, Jitao Sun, Hai Lin
Automatica (2021) Vol. 127, pp. 109517-109517
Closed Access | Times Cited: 55
Junhui Zhang, Jitao Sun, Hai Lin
Automatica (2021) Vol. 127, pp. 109517-109517
Closed Access | Times Cited: 55
Showing 1-25 of 55 citing articles:
A Survey of Cyber Attacks on Cyber Physical Systems: Recent Advances and Challenges
Wenli Duo, MengChu Zhou, Abdullah Abusorrah
IEEE/CAA Journal of Automatica Sinica (2022) Vol. 9, Iss. 5, pp. 784-800
Closed Access | Times Cited: 284
Wenli Duo, MengChu Zhou, Abdullah Abusorrah
IEEE/CAA Journal of Automatica Sinica (2022) Vol. 9, Iss. 5, pp. 784-800
Closed Access | Times Cited: 284
Security of networked control systems subject to deception attacks: a survey
Zhong‐Hua Pang, Lan-Zhi Fan, Haibin Guo, et al.
International Journal of Systems Science (2022) Vol. 53, Iss. 16, pp. 3577-3598
Closed Access | Times Cited: 64
Zhong‐Hua Pang, Lan-Zhi Fan, Haibin Guo, et al.
International Journal of Systems Science (2022) Vol. 53, Iss. 16, pp. 3577-3598
Closed Access | Times Cited: 64
Novel attack‐defense framework for nonlinear complex networks: An important‐data‐based method
Xun Wang, Engang Tian, Bin Wei, et al.
International Journal of Robust and Nonlinear Control (2022) Vol. 33, Iss. 4, pp. 2861-2878
Closed Access | Times Cited: 38
Xun Wang, Engang Tian, Bin Wei, et al.
International Journal of Robust and Nonlinear Control (2022) Vol. 33, Iss. 4, pp. 2861-2878
Closed Access | Times Cited: 38
Outlier-Resistant Recursive Security Filtering for Multirate Networked Systems Under Fading Measurements and Round-Robin Protocol
Jinliang Liu, Enyu Gong, Lijuan Zha, et al.
IEEE Transactions on Control of Network Systems (2023) Vol. 10, Iss. 4, pp. 1962-1974
Closed Access | Times Cited: 30
Jinliang Liu, Enyu Gong, Lijuan Zha, et al.
IEEE Transactions on Control of Network Systems (2023) Vol. 10, Iss. 4, pp. 1962-1974
Closed Access | Times Cited: 30
Attack-model-independent stabilization of networked control systems under a jump-like TOD scheduling protocol
Hongchenyu Yang, Chen Peng, Zhiru Cao
Automatica (2023) Vol. 152, pp. 110982-110982
Closed Access | Times Cited: 26
Hongchenyu Yang, Chen Peng, Zhiru Cao
Automatica (2023) Vol. 152, pp. 110982-110982
Closed Access | Times Cited: 26
Event-Based Optimal Stealthy False Data-Injection Attacks Against Remote State Estimation Systems
Haibin Guo, Jian Sun, Zhong‐Hua Pang, et al.
IEEE Transactions on Cybernetics (2023) Vol. 53, Iss. 10, pp. 6714-6724
Closed Access | Times Cited: 25
Haibin Guo, Jian Sun, Zhong‐Hua Pang, et al.
IEEE Transactions on Cybernetics (2023) Vol. 53, Iss. 10, pp. 6714-6724
Closed Access | Times Cited: 25
Event-triggered remote state estimation for cyber-physical systems under malicious DoS attacks
Yuan‐Cheng Sun, Guang‐Hong Yang
Information Sciences (2022) Vol. 602, pp. 43-56
Closed Access | Times Cited: 34
Yuan‐Cheng Sun, Guang‐Hong Yang
Information Sciences (2022) Vol. 602, pp. 43-56
Closed Access | Times Cited: 34
Important-Data-Based DoS Attack Mechanism and Resilient H∞ Filter Design for Networked T–S Fuzzy Systems
Xun Wang, Engang Tian, Wei Xing Zheng, et al.
