
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A dynamic encryption–decryption scheme for replay attack detection in cyber–physical systems
Tongxiang Li, Zidong Wang, Lei Zou, et al.
Automatica (2023) Vol. 151, pp. 110926-110926
Closed Access | Times Cited: 38
Tongxiang Li, Zidong Wang, Lei Zou, et al.
Automatica (2023) Vol. 151, pp. 110926-110926
Closed Access | Times Cited: 38
Showing 1-25 of 38 citing articles:
Adaptive resilient observer-based control of leader-following smart vehicle platoons subject to compound cyber attacks
Hossein Chehardoli, Ehsan Shafie
International Journal of Dynamics and Control (2025) Vol. 13, Iss. 1
Closed Access
Hossein Chehardoli, Ehsan Shafie
International Journal of Dynamics and Control (2025) Vol. 13, Iss. 1
Closed Access
Attack detection and security control for quadrotor under stealthy attacks
Chengwei Wu, Yupeng Zhu, Lezhong Xu, et al.
Systems & Control Letters (2025) Vol. 197, pp. 106031-106031
Closed Access
Chengwei Wu, Yupeng Zhu, Lezhong Xu, et al.
Systems & Control Letters (2025) Vol. 197, pp. 106031-106031
Closed Access
Optimal DoS Attack Policy Against Periodically Switched System With Two‐Hop Relay Networks
Yu Zhu, Heng Zhang, Engang Tian, et al.
International Journal of Robust and Nonlinear Control (2025)
Closed Access
Yu Zhu, Heng Zhang, Engang Tian, et al.
International Journal of Robust and Nonlinear Control (2025)
Closed Access
An Efficient Cyber Security Attack Detection With Encryption Using Capsule Convolutional Polymorphic Graph Attention
P. J. Sathish Kumar, B. R. Tapas Bapu, Shreya Sridhar, et al.
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 3
Closed Access
P. J. Sathish Kumar, B. R. Tapas Bapu, Shreya Sridhar, et al.
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 3
Closed Access
Detecting and Preventing False Nodes and Messages in Vehicular Ad-Hoc Networking (VANET)
Sadaf Masood, Yousaf Saeed, Abid Ali, et al.
IEEE Access (2023) Vol. 11, pp. 93920-93934
Open Access | Times Cited: 13
Sadaf Masood, Yousaf Saeed, Abid Ali, et al.
IEEE Access (2023) Vol. 11, pp. 93920-93934
Open Access | Times Cited: 13
Data-driven replay attack detection for unknown cyber-physical systems
Zhengdao Zhang, Mingdong Li, Linbo Xie
Information Sciences (2024) Vol. 670, pp. 120562-120562
Closed Access | Times Cited: 4
Zhengdao Zhang, Mingdong Li, Linbo Xie
Information Sciences (2024) Vol. 670, pp. 120562-120562
Closed Access | Times Cited: 4
Distributed resilient adaptive consensus tracking control of nonlinear multi-agent systems dealing with deception attacks via K-filters approach
Xinjun Wang, Ben Niu, Zihao Shang, et al.
Automatica (2024) Vol. 169, pp. 111871-111871
Closed Access | Times Cited: 4
Xinjun Wang, Ben Niu, Zihao Shang, et al.
Automatica (2024) Vol. 169, pp. 111871-111871
Closed Access | Times Cited: 4
Event-triggered Distributed Cubature Kalman Filtering Algorithm with Stealthy Attacks over Sensor Networks
Yinping Ma, Zhoujian Ma, Yinya Li, et al.
IEEE Transactions on Signal and Information Processing over Networks (2025) Vol. 11, pp. 124-135
Closed Access
Yinping Ma, Zhoujian Ma, Yinya Li, et al.
IEEE Transactions on Signal and Information Processing over Networks (2025) Vol. 11, pp. 124-135
Closed Access
Data‐Driven Stealthy Attacks Detection in Cyber‐Physical Systems Based on Complex Dynamical Networks Encoding Strategy
Jun‐Lan Wang, Xiaojian Li
International Journal of Robust and Nonlinear Control (2025)
Closed Access
Jun‐Lan Wang, Xiaojian Li
International Journal of Robust and Nonlinear Control (2025)
Closed Access
Co‐Design of Watermarking and Controller for Reducing Detection Delay of Replay Attacks
Chenggang Xia, Kun Liu, Haojun Wang, et al.
