
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Ripple effect of cooperative attacks in multi-agent systems: Results on minimum attack targets
Tianyu Zhang, Dan Ye, Guang‐Hong Yang
Automatica (2023) Vol. 159, pp. 111307-111307
Open Access | Times Cited: 13
Tianyu Zhang, Dan Ye, Guang‐Hong Yang
Automatica (2023) Vol. 159, pp. 111307-111307
Open Access | Times Cited: 13
Showing 13 citing articles:
Dynamic Leader-following Bipartite Consensus of Multiple Euler-Lagrange Systems Subject to DoS Attacks
Hongtao Li, Dan Liu, Kun Zhou, et al.
International Journal of Control Automation and Systems (2025) Vol. 23, Iss. 1, pp. 187-195
Closed Access
Hongtao Li, Dan Liu, Kun Zhou, et al.
International Journal of Control Automation and Systems (2025) Vol. 23, Iss. 1, pp. 187-195
Closed Access
Distributed adaptive finite-time and fixed-time cluster synchronization of complex networks
Shikun Zhang, Dan Liu, Xiaohong Cui, et al.
Journal of the Franklin Institute (2025), pp. 107533-107533
Closed Access
Shikun Zhang, Dan Liu, Xiaohong Cui, et al.
Journal of the Franklin Institute (2025), pp. 107533-107533
Closed Access
Multi-group consensus of multi-agent systems subject to semi-Markov jump topologies against hybrid cyber-attacks
Duomei Li, Feng Li, Jianwei Xia, et al.
Information Sciences (2024) Vol. 679, pp. 121092-121092
Closed Access | Times Cited: 1
Duomei Li, Feng Li, Jianwei Xia, et al.
Information Sciences (2024) Vol. 679, pp. 121092-121092
Closed Access | Times Cited: 1
Secure state estimation for affine T-S fuzzy systems under sparse sensor attacks
Huimin Wang, Hou Qiao
Journal of the Franklin Institute (2024) Vol. 361, Iss. 8, pp. 106793-106793
Closed Access
Huimin Wang, Hou Qiao
Journal of the Franklin Institute (2024) Vol. 361, Iss. 8, pp. 106793-106793
Closed Access
Dynamic event-triggered control for multi-channel cyber-physical systems under denial-of-service attacks
Yong-Peng Sun, Guang‐Hong Yang, Georgi M. Dimirovski
Journal of the Franklin Institute (2024) Vol. 361, Iss. 11, pp. 106933-106933
Closed Access
Yong-Peng Sun, Guang‐Hong Yang, Georgi M. Dimirovski
Journal of the Franklin Institute (2024) Vol. 361, Iss. 11, pp. 106933-106933
Closed Access
Data-driven attack policy design for cyber-physical systems under channel constraints
He Liu, Xiaojian Li
Information Sciences (2024) Vol. 677, pp. 120894-120894
Closed Access
He Liu, Xiaojian Li
Information Sciences (2024) Vol. 677, pp. 120894-120894
Closed Access
Distributed Secure State Estimation for Cyber-Physical Systems Under False Data Injection Attacks
Xinyu Zhang, Guang‐Hong Yang
IEEE Transactions on Network Science and Engineering (2024) Vol. 11, Iss. 5, pp. 4443-4455
Closed Access
Xinyu Zhang, Guang‐Hong Yang
IEEE Transactions on Network Science and Engineering (2024) Vol. 11, Iss. 5, pp. 4443-4455
Closed Access
Asymmetrical vulnerability of heterogeneous multi-agent systems under false-data injection attacks
Tianyu Zhang, Guang‐Hong Yang, Dan Ye
Automatica (2024) Vol. 171, pp. 111947-111947
Closed Access
Tianyu Zhang, Guang‐Hong Yang, Dan Ye
Automatica (2024) Vol. 171, pp. 111947-111947
Closed Access
Data-Based Tampered-Data Recovery Strategy With Encoding Against Stealthy Attack for Unknown Discrete-Time Systems
Ning Wang, Guang‐Hong Yang
IEEE Transactions on Cybernetics (2024) Vol. 54, Iss. 12, pp. 7261-7271
Closed Access
Ning Wang, Guang‐Hong Yang
IEEE Transactions on Cybernetics (2024) Vol. 54, Iss. 12, pp. 7261-7271
Closed Access
Optimal Stealthy Attack With Side Information Against Remote State Estimation: A Corrupted Innovation-Based Strategy
L.Y. Mao, Guang‐Hong Yang
IEEE Transactions on Cybernetics (2024) Vol. 55, Iss. 2, pp. 897-904
Closed Access
L.Y. Mao, Guang‐Hong Yang
IEEE Transactions on Cybernetics (2024) Vol. 55, Iss. 2, pp. 897-904
Closed Access
MSD-CDRL: A generic fusion detection framework for logic covert attack towards cyber-physical system security
Lianpeng Li, Siyuan Liu
Journal of Information Security and Applications (2024) Vol. 89, pp. 103947-103947
Closed Access
Lianpeng Li, Siyuan Liu
Journal of Information Security and Applications (2024) Vol. 89, pp. 103947-103947
Closed Access
A technique to detect and mitigate false data injection attacks in Cyber-Physical Systems
Sushree Padhan, Ashok Kumar Turuk
Computers & Security (2024), pp. 104253-104253
Closed Access
Sushree Padhan, Ashok Kumar Turuk
Computers & Security (2024), pp. 104253-104253
Closed Access
Stability analysis of discrete‐time switched positive linear systems with unstable subsystem
Li‐Juan Liu, Zhao Zhang, Hamid Reza Karimi, et al.
Asian Journal of Control (2024)
Closed Access
Li‐Juan Liu, Zhao Zhang, Hamid Reza Karimi, et al.
Asian Journal of Control (2024)
Closed Access