
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Decentralized False-Data Injection Attacks Against State Omniscience: Existence and Security Analysis
Tianyu Zhang, Dan Ye, Yang Shi
IEEE Transactions on Automatic Control (2022) Vol. 68, Iss. 8, pp. 4634-4649
Closed Access | Times Cited: 41
Tianyu Zhang, Dan Ye, Yang Shi
IEEE Transactions on Automatic Control (2022) Vol. 68, Iss. 8, pp. 4634-4649
Closed Access | Times Cited: 41
Showing 1-25 of 41 citing articles:
Fully Distributed Observer Design for Mobile Targets
Xiaoling Wang, Zhen Fan, Lin Wang, et al.
IEEE Transactions on Network Science and Engineering (2023) Vol. 10, Iss. 3, pp. 1696-1708
Closed Access | Times Cited: 20
Xiaoling Wang, Zhen Fan, Lin Wang, et al.
IEEE Transactions on Network Science and Engineering (2023) Vol. 10, Iss. 3, pp. 1696-1708
Closed Access | Times Cited: 20
Dynamic Leader-following Bipartite Consensus of Multiple Euler-Lagrange Systems Subject to DoS Attacks
Hongtao Li, Dan Liu, Kun Zhou, et al.
International Journal of Control Automation and Systems (2025) Vol. 23, Iss. 1, pp. 187-195
Closed Access
Hongtao Li, Dan Liu, Kun Zhou, et al.
International Journal of Control Automation and Systems (2025) Vol. 23, Iss. 1, pp. 187-195
Closed Access
Distributed adaptive finite-time and fixed-time cluster synchronization of complex networks
Shikun Zhang, Dan Liu, Xiaohong Cui, et al.
Journal of the Franklin Institute (2025), pp. 107533-107533
Closed Access
Shikun Zhang, Dan Liu, Xiaohong Cui, et al.
Journal of the Franklin Institute (2025), pp. 107533-107533
Closed Access
Ripple effect of cooperative attacks in multi-agent systems: Results on minimum attack targets
Tianyu Zhang, Dan Ye, Guang‐Hong Yang
Automatica (2023) Vol. 159, pp. 111307-111307
Open Access | Times Cited: 13
Tianyu Zhang, Dan Ye, Guang‐Hong Yang
Automatica (2023) Vol. 159, pp. 111307-111307
Open Access | Times Cited: 13
Dynamic load altering attack detection for cyber physical power systems via sliding mode observer
Jian Li, Hongliang Li, Qingyu Su
International Journal of Electrical Power & Energy Systems (2023) Vol. 153, pp. 109320-109320
Open Access | Times Cited: 10
Jian Li, Hongliang Li, Qingyu Su
International Journal of Electrical Power & Energy Systems (2023) Vol. 153, pp. 109320-109320
Open Access | Times Cited: 10
Data driven secure control for cyber–physical systems under hybrid attacks: A Stackelberg game approach
Cheng Fei, Jun Shen, Hongling Qiu, et al.
Journal of the Franklin Institute (2024) Vol. 361, Iss. 6, pp. 106715-106715
Closed Access | Times Cited: 3
Cheng Fei, Jun Shen, Hongling Qiu, et al.