International Journal of Robust and Nonlinear Control (2025)
Closed Access
Chenggang Xia, Kun Liu, Haojun Wang, et al.
International Journal of Robust and Nonlinear Control (2025)
Closed Access
Privacy-preserving filtering, control and optimization for industrial cyber-physical systems
Derui Ding, Qing‐Long Han, Xiaohua Ge, et al.
Science China Information Sciences (2025) Vol. 68, Iss. 4
Closed Access
Derui Ding, Qing‐Long Han, Xiaohua Ge, et al.
Science China Information Sciences (2025) Vol. 68, Iss. 4
Closed Access
Secure group consensus of nonlinear multi‐agent systems with multiple attacks under periodic event‐triggered control
Zhiyu Duan, Airong Wei, Xianfu Zhang
International Journal of Robust and Nonlinear Control (2024) Vol. 34, Iss. 6, pp. 3975-3993
Closed Access | Times Cited: 3
Zhiyu Duan, Airong Wei, Xianfu Zhang
International Journal of Robust and Nonlinear Control (2024) Vol. 34, Iss. 6, pp. 3975-3993
Closed Access | Times Cited: 3
Protocol-Based Non-Fragile State Estimation for Delayed Recurrent Neural Networks Subject to Replay Attacks
Fan Yang, Hongli Dong, Yuxuan Shen, et al.
IEEE/CAA Journal of Automatica Sinica (2024) Vol. 11, Iss. 1, pp. 249-251
Open Access | Times Cited: 3
Fan Yang, Hongli Dong, Yuxuan Shen, et al.
IEEE/CAA Journal of Automatica Sinica (2024) Vol. 11, Iss. 1, pp. 249-251
Open Access | Times Cited: 3
Remote State Estimation Under DoS Attacks in CPSs With Arbitrary Tree Topology: A Bayesian Stackelberg Game Approach
Yuhan Wang, Wei Xing, Junfeng Zhang, et al.
IEEE Transactions on Signal and Information Processing over Networks (2024) Vol. 10, pp. 527-538
Open Access | Times Cited: 3
Yuhan Wang, Wei Xing, Junfeng Zhang, et al.
IEEE Transactions on Signal and Information Processing over Networks (2024) Vol. 10, pp. 527-538
Open Access | Times Cited: 3
Distributed MPC-Based Constant Voltage Control for DC Microgrids Under DoS Attacks
Tongxiang Li, Xi Qin Wen, Bo Chen, et al.
IEEE Transactions on Circuits & Systems II Express Briefs (2024) Vol. 71, Iss. 9, pp. 4266-4270
Closed Access | Times Cited: 2
Tongxiang Li, Xi Qin Wen, Bo Chen, et al.
IEEE Transactions on Circuits & Systems II Express Briefs (2024) Vol. 71, Iss. 9, pp. 4266-4270
Closed Access | Times Cited: 2
Covariance Intersection-Based Kalman Consensus Filtering with Sequential Replay Attack Detection Over Sensor Networks
Yinping Ma, Yinya Li, Ning Wang, et al.
IEEE Sensors Journal (2024) Vol. 24, Iss. 15, pp. 24880-24891
Closed Access | Times Cited: 2
Yinping Ma, Yinya Li, Ning Wang, et al.
IEEE Sensors Journal (2024) Vol. 24, Iss. 15, pp. 24880-24891
Closed Access | Times Cited: 2
Encryption-Based Attack Detection Scheme for Multi-Sensor Secure Fusion Estimation
Tongxiang Li, Pindi Weng, Bo Chen, et al.
IEEE Transactions on Aerospace and Electronic Systems (2024) Vol. 60, Iss. 5, pp. 7548-7554
Closed Access | Times Cited: 2
Tongxiang Li, Pindi Weng, Bo Chen, et al.
