
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Performance Error Estimation and Elastic Integral Event Triggering Mechanism Design for T–S Fuzzy Networked Control System Under DoS Attacks
Xiao Cai, Kaibo Shi, Kun She, et al.
IEEE Transactions on Fuzzy Systems (2022) Vol. 31, Iss. 4, pp. 1327-1339
Closed Access | Times Cited: 39
Xiao Cai, Kaibo Shi, Kun She, et al.
IEEE Transactions on Fuzzy Systems (2022) Vol. 31, Iss. 4, pp. 1327-1339
Closed Access | Times Cited: 39
Showing 1-25 of 39 citing articles:
Stability Analysis and Security-Based Event-Triggered Mechanism Design for T-S Fuzzy NCS With Traffic Congestion via DoS Attack and Its Application
Kaibo Shi, Xiao Cai, Kun She, et al.
IEEE Transactions on Fuzzy Systems (2023) Vol. 31, Iss. 10, pp. 3639-3651
Closed Access | Times Cited: 26
Kaibo Shi, Xiao Cai, Kun She, et al.
IEEE Transactions on Fuzzy Systems (2023) Vol. 31, Iss. 10, pp. 3639-3651
Closed Access | Times Cited: 26
Fault-Tolerant Stochastic Sampled-Data Fuzzy Control for Nonlinear Delayed Parabolic PDE Systems
Qianqian Li, Zipeng Wang, Tingwen Huang, et al.
IEEE Transactions on Fuzzy Systems (2023) Vol. 31, Iss. 8, pp. 2679-2693
Closed Access | Times Cited: 22
Qianqian Li, Zipeng Wang, Tingwen Huang, et al.
IEEE Transactions on Fuzzy Systems (2023) Vol. 31, Iss. 8, pp. 2679-2693
Closed Access | Times Cited: 22
Global exponential synchronization of switching neural networks with leakage time-varying delays
Shilei Yuan, Yantao Wang, Xian Zhang
Communications in Nonlinear Science and Numerical Simulation (2024) Vol. 133, pp. 107979-107979
Closed Access | Times Cited: 11
Shilei Yuan, Yantao Wang, Xian Zhang
Communications in Nonlinear Science and Numerical Simulation (2024) Vol. 133, pp. 107979-107979
Closed Access | Times Cited: 11
MCAD: A Machine Learning Based Cyberattacks Detector in Software-Defined Networking (SDN) for Healthcare Systems
Laila M. Halman, Mohammed J. F. Alenazi
IEEE Access (2023) Vol. 11, pp. 37052-37067
Open Access | Times Cited: 18
Laila M. Halman, Mohammed J. F. Alenazi
IEEE Access (2023) Vol. 11, pp. 37052-37067
Open Access | Times Cited: 18
Intermittent sampled-data control for exponential synchronization of chaotic delayed neural networks via an interval-dependent functional
Yanyan Ni, Zhen Wang
Expert Systems with Applications (2023) Vol. 223, pp. 119918-119918
Closed Access | Times Cited: 14
Yanyan Ni, Zhen Wang
Expert Systems with Applications (2023) Vol. 223, pp. 119918-119918
Closed Access | Times Cited: 14
Finite-Time Membership Function-Dependent $H_{\infty }$ Control for T–S Fuzzy Systems via a Dynamic Memory Event-Triggered Mechanism
Qinghua Hou, Jiuxiang Dong
IEEE Transactions on Fuzzy Systems (2023) Vol. 31, Iss. 11, pp. 4075-4084
Closed Access | Times Cited: 14
Qinghua Hou, Jiuxiang Dong
IEEE Transactions on Fuzzy Systems (2023) Vol. 31, Iss. 11, pp. 4075-4084
Closed Access | Times Cited: 14
Integral‐based event‐triggered reachable set estimation for networked switched fuzzy systems
Hui Gao, Nana Jin, Kaibo Shi, et al.
