
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Optimal cooperative multiple-attackers scheduling against remote state estimation of cyber-physical systems
Junhui Zhang, Jitao Sun
Systems & Control Letters (2020) Vol. 144, pp. 104771-104771
Closed Access | Times Cited: 17
Junhui Zhang, Jitao Sun
Systems & Control Letters (2020) Vol. 144, pp. 104771-104771
Closed Access | Times Cited: 17
Showing 17 citing articles:
Security of networked control systems subject to deception attacks: a survey
Zhong‐Hua Pang, Lan-Zhi Fan, Haibin Guo, et al.
International Journal of Systems Science (2022) Vol. 53, Iss. 16, pp. 3577-3598
Closed Access | Times Cited: 64
Zhong‐Hua Pang, Lan-Zhi Fan, Haibin Guo, et al.
International Journal of Systems Science (2022) Vol. 53, Iss. 16, pp. 3577-3598
Closed Access | Times Cited: 64
Event-Based Optimal Stealthy False Data-Injection Attacks Against Remote State Estimation Systems
Haibin Guo, Jian Sun, Zhong‐Hua Pang, et al.
IEEE Transactions on Cybernetics (2023) Vol. 53, Iss. 10, pp. 6714-6724
Closed Access | Times Cited: 25
Haibin Guo, Jian Sun, Zhong‐Hua Pang, et al.
IEEE Transactions on Cybernetics (2023) Vol. 53, Iss. 10, pp. 6714-6724
Closed Access | Times Cited: 25
Stealthy false data injection attacks with resource constraints against multi-sensor estimation systems
Haibin Guo, Jian Sun, Zhong‐Hua Pang
ISA Transactions (2022) Vol. 127, pp. 32-40
Closed Access | Times Cited: 28
Haibin Guo, Jian Sun, Zhong‐Hua Pang
ISA Transactions (2022) Vol. 127, pp. 32-40
Closed Access | Times Cited: 28
Important-Data-Based DoS Attack Mechanism and Resilient H∞ Filter Design for Networked T–S Fuzzy Systems
Xun Wang, Engang Tian, Wei Xing Zheng, et al.
IEEE Transactions on Cybernetics (2023) Vol. 54, Iss. 5, pp. 3352-3362
Closed Access | Times Cited: 19
Xun Wang, Engang Tian, Wei Xing Zheng, et al.
IEEE Transactions on Cybernetics (2023) Vol. 54, Iss. 5, pp. 3352-3362
Closed Access | Times Cited: 19
Optimal encryption strategy for cyber-physical systems against stealthy attacks with energy constraints: A Stackelberg game approach
Xuan Liu, Guang‐Hong Yang
Information Sciences (2022) Vol. 610, pp. 674-693
Closed Access | Times Cited: 12
Xuan Liu, Guang‐Hong Yang
Information Sciences (2022) Vol. 610, pp. 674-693
Closed Access | Times Cited: 12
Optimal Stealthy Attacks With Energy Constraint Against Remote State Estimation
Xuan Liu, Guang‐Hong Yang
IEEE Transactions on Cybernetics (2023) Vol. 54, Iss. 6, pp. 3577-3587
Closed Access | Times Cited: 7
Xuan Liu, Guang‐Hong Yang
IEEE Transactions on Cybernetics (2023) Vol. 54, Iss. 6, pp. 3577-3587
Closed Access | Times Cited: 7
Neural network-based control for RRP-based networked systems under DoS attacks with power interval
Junhui Zhang, Qing‐Guo Wang, Tshilidzi Marwala, et al.
Automatica (2022) Vol. 145, pp. 110555-110555
Closed Access | Times Cited: 11
Junhui Zhang, Qing‐Guo Wang, Tshilidzi Marwala, et al.
Automatica (2022) Vol. 145, pp. 110555-110555
Closed Access | Times Cited: 11
Secondary Frequency and Voltage Regulation for Inverter-Based Microgrids: A Sparsity-Promoting DAPI Control Approach
Junhui Zhang, Yuxi Men, Lizhi Ding, et al.
IEEE Transactions on Control Systems Technology (2024) Vol. 32, Iss. 4, pp. 1512-1519
Closed Access | Times Cited: 1
Junhui Zhang, Yuxi Men, Lizhi Ding, et al.
