OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Distributed non-fragile set-membership filtering for nonlinear systems under fading channels and bias injection attacks
Lei Liu, Lifeng Ma, Jie Zhang, et al.
International Journal of Systems Science (2021) Vol. 52, Iss. 6, pp. 1192-1205
Closed Access | Times Cited: 170

Showing 1-25 of 170 citing articles:

Distributed recursive fault estimation with binary encoding schemes over sensor networks
Pengyu Wen, Xuerong Li, Nan Hou, et al.
Systems Science & Control Engineering (2022) Vol. 10, Iss. 1, pp. 417-427
Open Access | Times Cited: 87

Distributed Platooning Control of Automated Vehicles Subject to Replay Attacks Based on Proportional Integral Observers
Meiling Xie, Derui Ding, Xiaohua Ge, et al.
IEEE/CAA Journal of Automatica Sinica (2022) Vol. 11, Iss. 9, pp. 1954-1966
Closed Access | Times Cited: 76

Consensus control for multi-rate multi-agent systems with fading measurements: the dynamic event-triggered case
Fei Han, Jianhua Liu, Jiahui Li, et al.
Systems Science & Control Engineering (2023) Vol. 11, Iss. 1
Open Access | Times Cited: 52

Distributed optimal fusion filtering for singular systems with random transmission delays and packet dropout compensations
Jun Hu, Chen Wang, R. Caballero‐Águila, et al.
Communications in Nonlinear Science and Numerical Simulation (2023) Vol. 119, pp. 107093-107093
Closed Access | Times Cited: 43

Encryption-decryption-based set-membership filtering for two-dimensional systems: on security and boundedness
Kaiqun Zhu, Zidong Wang, Derui Ding, et al.
Automatica (2025) Vol. 173, pp. 112091-112091
Closed Access | Times Cited: 1

Probabilistic-constrained distributed fusion filtering for a class of time-varying systems over sensor networks: a torus-event-triggering mechanism
Fanrong Qu, Xia Zhao, Xinmeng Wang, et al.
International Journal of Systems Science (2021) Vol. 53, Iss. 6, pp. 1288-1297
Closed Access | Times Cited: 85

Chance-Constrained H State Estimation for Recursive Neural Networks Under Deception Attacks and Energy Constraints: The Finite-Horizon Case
Fanrong Qu, Engang Tian, Xia Zhao
IEEE Transactions on Neural Networks and Learning Systems (2022) Vol. 34, Iss. 9, pp. 6492-6503
Closed Access | Times Cited: 65

Non-fragile l2-l state estimation for time-delayed artificial neural networks: an adaptive event-triggered approach
Licheng Wang, Shuai Liu, Yuhan Zhang, et al.
International Journal of Systems Science (2022) Vol. 53, Iss. 10, pp. 2247-2259
Closed Access | Times Cited: 65

Partial-Node-Based State Estimation for Delayed Complex Networks Under Intermittent Measurement Outliers: A Multiple-Order-Holder Approach
Lei Zou, Zidong Wang, Jun Hu, et al.
IEEE Transactions on Neural Networks and Learning Systems (2022) Vol. 34, Iss. 10, pp. 7181-7195
Closed Access | Times Cited: 54

Security-Ensured State of Charge Estimation of Lithium-Ion Batteries Subject to Malicious Attacks
Engang Tian, Hui Chen, Changsong Wang, et al.
IEEE Transactions on Smart Grid (2022) Vol. 14, Iss. 3, pp. 2250-2261
Closed Access | Times Cited: 49

Proportional–integral-type estimator design for delayed recurrent neural networks under encoding–decoding mechanism
Fan Yang, Jiahui Li, Hongli Dong, et al.
International Journal of Systems Science (2022) Vol. 53, Iss. 13, pp. 2729-2741
Closed Access | Times Cited: 48

Covert Attack Detection for LFC Systems of Electric Vehicles: A Dual Time-Varying Coding Method
Zhihua Wu, Engang Tian, Hongtian Chen
IEEE/ASME Transactions on Mechatronics (2022) Vol. 28, Iss. 2, pp. 681-691
Closed Access | Times Cited: 39