Asian Journal of Control (2025)
Closed Access
Hui Gao, Nana Jin, Kaibo Shi, et al.
Asian Journal of Control (2025)
Closed Access
Thinking in Systems, Sifting Through Simulations: A Way Ahead for Cyber Resilience Assessment
Francesco Simone, Antonio Javier Nakhal Akel, Giulio Di Gravio, et al.
IEEE Access (2023) Vol. 11, pp. 11430-11450
Open Access | Times Cited: 9
Francesco Simone, Antonio Javier Nakhal Akel, Giulio Di Gravio, et al.
IEEE Access (2023) Vol. 11, pp. 11430-11450
Open Access | Times Cited: 9
Stability Analysis of Networked Control Systems Under DoS Attacks and Security Controller Design With Mini-Batch Machine Learning Supervision
Xiao Cai, Kaibo Shi, Yanbin Sun, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 19, pp. 3857-3865
Closed Access | Times Cited: 9
Xiao Cai, Kaibo Shi, Yanbin Sun, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 19, pp. 3857-3865
Closed Access | Times Cited: 9
SMC-Based Bounded Consensus Tracking for Multiagent Systems Under Stochastic DoS Attacks With Applications to Multiple DC Motors
Cheng Peng, Shengwang Ye, Ruonan Liu, et al.
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 8, pp. 10074-10083
Closed Access | Times Cited: 3
Cheng Peng, Shengwang Ye, Ruonan Liu, et al.
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 8, pp. 10074-10083
Closed Access | Times Cited: 3
Cyber Forensic Investigation Infrastructure of Pakistan: An Analysis of the Cyber Threat Landscape and Readiness
Ehtisham Ul Haque, Waseem Abbasi, M. Sathishkumar, et al.
IEEE Access (2023) Vol. 11, pp. 40049-40063
Open Access | Times Cited: 7
Ehtisham Ul Haque, Waseem Abbasi, M. Sathishkumar, et al.
IEEE Access (2023) Vol. 11, pp. 40049-40063
Open Access | Times Cited: 7
Performance Analysis and Design of Intelligent Optimising Integral-Based Event-Trigger Control for Autonomous Ground Vehicles Under DoS Attacks
Xiao Cai, Kaibo Shi, Yanbin Sun, et al.
IEEE Transactions on Intelligent Vehicles (2023) Vol. 9, Iss. 1, pp. 2149-2159
Closed Access | Times Cited: 7
Xiao Cai, Kaibo Shi, Yanbin Sun, et al.
IEEE Transactions on Intelligent Vehicles (2023) Vol. 9, Iss. 1, pp. 2149-2159
Closed Access | Times Cited: 7
Global exponential stability of quaternion bidirectional associative memory neural networks with multiple delays
Zhiwei Zhang, Xue Liang, Jinbao Lan, et al.
Mathematical Methods in the Applied Sciences (2024) Vol. 47, Iss. 9, pp. 7165-7181
Closed Access | Times Cited: 2
Zhiwei Zhang, Xue Liang, Jinbao Lan, et al.
Mathematical Methods in the Applied Sciences (2024) Vol. 47, Iss. 9, pp. 7165-7181
Closed Access | Times Cited: 2
Parallel event-triggered dynamic output feedback control for nonlinear networked systems with randomly occurring multiple communication delays
Jinyuan Zhang, Yuechao Ma
ISA Transactions (2024) Vol. 151, pp. 1-11
Closed Access | Times Cited: 2
Jinyuan Zhang, Yuechao Ma
ISA Transactions (2024) Vol. 151, pp. 1-11
Closed Access | Times Cited: 2
Sampled-data-based dynamic event-triggered asynchronous control of continuous-time positive Markov jump systems
Kai Yin, Dedong Yang
Chaos Solitons & Fractals (2023) Vol. 169, pp. 113254-113254
Closed Access | Times Cited: 6
Kai Yin, Dedong Yang
Chaos Solitons & Fractals (2023) Vol. 169, pp. 113254-113254
Closed Access | Times Cited: 6
Mixed-Delay-Dependent Augmented Functional for Synchronization of Uncertain Neutral-Type Neural Networks with Sampled-Data Control
Shuoting Wang, Kaibo Shi
Mathematics (2023) Vol. 11, Iss. 4, pp. 872-872
Open Access | Times Cited: 5
Shuoting Wang, Kaibo Shi
Mathematics (2023) Vol. 11, Iss. 4, pp. 872-872
Open Access | Times Cited: 5
Cyberattack Graph Modeling for Visual Analytics
Matej Rabzelj, Ciril Bohak, Leon Štefanić Južnič, et al.