IEEE Transactions on Cybernetics (2023) Vol. 54, Iss. 5, pp. 3352-3362
Closed Access | Times Cited: 19
Xun Wang, Engang Tian, Wei Xing Zheng, et al.
IEEE Transactions on Cybernetics (2023) Vol. 54, Iss. 5, pp. 3352-3362
Closed Access | Times Cited: 19
Particle filtering for nonlinear cyber–physical systems under Round-Robin protocol: Handling complex sensor issues and non-Gaussian noise
Beiyuan Li, Juan Li, Peng Lou, et al.
Journal of the Franklin Institute (2025) Vol. 362, Iss. 3, pp. 107507-107507
Closed Access
Beiyuan Li, Juan Li, Peng Lou, et al.
Journal of the Franklin Institute (2025) Vol. 362, Iss. 3, pp. 107507-107507
Closed Access
Stochastic Data-Based Denial-of-Service Attack Strategy Design Against Remote State Estimation in Interval Type-2 T–S Fuzzy Systems
Mengge Fan, Engang Tian, Xiangpeng Xie, et al.
IEEE Transactions on Fuzzy Systems (2022) Vol. 31, Iss. 3, pp. 825-834
Closed Access | Times Cited: 21
Mengge Fan, Engang Tian, Xiangpeng Xie, et al.
IEEE Transactions on Fuzzy Systems (2022) Vol. 31, Iss. 3, pp. 825-834
Closed Access | Times Cited: 21
A Secure Encoding Mechanism Against Deception Attacks on Multisensor Remote State Estimation
Jiayu Zhou, Wenjie Ding, Wen Yang
IEEE Transactions on Information Forensics and Security (2022) Vol. 17, pp. 1959-1969
Closed Access | Times Cited: 20
Jiayu Zhou, Wenjie Ding, Wen Yang
IEEE Transactions on Information Forensics and Security (2022) Vol. 17, pp. 1959-1969
Closed Access | Times Cited: 20
Improving Kalman filter for cyber physical systems subject to replay attacks: An attack-detection-based compensation strategy
Xin Li, Anzhi Lei, Liangkuan Zhu, et al.
Applied Mathematics and Computation (2023) Vol. 466, pp. 128444-128444
Closed Access | Times Cited: 9
Xin Li, Anzhi Lei, Liangkuan Zhu, et al.
Applied Mathematics and Computation (2023) Vol. 466, pp. 128444-128444
Closed Access | Times Cited: 9
Eavesdropping Strategies for Remote State Estimation Under Communication Constraints
Jiayu Zhou, Yue Luo, Yun Liu, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 18, pp. 2250-2261
Closed Access | Times Cited: 8
Jiayu Zhou, Yue Luo, Yun Liu, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 18, pp. 2250-2261
Closed Access | Times Cited: 8
Distributed interval state estimation with l ∞ -gain optimization for cyber–physical systems subject to bounded disturbance and random stealthy attacks
Jiyang Xie, Shuqian Zhu, Dawei Zhang
ISA Transactions (2022) Vol. 127, pp. 22-31
Closed Access | Times Cited: 12
Jiyang Xie, Shuqian Zhu, Dawei Zhang
ISA Transactions (2022) Vol. 127, pp. 22-31
Closed Access | Times Cited: 12
Multisensor Scheduling for Remote State Estimation Over a Temporally Correlated Channel
Jiang Wei, Dan Ye
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 1, pp. 800-808
Closed Access | Times Cited: 12
Jiang Wei, Dan Ye
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 1, pp. 800-808
Closed Access | Times Cited: 12
Multi-sensor fusion particle filtering for Boolean networks with multi-step randomly-delayed measurements
Shao Shao, Linying Xiang
Neurocomputing (2023) Vol. 547, pp. 126386-126386
Closed Access | Times Cited: 7
Shao Shao, Linying Xiang
Neurocomputing (2023) Vol. 547, pp. 126386-126386
Closed Access | Times Cited: 7
Optimal Stealthy Linear-Attack Schedules on Remote State Estimation
Junhui Zhang, Jitao Sun
IEEE Transactions on Signal Processing (2021) Vol. 69, pp. 2807-2817
Closed Access | Times Cited: 16
Junhui Zhang, Jitao Sun
IEEE Transactions on Signal Processing (2021) Vol. 69, pp. 2807-2817
Closed Access | Times Cited: 16
Neural network-based control for RRP-based networked systems under DoS attacks with power interval
Junhui Zhang, Qing‐Guo Wang, Tshilidzi Marwala, et al.
