OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

On Feasibility of Coordinated Time-Delay and False Data Injection Attacks on Cyber–Physical Systems
Zhenyong Zhang, Ruilong Deng, Peng Cheng, et al.
IEEE Internet of Things Journal (2021) Vol. 9, Iss. 11, pp. 8720-8736
Closed Access | Times Cited: 29

Showing 1-25 of 29 citing articles:

Co-Estimation of State and FDI Attacks and Attack Compensation Control for Multi-Area Load Frequency Control Systems Under FDI and DoS Attacks
Xiaoli Chen, Songlin Hu, Li Yu, et al.
IEEE Transactions on Smart Grid (2022) Vol. 13, Iss. 3, pp. 2357-2368
Closed Access | Times Cited: 73

Adaptive Resilient Control for Variable-Speed Wind Turbines Against False Data Injection Attacks
Shiyi Zhao, Qinmin Yang, Peng Cheng, et al.
IEEE Transactions on Sustainable Energy (2022) Vol. 13, Iss. 2, pp. 971-985
Closed Access | Times Cited: 55

Enhancing cybersecurity via attribute reduction with deep learning model for false data injection attack recognition
Faheed A. F. Alrslani, Manal Abdullah Alohali, Mohammed Aljebreen, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access

Security Enhancement of Power System State Estimation With an Effective and Low-Cost Moving Target Defense
Zhenyong Zhang, Ruilong Deng, David K. Y. Yau, et al.
IEEE Transactions on Systems Man and Cybernetics Systems (2022) Vol. 53, Iss. 5, pp. 3066-3081
Closed Access | Times Cited: 20

Adaptive Observer-Based Resilient Control Strategy for Wind Turbines Against Time-Delay Attacks on Rotor Speed Sensor Measurement
Shiyi Zhao, Jinhui Xia, Ruilong Deng, et al.
IEEE Transactions on Sustainable Energy (2023) Vol. 14, Iss. 3, pp. 1807-1821
Closed Access | Times Cited: 10

Vulnerability of the Load Frequency Control Against the Network Parameter Attack
Zhenyong Zhang, Ruilong Deng, David K. Y. Yau
IEEE Transactions on Smart Grid (2023) Vol. 15, Iss. 1, pp. 921-933
Closed Access | Times Cited: 9

MMTD: Multistage Moving Target Defense for Security-Enhanced D-FACTS Operation
Jiazhou Wang, Jue Tian, Yang Liu, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 14, pp. 12234-12247
Closed Access | Times Cited: 8

SPMA: Stealthy Physics-Manipulated Attack and Countermeasures in Cyber-Physical Smart Grid
Zhenyong Zhang, Ruilong Deng, Youliang Tian, et al.
IEEE Transactions on Information Forensics and Security (2022) Vol. 18, pp. 581-596
Closed Access | Times Cited: 12

Metaheuristics based dimensionality reduction with deep learning driven false data injection attack detection for enhanced network security
Thavavel Vaiyapuri, Huda Aldosari, Ghada Alharbi, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 2

Data-Driven Injection Attack Strategy for Linear Cyber-Physical Systems: An Input-Output Data-Based Approach
Sheng Gao, Hao Zhang, Zhuping Wang, et al.
IEEE Transactions on Network Science and Engineering (2023), pp. 1-14
Closed Access | Times Cited: 5

Modified Red Fox Optimizer With Deep Learning Enabled False Data Injection Attack Detection
Hayam Alamro, Khalid Mahmood, Sumayh S. Aljameel, et al.
IEEE Access (2023) Vol. 11, pp. 79256-79264
Open Access | Times Cited: 5

An Optimal Attack Strategy Based on Adversary-Modified Historical Innovations
Haoran Wang, Yuwei Ren, Yixian Fang
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 20, pp. 33337-33345
Closed Access | Times Cited: 1

Resilience-oriented defense strategy for power systems against uncertain malicious coordinated attacks
Xiangxing Kong, Zhigang Lu, Yanlin Li, et al.
Applied Energy (2024) Vol. 378, pp. 124785-124785
Closed Access | Times Cited: 1

CoRE: Constrained Robustness Evaluation of Machine Learning-Based Stability Assessment for Power Systems
Zhenyong Zhang, David K. Y. Yau
IEEE/CAA Journal of Automatica Sinica (2023) Vol. 10, Iss. 2, pp. 557-559
Open Access | Times Cited: 4

A Labeled RFS-Based Framework for Multiple Integrity Attackers Detection and Identification in Cyber–Physical Systems
Chaoqun Yang, Lei Mo, Xianghui Cao, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 21, pp. 19244-19256
Open Access | Times Cited: 4

Dynamic-Line-Rating-Based Robust Corrective Dispatch Against Load Redistribution Attacks With Unknown Objectives
Min Zhou, Jing Wu, Chengnian Long, et al.
IEEE Internet of Things Journal (2022) Vol. 9, Iss. 18, pp. 17756-17766
Closed Access | Times Cited: 6

Critical cyber parameters in hybrid power systems with VSP-based virtual inertia emulation: Theoretical approach and mitigation strategy
Zhiyun Wang, Kaikai Pan, Wenyuan Xu
International Journal of Electrical Power & Energy Systems (2022) Vol. 147, pp. 108877-108877
Closed Access | Times Cited: 3

Security Analysis for Autonomous Ground Vehicle Under Stealthy Sensor Attacks
Zhaoxia Peng, Yingwen Zhang, Guoguang Wen, et al.
IEEE Transactions on Vehicular Technology (2024) Vol. 73, Iss. 9, pp. 12426-12437
Closed Access

Anomaly Observer-Based Cyber-Resilient Torque Control Against Hybrid Attacks in Wind Turbines
Shiyi Zhao, Jinhui Xia, Ruilong Deng, et al.
IEEE Transactions on Smart Grid (2024) Vol. 15, Iss. 6, pp. 6080-6091
Closed Access

Physics-Constrained Robustness Enhancement for Tree Ensembles Applied in Smart Grid
Zhibo Yang, Xiaohan Huang, Bingdong Wang, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 80, Iss. 2, pp. 3001-3019
Open Access

Anti-bump control for switched systems with decentralised adaptive event-triggering
Yiwen Qi, Yunlong Wang, Ming Ji, et al.
International Journal of Systems Science (2024), pp. 1-14
Closed Access

HOTD: A holistic cross-layer time-delay attack detection framework for unmanned aerial vehicle networks
Wenbin Zhai, Shanshan Sun, Liang Liu, et al.
Journal of Parallel and Distributed Computing (2023) Vol. 177, pp. 117-130
Closed Access | Times Cited: 1

Optimal Injection Attack Strategy for Nonlinear Cyber-Physical Systems Based on Iterative Learning
Sheng Gao, Hao Zhang, Chao Huang, et al.
IEEE Transactions on Automation Science and Engineering (2022) Vol. 21, Iss. 1, pp. 56-68
Closed Access | Times Cited: 2

Multi-hop Routing Optimization of Transmission-Line Monitoring Based on the LoRa Technology
Yimei Zhao, Junjie Song, Xin Che
(2022), pp. 8-13
Closed Access | Times Cited: 2

Fault Diagnosis of Microgrids Using Branch Convolution Neural Network and Majority Voting
Zhoubing Li, Meng Zhang, Lin Li, et al.
(2022), pp. 328-333
Closed Access | Times Cited: 1

Page 1 - Next Page

Scroll to top