Journal of the Franklin Institute (2024) Vol. 361, Iss. 6, pp. 106715-106715
Closed Access | Times Cited: 3
Identification and analysis of stochastic deception attacks on cyber–physical systems
Soheila Barchinezhad, Mohammad Sayad Haghighi, Vicenç Puig
Journal of the Franklin Institute (2024) Vol. 361, Iss. 8, pp. 106774-106774
Closed Access | Times Cited: 3
Soheila Barchinezhad, Mohammad Sayad Haghighi, Vicenç Puig
Journal of the Franklin Institute (2024) Vol. 361, Iss. 8, pp. 106774-106774
Closed Access | Times Cited: 3
Vulnerability Analysis of Distributed State Estimator Under False Data Injection Attacks
Pengyu Li, Dan Ye
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 5235-5244
Closed Access | Times Cited: 3
Pengyu Li, Dan Ye
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 5235-5244
Closed Access | Times Cited: 3
Adaptive Fault-Tolerant Consensus Tracking Control of Stochastic High-Order MASs Under FDI Attacks
Xinfeng Shao, Dan Ye, Xingang Zhao
IEEE Transactions on Fuzzy Systems (2024) Vol. 32, Iss. 5, pp. 2543-2553
Closed Access | Times Cited: 3
Xinfeng Shao, Dan Ye, Xingang Zhao
IEEE Transactions on Fuzzy Systems (2024) Vol. 32, Iss. 5, pp. 2543-2553
Closed Access | Times Cited: 3
Event-Triggered Guaranteed Cost Secure Consensus Control of Multiagent Systems Under DoS Attacks Over Multiple Communication Channels
Xiangyang Cao, Daduan Zhao, Yue Sun, et al.
IEEE Transactions on Control of Network Systems (2023) Vol. 11, Iss. 1, pp. 113-125
Closed Access | Times Cited: 8
Xiangyang Cao, Daduan Zhao, Yue Sun, et al.
IEEE Transactions on Control of Network Systems (2023) Vol. 11, Iss. 1, pp. 113-125
Closed Access | Times Cited: 8
Distributed Consensus Estimation for Networked Multi-Sensor Systems under Hybrid Attacks and Missing Measurements
Zhijian Cheng, Yang Lan, Qunyao Yuan, et al.
Sensors (2024) Vol. 24, Iss. 13, pp. 4071-4071
Open Access | Times Cited: 2
Zhijian Cheng, Yang Lan, Qunyao Yuan, et al.
Sensors (2024) Vol. 24, Iss. 13, pp. 4071-4071
Open Access | Times Cited: 2
Resilient control co-design for cyber-Physical systems with DoS attacks via a successive convex optimization approach
Yiyue Zhang, Yingying Ren, Da‐Wei Ding
Journal of the Franklin Institute (2023) Vol. 360, Iss. 9, pp. 6253-6274
Closed Access | Times Cited: 5
Yiyue Zhang, Yingying Ren, Da‐Wei Ding
Journal of the Franklin Institute (2023) Vol. 360, Iss. 9, pp. 6253-6274
Closed Access | Times Cited: 5
NNs-observer-based fully distributed consensus control for MASs under deception attacks
Lei Zhang, Wei‐Wei Che, Junhang Ding
Applied Mathematics and Computation (2023) Vol. 456, pp. 128140-128140
Closed Access | Times Cited: 4
Lei Zhang, Wei‐Wei Che, Junhang Ding
Applied Mathematics and Computation (2023) Vol. 456, pp. 128140-128140
Closed Access | Times Cited: 4
Data-Driven Undetectable Attack Against State Estimation in Distributed Control Systems
Kaiyu Wang, Dan Ye, Tianyu Zhang
IEEE Transactions on Systems Man and Cybernetics Systems (2024) Vol. 54, Iss. 5, pp. 3134-3143
Closed Access | Times Cited: 1
Kaiyu Wang, Dan Ye, Tianyu Zhang
IEEE Transactions on Systems Man and Cybernetics Systems (2024) Vol. 54, Iss. 5, pp. 3134-3143
Closed Access | Times Cited: 1
Vulnerability analysis of cyber-physical power systems based on failure propagation probability
Qingyu Su, Jixiang Sun, Jian Li
International Journal of Electrical Power & Energy Systems (2024) Vol. 157, pp. 109877-109877
Open Access | Times Cited: 1
Qingyu Su, Jixiang Sun, Jian Li
International Journal of Electrical Power & Energy Systems (2024) Vol. 157, pp. 109877-109877
Open Access | Times Cited: 1
Dynamic event-triggered resilient network-level control for microgrids subject to FDI attacks
Chen Zhang, Dan Ye, Minghan Wei, et al.
Nonlinear Dynamics (2024) Vol. 112, Iss. 11, pp. 9195-9207
Closed Access | Times Cited: 1
Chen Zhang, Dan Ye, Minghan Wei, et al.