Automatica (2022) Vol. 145, pp. 110555-110555
Closed Access | Times Cited: 11
Junhui Zhang, Qing‐Guo Wang, Tshilidzi Marwala, et al.
Automatica (2022) Vol. 145, pp. 110555-110555
Closed Access | Times Cited: 11
Energy scheduling for DoS attack over multi-hop networks: Deep reinforcement learning approach
Lixin Yang, Jie Tao, Yonghua Liu, et al.
Neural Networks (2023) Vol. 161, pp. 735-745
Closed Access | Times Cited: 6
Lixin Yang, Jie Tao, Yonghua Liu, et al.
Neural Networks (2023) Vol. 161, pp. 735-745
Closed Access | Times Cited: 6
Identification of FIR systems with binary-valued observations against denial-of-service attacks
Jin Guo, Ruizhe Jia, Ruinan Su, et al.
Applied Mathematics and Computation (2023) Vol. 450, pp. 127989-127989
Closed Access | Times Cited: 6
Jin Guo, Ruizhe Jia, Ruinan Su, et al.
Applied Mathematics and Computation (2023) Vol. 450, pp. 127989-127989
Closed Access | Times Cited: 6
DoS Attack Allocation Against Remote State Estimation Over Packet-Dropping Networks
Dan Ye, Mengyao Mei, Jiang Wei
IEEE Transactions on Circuits & Systems II Express Briefs (2021) Vol. 69, Iss. 3, pp. 1507-1511
Closed Access | Times Cited: 15
Dan Ye, Mengyao Mei, Jiang Wei
IEEE Transactions on Circuits & Systems II Express Briefs (2021) Vol. 69, Iss. 3, pp. 1507-1511
Closed Access | Times Cited: 15
Resilient quantized control under Denial-of-Service: Variable bit rate quantization
Shuai Feng, Ahmet Cetinkaya, Hideaki Ishii, et al.
Automatica (2022) Vol. 141, pp. 110302-110302
Open Access | Times Cited: 9
Shuai Feng, Ahmet Cetinkaya, Hideaki Ishii, et al.
Automatica (2022) Vol. 141, pp. 110302-110302
Open Access | Times Cited: 9
A Novel Real-Time Control Approach for Sparse and Safe Frequency Regulation in Inverter Intensive Microgrids
Junhui Zhang, Lizhi Ding, Xiaonan Lu, et al.
IEEE Transactions on Industry Applications (2023) Vol. 59, Iss. 5, pp. 5550-5558
Closed Access | Times Cited: 5
Junhui Zhang, Lizhi Ding, Xiaonan Lu, et al.
IEEE Transactions on Industry Applications (2023) Vol. 59, Iss. 5, pp. 5550-5558
Closed Access | Times Cited: 5
Optimal DoS Attack Scheduling for Cyber–Physical Systems With Channel Hopping Scheme
Xiao-Hui Liu, Jiuxiang Dong, Guang‐Hong Yang
IEEE Transactions on Systems Man and Cybernetics Systems (2023) Vol. 54, Iss. 1, pp. 193-200
Closed Access | Times Cited: 5
Xiao-Hui Liu, Jiuxiang Dong, Guang‐Hong Yang
IEEE Transactions on Systems Man and Cybernetics Systems (2023) Vol. 54, Iss. 1, pp. 193-200
Closed Access | Times Cited: 5
Double Threshold Structure of Sensor Scheduling Policy Over a Finite-State Markov Channel
Jiang Wei, Dan Ye
IEEE Transactions on Cybernetics (2022) Vol. 53, Iss. 11, pp. 7323-7332
Closed Access | Times Cited: 8
Jiang Wei, Dan Ye
IEEE Transactions on Cybernetics (2022) Vol. 53, Iss. 11, pp. 7323-7332
Closed Access | Times Cited: 8