IEEE Transactions on Aerospace and Electronic Systems (2024) Vol. 60, Iss. 5, pp. 7548-7554
Closed Access | Times Cited: 2
Optimal control for linear cyber physical systems under replay attacks via time delay estimation approach
Yu Peng, Xueyi Zhang, Ruizhe Jia, et al.
International Journal of Systems Science (2024), pp. 1-10
Closed Access | Times Cited: 2
Yu Peng, Xueyi Zhang, Ruizhe Jia, et al.
International Journal of Systems Science (2024), pp. 1-10
Closed Access | Times Cited: 2
Analysis of Replay Attacks With Countermeasure for State Estimation of Cyber-Physical Systems
Haibin Guo, Jian Sun, Zhong‐Hua Pang
IEEE Transactions on Circuits & Systems II Express Briefs (2023) Vol. 71, Iss. 1, pp. 206-210
Closed Access | Times Cited: 6
Haibin Guo, Jian Sun, Zhong‐Hua Pang
IEEE Transactions on Circuits & Systems II Express Briefs (2023) Vol. 71, Iss. 1, pp. 206-210
Closed Access | Times Cited: 6
Improved asynchronous fault detection filter design for singular fuzzy Markovian jump systems against multi-cyber-attacks
Yuxin Lou, Mengzhuo Luo, Jun Cheng, et al.
Journal of the Franklin Institute (2024) Vol. 361, Iss. 7, pp. 106764-106764
Closed Access | Times Cited: 1
Yuxin Lou, Mengzhuo Luo, Jun Cheng, et al.
Journal of the Franklin Institute (2024) Vol. 361, Iss. 7, pp. 106764-106764
Closed Access | Times Cited: 1
Observer-based MPC for fuzzy cyber–physical system with hybrid attacks via a dynamic event-triggered mechanism
Cancan Wang, Qing Geng, Fucai Liu, et al.
Journal of the Franklin Institute (2024) Vol. 361, Iss. 7, pp. 106772-106772
Closed Access | Times Cited: 1
Cancan Wang, Qing Geng, Fucai Liu, et al.
Journal of the Franklin Institute (2024) Vol. 361, Iss. 7, pp. 106772-106772
Closed Access | Times Cited: 1
Asynchronous finite-time extended dissipative filter on linear neutral semi-Markov jump systems under sensor saturation and dual-channel DoS attacks
Guifang Cheng, Hao Liu
Applied Mathematics and Computation (2024) Vol. 475, pp. 128723-128723
Closed Access | Times Cited: 1
Guifang Cheng, Hao Liu
Applied Mathematics and Computation (2024) Vol. 475, pp. 128723-128723
Closed Access | Times Cited: 1
Mean-square exponential stabilization of memristive neural networks: Dealing with replay attacks and communication interruptions
Shuai Xiao, Zhen Wang, Xindong Si, et al.
Communications in Nonlinear Science and Numerical Simulation (2024) Vol. 138, pp. 108188-108188
Closed Access | Times Cited: 1
Shuai Xiao, Zhen Wang, Xindong Si, et al.
Communications in Nonlinear Science and Numerical Simulation (2024) Vol. 138, pp. 108188-108188
Closed Access | Times Cited: 1
Blockchain-Based Secured LEACH Protocol (BSLEACH)
Shubham Kant Ajay, Ditipriya Sinha, Raj Vikram, et al.
Wireless Personal Communications (2024)
Closed Access | Times Cited: 1
Shubham Kant Ajay, Ditipriya Sinha, Raj Vikram, et al.
Wireless Personal Communications (2024)
Closed Access | Times Cited: 1
Attack estimation and state reconstruction for cyber–physical systems with state delay via reduced-order observer
Xianglin Piao, Chong Lin, Man Zhang, et al.
ISA Transactions (2023) Vol. 144, pp. 11-17
Open Access | Times Cited: 4
Xianglin Piao, Chong Lin, Man Zhang, et al.
ISA Transactions (2023) Vol. 144, pp. 11-17
Open Access | Times Cited: 4