OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Resilient Output Control of Multiagent Systems With DoS Attacks and Actuator Faults: Fully Distributed Event-Triggered Approach
Juan Zhang, Dongsheng Yang, Weihua Li, et al.
IEEE Transactions on Cybernetics (2024) Vol. 54, Iss. 12, pp. 7681-7690
Closed Access | Times Cited: 18

Showing 18 citing articles:

Distributed Denial of Services (DDoS) attack detection in SDN using Optimizer-equipped CNN-MLP
Sajid Mehmood, Rashid Amin, Jamal Mustafa, et al.
PLoS ONE (2025) Vol. 20, Iss. 1, pp. e0312425-e0312425
Open Access | Times Cited: 1

Network anomaly detection and security defense technology based on machine learning: A review
Ruixiao Liu, Jing Shi, Xingyu Chen, et al.
Computers & Electrical Engineering (2024) Vol. 119, pp. 109581-109581
Closed Access | Times Cited: 4

Development of a multidimensional centrality metric for ranking nodes in complex networks
Bo Meng, Amin Rezaeipanah
Chaos Solitons & Fractals (2024) Vol. 191, pp. 115843-115843
Closed Access | Times Cited: 4

AI-based approach for detecting FDI attacks in load frequency control for centralized multi-area power systems
Hasnain Ahmad, Muhammad Majid Gulzar, Ghulam Mustafa, et al.
Computers & Electrical Engineering (2025) Vol. 123, pp. 110060-110060
Closed Access

Event-triggered memory sliding mode load frequency control of power system with BESSs against frequency-based deception attacks
Siwei Qiao, Xinghua Liu, Shiping Wen, et al.
Journal of the Franklin Institute (2025), pp. 107644-107644
Closed Access

An efficient detection of Sinkhole attacks using machine learning: Impact on energy and security
Muhammad Zulkifl Hasan, Zurina Mohd Hanapi, Zuriati Ahmad Zukarnain, et al.
PLoS ONE (2025) Vol. 20, Iss. 3, pp. e0309532-e0309532
Open Access

Enhancing Software Fault Prediction Through Feature Selection With Spider Wasp Optimization Algorithm
Himansu Das, Swarnava Das, Mahendra Kumar Gourisaria, et al.
IEEE Access (2024) Vol. 12, pp. 105309-105325
Open Access | Times Cited: 2

Fault Detection and Isolation in Wind Turbines: Type-3 Fuzzy Logic Systems and Adaptive Random Search Learning
Aimei Zhou, Zhiping Zhu, Ebrahim Ghaderpour, et al.
IEEE Access (2024) Vol. 12, pp. 129347-129361
Open Access | Times Cited: 2

Consensus for Heterogeneous Multiagent Systems: Output Rate-Coded Secure Control
Ruihang Ji, Shuzhi Sam Ge
IEEE Transactions on Cybernetics (2024) Vol. 54, Iss. 11, pp. 6719-6730
Closed Access | Times Cited: 1

A hybrid approach for adversarial attack detection based on sentiment analysis model using Machine learning
Rashid Amin, Rahma Gantassi, Naeem Ahmed, et al.
Engineering Science and Technology an International Journal (2024) Vol. 58, pp. 101829-101829
Open Access | Times Cited: 1

DaE2: Unmasking Malicious URLs by Leveraging Diverse and Efficient Ensemble Machine Learning for Online Security
Abiodun Esther Omolara, Moatsum Alawida
Computers & Security (2024), pp. 104170-104170
Closed Access | Times Cited: 1

R-DOCO: Resilient Distributed Online Convex Optimization Against Adversarial Attacks
Zhixiang Kong, Huajian Xu, Chengsheng Pan
Mathematics (2024) Vol. 12, Iss. 21, pp. 3439-3439
Open Access | Times Cited: 1

GRAD-AI: An automated grading tool for code assessment and feedback in programming course
Ishaya Gambo, Faith-Jane Abegunde, Omobola Gambo, et al.
Education and Information Technologies (2024)
Closed Access | Times Cited: 1

Hybrid ELECTRE and bipolar fuzzy PROMOTHEEā€based packet dropping malicious node mitigation technique for improving QoS in WSNs
S. Madhavi, RVS Praveen, S. Jagatheswari, et al.
International Journal of Communication Systems (2024)
Closed Access

Distributed adaptive secure consensus control for multiagent systems under denial-of-service attacks
Binrui Wang, Dan Liu, Kun Zhou, et al.
International Journal of Systems Science (2024) Vol. 56, Iss. 4, pp. 753-766
Closed Access

A Modified Dynamic Event-Triggered Mechanism for Output Consensus of Heterogeneous MASs
Yang Wang, Jiuxiang Dong
IEEE Transactions on Cybernetics (2024) Vol. 55, Iss. 1, pp. 383-394
Closed Access

Machine Learning and Metaheuristic Algorithms for Voice-Based Authentication: A Mobile Banking Case Study
Leili Nosrati, Amir Massoud Bidgoli, Hamid Haj Seyyed Javadi
International Journal of Computational Intelligence Systems (2024) Vol. 17, Iss. 1
Open Access

A Novel Robust-Adaptive Control Methodology for Sign-Consensus of Multi-agent Systems Under Signed Graphs and External Disturbances
Abdul Khaliq, Muhammad Rehan, Ijaz Ahmed, et al.
Arabian Journal for Science and Engineering (2024)
Closed Access

Page 1

Scroll to top