OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A game theoretic approach to multi-channel transmission scheduling for multiple linear systems under DoS attacks
Junhui Zhang, Jitao Sun
Systems & Control Letters (2019) Vol. 133, pp. 104546-104546
Closed Access | Times Cited: 30

Showing 1-25 of 30 citing articles:

Optimal DoS attack schedules on remote state estimation under multi-sensor round-robin protocol
Junhui Zhang, Jitao Sun, Hai Lin
Automatica (2021) Vol. 127, pp. 109517-109517
Closed Access | Times Cited: 55

Resilient Control of Networked Switched Systems Against DoS Attack
Jie Lian, Xi Huang
IEEE Transactions on Industrial Informatics (2021) Vol. 18, Iss. 4, pp. 2354-2363
Closed Access | Times Cited: 28

Event-triggered bipartite consensus over cooperation-competition networks under DoS attacks
Aihua Hu, Myeongjin Park, Jinde Cao, et al.
Science China Technological Sciences (2020) Vol. 64, Iss. 1, pp. 157-168
Closed Access | Times Cited: 28

The Applicability of Reinforcement Learning Methods in the Development of Industry 4.0 Applications
Tamás Kegyes, Zoltán Süle, János Abonyi
Complexity (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 23

Learning-Based Secure Control for Multichannel Networked Systems Under Smart Attacks
Yi Yu, Shuai Liu, Wenshan Hu
IEEE Transactions on Industrial Electronics (2022) Vol. 70, Iss. 7, pp. 7183-7193
Closed Access | Times Cited: 14

Leader-following event-triggered consensus control of MASs under false data injection attacks
Meirong Wang, Jianqiang Hu, Wenying Xu, et al.
Systems & Control Letters (2023) Vol. 178, pp. 105579-105579
Closed Access | Times Cited: 8

Stochastic Game in Linear Quadratic Gaussian Control for Wireless Networked Control Systems Under DoS Attacks
Junhui Zhang, Jitao Sun, Chengcui Zhang
IEEE Transactions on Systems Man and Cybernetics Systems (2020) Vol. 52, Iss. 2, pp. 902-910
Closed Access | Times Cited: 22

Multisensor Scheduling for Remote State Estimation Over a Temporally Correlated Channel
Jiang Wei, Dan Ye
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 1, pp. 800-808
Closed Access | Times Cited: 12

Optimal Stealthy Linear-Attack Schedules on Remote State Estimation
Junhui Zhang, Jitao Sun
IEEE Transactions on Signal Processing (2021) Vol. 69, pp. 2807-2817
Closed Access | Times Cited: 16

Neural network-based control for RRP-based networked systems under DoS attacks with power interval
Junhui Zhang, Qing‐Guo Wang, Tshilidzi Marwala, et al.
Automatica (2022) Vol. 145, pp. 110555-110555
Closed Access | Times Cited: 11

Optimal cooperative multiple-attackers scheduling against remote state estimation of cyber-physical systems
Junhui Zhang, Jitao Sun
Systems & Control Letters (2020) Vol. 144, pp. 104771-104771
Closed Access | Times Cited: 17

Process mining-based anomaly detection of additive manufacturing process activities using a game theory modeling approach
Shideh Saraeian, Babak Shirazi
Computers & Industrial Engineering (2020) Vol. 146, pp. 106584-106584
Closed Access | Times Cited: 14

Resilient quantized control for asynchronous sampled-data networked control systems under DoS attacks
Xiaodan Zhang, Feng Xiao, Aiping Wang, et al.
Systems & Control Letters (2023) Vol. 179, pp. 105590-105590
Closed Access | Times Cited: 5

Q-Learning for Securing Cyber-Physical Systems : A survey
Montdher Alabadi, Zafer Albayrak
2022 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA) (2020)
Closed Access | Times Cited: 13

Nash equilibrium seeking for individual linear dynamics subject to limited communication resources
Liu Pin, Feng Xiao, Bo Wei, et al.
Systems & Control Letters (2022) Vol. 161, pp. 105162-105162
Closed Access | Times Cited: 8

Secure Strategy Design for Networked Control Systems under Multiple Cyber-attacks over a Multi-channel Framework
Yuliang Wu, Jing Wu, Chengnian Long, et al.
2022 34th Chinese Control and Decision Conference (CCDC) (2024), pp. 5050-5055
Closed Access | Times Cited: 1

Improved Performance on Wireless Sensors Network Using Multi-Channel Clustering Hierarchy
Robby Rizky, Mustafid Mustafid, Teddy Mantoro
Journal of Sensor and Actuator Networks (2022) Vol. 11, Iss. 4, pp. 73-73
Open Access | Times Cited: 6

Nonfragile security control for time‐varying cyber‐physical systems operating over multipath networks
Jianying Di, Cheng Tan
International Journal of Robust and Nonlinear Control (2023) Vol. 34, Iss. 5, pp. 3481-3498
Closed Access | Times Cited: 2

Self-triggered model predictive control for nonlinear continuous-time networked system via ensured performance control samples selection
Anni Li, Jitao Sun
International Journal of Control (2021) Vol. 95, Iss. 10, pp. 2793-2801
Closed Access | Times Cited: 5

Robust event‐triggered distributed min–max model predictive control of continuous‐time non‐linear systems
Anni Li, Jitao Sun
IET Control Theory and Applications (2020) Vol. 14, Iss. 19, pp. 3320-3329
Closed Access | Times Cited: 4

Exploration-Driven Reinforcement Learning for Avionic System Fault Detection (Experience Paper)
Paul-Antoine Le Tolguenec, Emmanuel Rachelson, Yann Besse, et al.
(2024), pp. 920-931
Open Access

DFMS: Differential flow management scheme for denial of service impact mitigation in 5G communications
P Sakthibalan, Karthik Devarajan
Journal of King Saud University - Computer and Information Sciences (2020) Vol. 34, Iss. 8, pp. 5366-5374
Open Access | Times Cited: 2

SINR-based power schedule of sensors and DoS attackers in wireless network
Guangyan Xu, Qiuying Sun, Hao Liu
ISA Transactions (2021) Vol. 125, pp. 330-337
Closed Access | Times Cited: 2

SINR-based power allocation under DoS attacks: A Stackelberg game approach
Guangyan Xu, Yijun He, Hao Liu
2022 34th Chinese Control and Decision Conference (CCDC) (2022), pp. 5446-5451
Closed Access | Times Cited: 1

Time-Triggered Control of Double Channel Transmission Networked Switched Systems under DoS Attacks
Jie Lian, Hao Li, Feiyue Wu, et al.
(2023), pp. 5263-5268
Closed Access

Page 1 - Next Page

Scroll to top