IEEE Transactions on Control Systems Technology (2024) Vol. 32, Iss. 4, pp. 1512-1519
Closed Access | Times Cited: 1
Integrity attacks on remote estimation with spatial–temporal information sources
Haoyuan Xu, Yake Yang, Jun Shang, et al.
Automatica (2023) Vol. 155, pp. 111172-111172
Closed Access | Times Cited: 4
Haoyuan Xu, Yake Yang, Jun Shang, et al.
Automatica (2023) Vol. 155, pp. 111172-111172
Closed Access | Times Cited: 4
Denial-of-service attacks on cyber–physical systems with two-hop networks under round-robin protocol
Wei Xing, Xudong Zhao, Ning Zhao, et al.
Systems & Control Letters (2023) Vol. 180, pp. 105589-105589
Closed Access | Times Cited: 4
Wei Xing, Xudong Zhao, Ning Zhao, et al.
Systems & Control Letters (2023) Vol. 180, pp. 105589-105589
Closed Access | Times Cited: 4
Secure Distributed State Estimation for Sequentially Interconnected CPSs Under FDI Attacks
Jing Zhou, Bo Chen, Tongxiang Li, et al.
IEEE Transactions on Circuits & Systems II Express Briefs (2023) Vol. 71, Iss. 4, pp. 2454-2458
Closed Access | Times Cited: 3
Jing Zhou, Bo Chen, Tongxiang Li, et al.
IEEE Transactions on Circuits & Systems II Express Briefs (2023) Vol. 71, Iss. 4, pp. 2454-2458
Closed Access | Times Cited: 3
Sampled‐data control for cyber physical systems via identifying false data injection attacks
Peng Yu, Jingliang Wei, Ruizhe Jia, et al.
International Journal of Adaptive Control and Signal Processing (2023) Vol. 37, Iss. 12, pp. 3094-3110
Closed Access | Times Cited: 2
Peng Yu, Jingliang Wei, Ruizhe Jia, et al.
International Journal of Adaptive Control and Signal Processing (2023) Vol. 37, Iss. 12, pp. 3094-3110
Closed Access | Times Cited: 2
Attack estimation–based resilient control for cyber-physical power systems
Kunpeng Pan, Feisheng Yang, Zhaowen Feng, et al.
Transactions of the Institute of Measurement and Control (2022) Vol. 45, Iss. 5, pp. 886-898
Closed Access | Times Cited: 3
Kunpeng Pan, Feisheng Yang, Zhaowen Feng, et al.
Transactions of the Institute of Measurement and Control (2022) Vol. 45, Iss. 5, pp. 886-898
Closed Access | Times Cited: 3
Important-data-based attack design and resilient remote estimation for recurrent neural networks
Xia Zhao, Xun Wang, Jiancun Wu, et al.
Information Sciences (2024) Vol. 675, pp. 120723-120723
Closed Access
Xia Zhao, Xun Wang, Jiancun Wu, et al.
Information Sciences (2024) Vol. 675, pp. 120723-120723
Closed Access
Monitoring and Reconstruction of Actuator and Sensor Attacks for Lipschitz Nonlinear Dynamic Systems Using Two Types of Augmented Descriptor Observers
Hao Wang, Zhi-Wei Gao, Yuanhong Liu
Processes (2024) Vol. 12, Iss. 7, pp. 1383-1383
Open Access
Hao Wang, Zhi-Wei Gao, Yuanhong Liu
Processes (2024) Vol. 12, Iss. 7, pp. 1383-1383
Open Access
Optimal deception attacks under energy harvesting constraints for cyber–physical systems
Xuan Liu, Guang‐Hong Yang, Georgi M. Dimirovski, et al.
Neurocomputing (2024), pp. 128652-128652
Closed Access
Xuan Liu, Guang‐Hong Yang, Georgi M. Dimirovski, et al.
Neurocomputing (2024), pp. 128652-128652
Closed Access
Optimal FDI and DoS Attacks on CPSs with Energy Constraint
Yanan Du, Sai Xu, Shuai Han
ICC 2022 - IEEE International Conference on Communications (2022), pp. 1427-1432
Closed Access | Times Cited: 2
Yanan Du, Sai Xu, Shuai Han
ICC 2022 - IEEE International Conference on Communications (2022), pp. 1427-1432
Closed Access | Times Cited: 2