
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Encryption-Decryption-Based State Estimation With Multirate Measurements Against Eavesdroppers: A Recursive Minimum-Variance Approach
Lei Zou, Zidong Wang, Bo Shen, et al.
IEEE Transactions on Automatic Control (2023) Vol. 68, Iss. 12, pp. 8111-8118
Closed Access | Times Cited: 36
Lei Zou, Zidong Wang, Bo Shen, et al.
IEEE Transactions on Automatic Control (2023) Vol. 68, Iss. 12, pp. 8111-8118
Closed Access | Times Cited: 36
Showing 1-25 of 36 citing articles:
A survey on privacy-preserving control and filtering of networked control systems
Wei Wang, Lifeng Ma, Qiangqiang Rui, et al.
International Journal of Systems Science (2024) Vol. 55, Iss. 11, pp. 2269-2288
Closed Access | Times Cited: 15
Wei Wang, Lifeng Ma, Qiangqiang Rui, et al.
International Journal of Systems Science (2024) Vol. 55, Iss. 11, pp. 2269-2288
Closed Access | Times Cited: 15
Privacy-preserving distributed state estimation for microgrids based on encrypted measurements under bit-rate constraints
Peifeng Zhao, Yangkai Chen, Derui Ding, et al.
International Journal of Systems Science (2025), pp. 1-18
Closed Access | Times Cited: 1
Peifeng Zhao, Yangkai Chen, Derui Ding, et al.
International Journal of Systems Science (2025), pp. 1-18
Closed Access | Times Cited: 1
Encryption–decryption-based state estimation for nonlinear complex networks subject to coupled perturbation
Peixia Gao, Chaoqing Jia, Aozhan Zhou
Systems Science & Control Engineering (2024) Vol. 12, Iss. 1
Open Access | Times Cited: 5
Peixia Gao, Chaoqing Jia, Aozhan Zhou
Systems Science & Control Engineering (2024) Vol. 12, Iss. 1
Open Access | Times Cited: 5
Recursive state estimation in relay channels with enhanced security against eavesdropping: An innovative encryption–decryption framework
Lei Zou, Zidong Wang, Bo Shen, et al.
Automatica (2025) Vol. 174, pp. 112159-112159
Closed Access
Lei Zou, Zidong Wang, Bo Shen, et al.
Automatica (2025) Vol. 174, pp. 112159-112159
Closed Access
An overview of distributed economic dispatch of microgrids: advances and challenges
Lei Sun, Wenjing An, Yangkai Chen, et al.
Systems Science & Control Engineering (2025) Vol. 13, Iss. 1
Open Access
Lei Sun, Wenjing An, Yangkai Chen, et al.
Systems Science & Control Engineering (2025) Vol. 13, Iss. 1
Open Access
RFVIR: A robust federated algorithm defending against Byzantine attacks
Yongkang Wang, Di‐Hua Zhai, Yuanqing Xia
Information Fusion (2024) Vol. 105, pp. 102251-102251
Closed Access | Times Cited: 4
Yongkang Wang, Di‐Hua Zhai, Yuanqing Xia
Information Fusion (2024) Vol. 105, pp. 102251-102251
Closed Access | Times Cited: 4
Watermarking-Aided Dimensionality Reduction Encryption for Distributed Fusion Estimation against Eavesdropping
Yuhang Yang, Shenmin Song
Journal of the Franklin Institute (2025), pp. 107594-107594
Closed Access
Yuhang Yang, Shenmin Song
Journal of the Franklin Institute (2025), pp. 107594-107594
Closed Access
Fault detection for multirate systems with sensor saturation subject to stochastic delayed redundant channels
Zhihui Wu, Tiantian Hu, Siteng Ma, et al.
Journal of the Franklin Institute (2025), pp. 107588-107588
Closed Access
Zhihui Wu, Tiantian Hu, Siteng Ma, et al.
