OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Residual-Based False Data Injection Attacks Against Multi-Sensor Estimation Systems
Haibin Guo, Jian Sun, Zhong‐Hua Pang
IEEE/CAA Journal of Automatica Sinica (2023) Vol. 10, Iss. 5, pp. 1181-1191
Closed Access | Times Cited: 21

Showing 21 citing articles:

Event-Based Optimal Stealthy False Data-Injection Attacks Against Remote State Estimation Systems
Haibin Guo, Jian Sun, Zhong‐Hua Pang, et al.
IEEE Transactions on Cybernetics (2023) Vol. 53, Iss. 10, pp. 6714-6724
Closed Access | Times Cited: 25

Cybersecurity Landscape on Remote State Estimation: A Comprehensive Review
Jing Zhou, Jun Shang, Tongwen Chen
IEEE/CAA Journal of Automatica Sinica (2024) Vol. 11, Iss. 4, pp. 851-865
Closed Access | Times Cited: 5

Integrity attacks on state estimation with varying data access: From visibility to full restriction
Jinyuan Wei, Jing Zhou, Tongwen Chen
Automatica (2025) Vol. 174, pp. 112162-112162
Closed Access

An attack-resistant target localization in underwater based on consensus fusion
Chenlu Gao, Jing Nathan Yan, Xian Yang, et al.
Computer Communications (2024) Vol. 218, pp. 131-147
Closed Access | Times Cited: 4

Stealthy Deception Attack for One-on-One Unmanned Aerial Vehicle Air Combat
Wenya Wan, Yijie Liu, Yingmin Yi
Lecture notes in electrical engineering (2025), pp. 575-583
Closed Access

Anti-Watermarking Stealthy Deception Attacks Against Networked Unmanned Surface Vehicles
Xiangyu Kong, Guang‐Hong Yang
IEEE Transactions on Intelligent Transportation Systems (2024) Vol. 25, Iss. 9, pp. 12835-12840
Closed Access | Times Cited: 3

Attack-Resilient Distributed Cooperative Control of Virtually Coupled High-Speed Trains via Topology Reconfiguration
Shunyuan Xiao, Xiaohua Ge, Qing Wu
IEEE/CAA Journal of Automatica Sinica (2024) Vol. 11, Iss. 4, pp. 1066-1068
Open Access | Times Cited: 3

Encryption-Based Attack Detection Scheme for Multi-Sensor Secure Fusion Estimation
Tongxiang Li, Pindi Weng, Bo Chen, et al.
IEEE Transactions on Aerospace and Electronic Systems (2024) Vol. 60, Iss. 5, pp. 7548-7554
Closed Access | Times Cited: 2

Side Information-Based Stealthy False Data Injection Attacks Against Multi-Sensor Remote Estimation
Haibin Guo, Zhong‐Hua Pang, Li Chao
IEEE/CAA Journal of Automatica Sinica (2024) Vol. 11, Iss. 4, pp. 1054-1056
Open Access | Times Cited: 1

An Optimal Attack Strategy Based on Adversary-Modified Historical Innovations
Haoran Wang, Yuwei Ren, Yixian Fang
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 20, pp. 33337-33345
Closed Access | Times Cited: 1

Stealthy False Data Injection Attacks against the Summation Detector in Cyber-Physical Systems
Yifa Liu, Long Cheng, Dan Ye
IEEE Transactions on Industrial Cyber-Physical Systems (2024) Vol. 2, pp. 391-403
Closed Access | Times Cited: 1

Stealthy false data injection attacks against distributed multi-agent systems
Lucheng Sun, Tiejun Wu, Yi Yang, et al.
International Journal of Systems Science (2024), pp. 1-15
Closed Access | Times Cited: 1

Robust corrective control against fundamental and non-fundamental mode attacks with application to an asynchronous digital system
Jung–Min Yang, Seong Woo Kwak
Information Sciences (2024) Vol. 661, pp. 120145-120145
Closed Access

Future Perspectives for Wearable and Wireless Systems for Healthcare
Robert LeMoyne, Timothy Mastroianni
Smart sensors, measurement and instrumentation (2024), pp. 197-200
Closed Access

Optimal Stealthy Attack Design Using Sequential Linear Programming
Dinh Duy Kha Nguyen, Cédric Escudero, Éric Zamaï, et al.
(2024), pp. 744-751
Closed Access

Inexact proximal gradient algorithm with random reshuffling for nonsmooth optimization
Xia Jiang, Yanyan Fang, Xianlin Zeng, et al.
Science China Information Sciences (2024) Vol. 68, Iss. 1
Closed Access

A Periodic Dynamic Encoding Mechanism for Stealthy Attack Detection in Distributed State Estimation
Kun Ding, Wen Yang, Yun Liu, et al.
International Journal of Robust and Nonlinear Control (2024)
Closed Access

Adaptive cooperative secure control of networked multiple unmanned systems under FDI attacks
Yanhui Zhang, Mei Di, Yong Xu, et al.
Security and Safety (2023) Vol. 2, pp. 2023029-2023029
Open Access

Distributed Resilient Nash Equilibrium Seeking for Heterogeneous Linear Systems Under False Data Injection Attacks
Zongze Li, Jun Shi, Maojiao Ye
IECON 2020 The 46th Annual Conference of the IEEE Industrial Electronics Society (2023), pp. 1-4
Closed Access

Finite-Gain £1 Interval Impulsive Observer Design Under Denial-of-Service Attacks
Ruth Line Tagne Mogue, Estelle Courtial, Yasmina Becis, et al.
(2023) Vol. 50, pp. 178-183
Open Access

Page 1

Scroll to top