A ranking-system-based switching particle swarm optimizer with dynamic learning strategies
Han Li, Juan Li, Peishu Wu, et al.
Neurocomputing (2022) Vol. 494, pp. 356-367
Closed Access | Times Cited: 38

Single-Source to Single-Target Cross-Subject Motor Imagery Classification Based on Multisubdomain Adaptation Network
Yi Chen, Rui Yang, Mengjie Huang, et al.
IEEE Transactions on Neural Systems and Rehabilitation Engineering (2022) Vol. 30, pp. 1992-2002
Open Access | Times Cited: 38

Novel attack‐defense framework for nonlinear complex networks: An important‐data‐based method
Xun Wang, Engang Tian, Bin Wei, et al.
International Journal of Robust and Nonlinear Control (2022) Vol. 33, Iss. 4, pp. 2861-2878
Closed Access | Times Cited: 38

A dynamic encryption–decryption scheme for replay attack detection in cyber–physical systems
Tongxiang Li, Zidong Wang, Lei Zou, et al.
Automatica (2023) Vol. 151, pp. 110926-110926
Closed Access | Times Cited: 38

Moving horizon estimation over relay channels: Dealing with packet losses
Lei Zou, Zidong Wang, Bo Shen, et al.
Automatica (2023) Vol. 155, pp. 111079-111079
Closed Access | Times Cited: 34

Collaborative-prediction-based recursive filtering for nonlinear systems with sensor saturation under duty cycle scheduling
Hongyu Gao, Yue Li, Lindong Yu, et al.
Systems Science & Control Engineering (2023) Vol. 11, Iss. 1
Open Access | Times Cited: 29

A review: data driven-based fault diagnosis and RUL prediction of petroleum machinery and equipment
Daan Ji, Chuang Wang, Jiahui Li, et al.
Systems Science & Control Engineering (2021) Vol. 9, Iss. 1, pp. 724-747
Open Access | Times Cited: 47

Event-Triggered Set-Membership State Estimation for Complex Networks: A Zonotopes-Based Method
Zhongyi Zhao, Zidong Wang, Lei Zou, et al.
IEEE Transactions on Network Science and Engineering (2021) Vol. 9, Iss. 3, pp. 1175-1186
Closed Access | Times Cited: 41

Outlier-Resistant Filtering With Dead-Zone-Like Censoring Under Try-Once-Discard Protocol
Hang Geng, Zidong Wang, Ali Mousavi, et al.
IEEE Transactions on Signal Processing (2022) Vol. 70, pp. 714-728
Closed Access | Times Cited: 36

LACN: A lightweight attention-guided ConvNeXt network for low-light image enhancement
Saijie Fan, Wei Liang, Derui Ding, et al.
Engineering Applications of Artificial Intelligence (2022) Vol. 117, pp. 105632-105632
Closed Access | Times Cited: 36

A New Particle Swarm Optimization Algorithm for Outlier Detection: Industrial Data Clustering in Wire Arc Additive Manufacturing
Jingzhong Fang, Zidong Wang, Weibo Liu, et al.
IEEE Transactions on Automation Science and Engineering (2022) Vol. 21, Iss. 2, pp. 1244-1257
Open Access | Times Cited: 34

Distributed State Estimation Over Wireless Sensor Networks With Energy Harvesting Sensors
Wei Chen, Zidong Wang, Derui Ding, et al.
IEEE Transactions on Cybernetics (2022) Vol. 53, Iss. 5, pp. 3311-3324
Closed Access | Times Cited: 32

Secure Estimation Against Malicious Attacks for Lithium-Ion Batteries Under Cloud Environments
Licheng Wang, Engang Tian, Changsong Wang, et al.
IEEE Transactions on Circuits and Systems I Regular Papers (2022) Vol. 69, Iss. 10, pp. 4237-4247
Closed Access | Times Cited: 31

Page 1 - Next Page

Scroll to top