Journal of the Franklin Institute (2025), pp. 107588-107588
Closed Access
Data-driven stabilization for linear sampled-data systems with unknown parameters: A pure data analytics perspective
Luyang Yu, Jiang‐Qiao Ding, Ying Cui, et al.
Neurocomputing (2025) Vol. 634, pp. 129798-129798
Closed Access
Luyang Yu, Jiang‐Qiao Ding, Ying Cui, et al.
Neurocomputing (2025) Vol. 634, pp. 129798-129798
Closed Access
Probability-guaranteed set-membership filtering for nonlinear 2-D systems with measurement outliers under the adaptive event-triggered mechanism
Hui Yu, Dongjie Peng, Wei Yang, et al.
ISA Transactions (2025)
Closed Access
Hui Yu, Dongjie Peng, Wei Yang, et al.
ISA Transactions (2025)
Closed Access
Robust tube-based model predictive tracking control of autonomous vehicles considering lateral and longitudinal coupling
Changzhu Zhang, Shengsi Ding, Yiqun Liu, et al.
International Journal of Systems Science (2025), pp. 1-21
Closed Access
Changzhu Zhang, Shengsi Ding, Yiqun Liu, et al.
International Journal of Systems Science (2025), pp. 1-21
Closed Access
Event-triggered prescribed time adaptive fuzzy output-feedback control for nonlinear systems subject to bounded disturbances via command filtering
Qingkun Yu, Xiqin He, Li‐Bing Wu, et al.
International Journal of Systems Science (2024) Vol. 55, Iss. 7, pp. 1465-1479
Closed Access | Times Cited: 2
Qingkun Yu, Xiqin He, Li‐Bing Wu, et al.
International Journal of Systems Science (2024) Vol. 55, Iss. 7, pp. 1465-1479
Closed Access | Times Cited: 2
Optimal sequential fusion estimation for sampled‐data systems with random delays and multiplicative noise
Wei Wang, Chunyan Han, Lifeng Ma, et al.
International Journal of Robust and Nonlinear Control (2024) Vol. 34, Iss. 11, pp. 7007-7028
Closed Access | Times Cited: 2
Wei Wang, Chunyan Han, Lifeng Ma, et al.
International Journal of Robust and Nonlinear Control (2024) Vol. 34, Iss. 11, pp. 7007-7028
Closed Access | Times Cited: 2
Modelling and optimization of trajectory deviation for compound directional drilling in coal mines
Wangnian Li, Xiao Yang, Chengda Lu, et al.
Neurocomputing (2024), pp. 129029-129029
Closed Access | Times Cited: 2
Wangnian Li, Xiao Yang, Chengda Lu, et al.
Neurocomputing (2024), pp. 129029-129029
Closed Access | Times Cited: 2
A variance-constrained method to encoding–decoding H ∞ state estimation for memristive neural networks with energy harvesting sensor
Yan Gao, Jun Hu, Kun Chi, et al.
Neurocomputing (2024) Vol. 579, pp. 127448-127448
Closed Access | Times Cited: 1
Yan Gao, Jun Hu, Kun Chi, et al.
