OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Fast Attack Detection for Cyber–Physical Systems Using Dynamic Data Encryption
Tongxiang Li, Bo Chen, Shichao Liu, et al.
IEEE Transactions on Cybernetics (2023) Vol. 54, Iss. 5, pp. 3251-3264
Closed Access | Times Cited: 10

Showing 10 citing articles:

Deep reinforcement learning-based memetic algorithm for energy-aware flexible job shop scheduling with multi-AGV
Fayong Zhang, Rui Li, Wenyin Gong
Computers & Industrial Engineering (2024) Vol. 189, pp. 109917-109917
Closed Access | Times Cited: 21

A Q-learning memetic algorithm for energy-efficient heterogeneous distributed assembly permutation flowshop scheduling considering priorities
Cong Luo, Wenyin Gong, Fei Ming, et al.
Swarm and Evolutionary Computation (2024) Vol. 85, pp. 101497-101497
Closed Access | Times Cited: 19

An enhanced memetic algorithm with hierarchical heuristic neighborhood search for type-2 green fuzzy flexible job shop scheduling
Kanglin Huang, Wenyin Gong, Chao Lu
Engineering Applications of Artificial Intelligence (2023) Vol. 130, pp. 107762-107762
Closed Access | Times Cited: 13

Day-ahead multi-modal demand side management in microgrid via two-stage improved ring-topology particle swarm optimization
Sicheng Hou, Goytom Gebreyesus, Shigeru Fujimura
Expert Systems with Applications (2023) Vol. 238, pp. 122135-122135
Closed Access | Times Cited: 9

Encryption-Based Attack Detection Scheme for Multi-Sensor Secure Fusion Estimation
Tongxiang Li, Pindi Weng, Bo Chen, et al.
IEEE Transactions on Aerospace and Electronic Systems (2024) Vol. 60, Iss. 5, pp. 7548-7554
Closed Access | Times Cited: 2

Data-Driven Event-Triggered Sliding Mode Secure Control for Autonomous Vehicles Under Actuator Attacks
Hongtao Sun, Xinran Chen, Zhengqiang Zhang, et al.
IEEE Transactions on Cybernetics (2024) Vol. 55, Iss. 1, pp. 436-446
Closed Access | Times Cited: 1

Stabilisation in an infinite time horizon by homomorphically encrypted first-order controllers with regular Pisot poles
Mohammad Saleh Tavazoei
International Journal of Systems Science (2024), pp. 1-10
Closed Access

Distributed fusion filtering for multi-rate nonlinear systems with binary measurements under encryption and decryption scheme
Jun Hu, Shuting Fan, R. Caballero‐Águila, et al.
Information Fusion (2024), pp. 102900-102900
Closed Access

Learning-based two-phase cooperative optimizer for distributed machine scheduling with heterogeneous factories and order priorities
Tianyong Wu, Cong Luo, Youkou Dong
Egyptian Informatics Journal (2023) Vol. 25, pp. 100424-100424
Open Access | Times Cited: 1

Investigation of tidal turbine array performance using computational fluid dynamics in the presence of waves
M. Atif, Hamid Qureshi, Sami Ullah Khan, et al.
Modern Physics Letters B (2023) Vol. 38, Iss. 16
Open Access

Page 1

Scroll to top