Nonlinear Dynamics (2024) Vol. 112, Iss. 11, pp. 9195-9207
Closed Access | Times Cited: 1
Multi-group consensus of multi-agent systems subject to semi-Markov jump topologies against hybrid cyber-attacks
Duomei Li, Feng Li, Jianwei Xia, et al.
Information Sciences (2024) Vol. 679, pp. 121092-121092
Closed Access | Times Cited: 1
Duomei Li, Feng Li, Jianwei Xia, et al.
Information Sciences (2024) Vol. 679, pp. 121092-121092
Closed Access | Times Cited: 1
Fully distributed event‐triggered consensus control for linear multiagent systems under DoS attacks
Shengli Du, Hong Sheng, Haoyuan Sun
IET Control Theory and Applications (2023) Vol. 17, Iss. 11, pp. 1485-1494
Open Access | Times Cited: 3
Shengli Du, Hong Sheng, Haoyuan Sun
IET Control Theory and Applications (2023) Vol. 17, Iss. 11, pp. 1485-1494
Open Access | Times Cited: 3
Secure State Estimation Against Eavesdropping Attacks Based on Time-Varying Coding and Noise-Adding
Fei Tao, Dan Ye
IEEE Transactions on Network Science and Engineering (2023) Vol. 11, Iss. 1, pp. 174-184
Closed Access | Times Cited: 3
Fei Tao, Dan Ye
IEEE Transactions on Network Science and Engineering (2023) Vol. 11, Iss. 1, pp. 174-184
Closed Access | Times Cited: 3
Distributed resilient fusion estimation for resource-limited CPSs under hybrid attacks
Fei Tao, Dan Ye
Information Sciences (2023) Vol. 648, pp. 119527-119527
Closed Access | Times Cited: 3
Fei Tao, Dan Ye
Information Sciences (2023) Vol. 648, pp. 119527-119527
Closed Access | Times Cited: 3
Optimal Innovation-Based Stealthy Attacks in Networked LQG Systems With Attack Cost
Kaijing Jin, Dan Ye
IEEE Transactions on Cybernetics (2022) Vol. 54, Iss. 2, pp. 787-796
Closed Access | Times Cited: 5
Kaijing Jin, Dan Ye
IEEE Transactions on Cybernetics (2022) Vol. 54, Iss. 2, pp. 787-796
Closed Access | Times Cited: 5
Design and countermeasure of optimal cyber-routing attack on remote Kalman filter in stochastic microgrids
Yunbo Song, Dan Ye
Information Sciences (2023) Vol. 649, pp. 119626-119626
Closed Access | Times Cited: 2
Yunbo Song, Dan Ye
Information Sciences (2023) Vol. 649, pp. 119626-119626
Closed Access | Times Cited: 2
Secure state estimation for affine T-S fuzzy systems under sparse sensor attacks
Huimin Wang, Hou Qiao
Journal of the Franklin Institute (2024) Vol. 361, Iss. 8, pp. 106793-106793
Closed Access
Huimin Wang, Hou Qiao
Journal of the Franklin Institute (2024) Vol. 361, Iss. 8, pp. 106793-106793
Closed Access
Stealthy attacks against distributed state estimation of stochastic multi-agent systems under composite attack detection mechanisms
Dong-Yu Zhang, Xiaojian Li
Information Sciences (2024) Vol. 672, pp. 120584-120584
Closed Access
Dong-Yu Zhang, Xiaojian Li
Information Sciences (2024) Vol. 672, pp. 120584-120584
Closed Access
Synthesis of covert command attackers at the supervisory layer of cyber-physical systems
Yitong Li, Lidong He, Xiaoling Wang
Journal of the Franklin Institute (2024) Vol. 361, Iss. 10, pp. 106887-106887
Closed Access
Yitong Li, Lidong He, Xiaoling Wang
Journal of the Franklin Institute (2024) Vol. 361, Iss. 10, pp. 106887-106887
Closed Access