Neurocomputing (2024) Vol. 579, pp. 127448-127448
Closed Access | Times Cited: 1
Event-Triggered confidentiality fusion estimation against eavesdroppers in cyber-physical systems
Daxing Xu, Zhiqiang Chen, Hailun Wang
EURASIP Journal on Advances in Signal Processing (2024) Vol. 2024, Iss. 1
Open Access | Times Cited: 1
Daxing Xu, Zhiqiang Chen, Hailun Wang
EURASIP Journal on Advances in Signal Processing (2024) Vol. 2024, Iss. 1
Open Access | Times Cited: 1
Consensus Optimal Filter for Linear Systems Over Amplify-and-Forward Relay Networks: Handling Delayed and Degraded Channels
Xiaohan Liu, Chunyan Han, Wei Wang
IEEE Transactions on Network Science and Engineering (2024) Vol. 11, Iss. 5, pp. 4076-4092
Closed Access | Times Cited: 1
Xiaohan Liu, Chunyan Han, Wei Wang
IEEE Transactions on Network Science and Engineering (2024) Vol. 11, Iss. 5, pp. 4076-4092
Closed Access | Times Cited: 1
Dynamics analysis of a new fractional-order SVEIR-KS model for computer virus propagation: Stability and Hopf bifurcation
Linji Yang, Qiankun Song, Yurong Liu
Neurocomputing (2024), pp. 128075-128075
Closed Access | Times Cited: 1
Linji Yang, Qiankun Song, Yurong Liu
Neurocomputing (2024), pp. 128075-128075
Closed Access | Times Cited: 1
Security control for cyber–physical systems under aperiodic denial-of-service attacks: A memory-event-triggered active approach
Min Zhao, Wenzhi Qin, Jing Yang, et al.
Neurocomputing (2024) Vol. 600, pp. 128159-128159
Closed Access | Times Cited: 1
Min Zhao, Wenzhi Qin, Jing Yang, et al.
Neurocomputing (2024) Vol. 600, pp. 128159-128159
Closed Access | Times Cited: 1
Fixed time cluster consensus for nonlinear multiagent systems by double dynamic event-triggered mechanisms
Wu Wenyu, Huaicheng Yan, Yuan Wang, et al.
International Journal of Systems Science (2024) Vol. 55, Iss. 16, pp. 3322-3336
Closed Access | Times Cited: 1
Wu Wenyu, Huaicheng Yan, Yuan Wang, et al.
International Journal of Systems Science (2024) Vol. 55, Iss. 16, pp. 3322-3336
Closed Access | Times Cited: 1
A novel local feature fusion architecture for wind turbine pitch fault diagnosis with redundant feature screening
Chuanbo Wen, Xianbin Wu, Zidong Wang, et al.
Complex & Intelligent Systems (2024) Vol. 10, Iss. 6, pp. 8109-8125
Open Access | Times Cited: 1
Chuanbo Wen, Xianbin Wu, Zidong Wang, et al.
Complex & Intelligent Systems (2024) Vol. 10, Iss. 6, pp. 8109-8125
Open Access | Times Cited: 1
Fusion estimation for state-saturated multi-rate systems with integral measurement and sensor resolution
Long Xu, Changcheng Shi, Hui Yu, et al.
Journal of the Franklin Institute (2024), pp. 107281-107281
Closed Access | Times Cited: 1
Long Xu, Changcheng Shi, Hui Yu, et al.
Journal of the Franklin Institute (2024), pp. 107281-107281
Closed Access | Times Cited: 1
Bipartite containment tracking for nonlinear MASs under FDI attack based on model-free adaptive iterative learning control
Xinning He, Zhongsheng Hou
Neurocomputing (2024), pp. 128783-128783
Closed Access | Times Cited: 1
Xinning He, Zhongsheng Hou
Neurocomputing (2024), pp. 128783-128783
Closed Access | Times Cited: 1
Synchronization for neural networks over event-triggered multi-channel: Relay channels under cyber-attacks
Yumei Zhou, Xiantao Luo, Zi‐Jing Xiao, et al.
Neurocomputing (2024) Vol. 583, pp. 127503-127503
Closed Access
Yumei Zhou, Xiantao Luo, Zi‐Jing Xiao, et al.
Neurocomputing (2024) Vol. 583, pp. 127503-127503
Closed Access
Probability-guaranteed distributed set-membership filtering over sensor networks: A stochastic communication protocol case
Hui Yu, Dongjie Peng, Cai Chen, et al.
Systems & Control Letters (2024) Vol. 188, pp. 105800-105800
Closed Access
Hui Yu, Dongjie Peng, Cai Chen, et al.
Systems & Control Letters (2024) Vol. 188, pp. 105800-105800
Closed Access