IEEE Access (2023) Vol. 11, pp. 86910-86944
Open Access | Times Cited: 5
Matej Rabzelj, Ciril Bohak, Leon Štefanić Južnič, et al.
IEEE Access (2023) Vol. 11, pp. 86910-86944
Open Access | Times Cited: 5
An Explainable Intelligent Framework for Anomaly Mitigation in Cyber-Physical Inverter-Based Systems
Asad Ali Khan, Omar Ali Beg, Yufang Jin, et al.
IEEE Access (2023) Vol. 11, pp. 65382-65394
Open Access | Times Cited: 4
Asad Ali Khan, Omar Ali Beg, Yufang Jin, et al.
IEEE Access (2023) Vol. 11, pp. 65382-65394
Open Access | Times Cited: 4
Secure defense control for memristive recurrent neural networks under denial-of-service attacks with quantized sampled-data signals
Di Dong, Ruimei Zhang, Yunjia Cheng, et al.
Neural Computing and Applications (2024) Vol. 36, Iss. 11, pp. 6147-6163
Closed Access | Times Cited: 1
Di Dong, Ruimei Zhang, Yunjia Cheng, et al.
Neural Computing and Applications (2024) Vol. 36, Iss. 11, pp. 6147-6163
Closed Access | Times Cited: 1
Pinning synchronization of directed networks with disconnected switching topology via averaging method
Feng Liang, Cheng Hu, Juan Yu, et al.
Nonlinear Analysis Hybrid Systems (2023) Vol. 49, pp. 101369-101369
Closed Access | Times Cited: 4
Feng Liang, Cheng Hu, Juan Yu, et al.
Nonlinear Analysis Hybrid Systems (2023) Vol. 49, pp. 101369-101369
Closed Access | Times Cited: 4
Dual-Channel NCSs Performance Error Estimation Under DoS Attacks and Intelligent Control Supervised by Machine Learning to AGV Application
Xiao Cai, Kaibo Shi, Yanbin Sun, et al.
IEEE Transactions on Transportation Electrification (2023) Vol. 10, Iss. 3, pp. 4882-4893
Closed Access | Times Cited: 4
Xiao Cai, Kaibo Shi, Yanbin Sun, et al.
IEEE Transactions on Transportation Electrification (2023) Vol. 10, Iss. 3, pp. 4882-4893
Closed Access | Times Cited: 4
Finite-time boundedness of networked control systems via hybrid predictive control based on cloud storage method
Tingting Jiang, Yuping Zhang, Ju H. Park, et al.
Information Sciences (2022) Vol. 622, pp. 1092-1108
Closed Access | Times Cited: 6
Tingting Jiang, Yuping Zhang, Ju H. Park, et al.
Information Sciences (2022) Vol. 622, pp. 1092-1108
Closed Access | Times Cited: 6
Toward Effective Evaluation of Cyber Defense: Threat Based Adversary Emulation Approach
Abdul Basit Ajmal, Shawal Khan, Masoom Alam, et al.
IEEE Access (2023) Vol. 11, pp. 70443-70458
Open Access | Times Cited: 3
Abdul Basit Ajmal, Shawal Khan, Masoom Alam, et al.
IEEE Access (2023) Vol. 11, pp. 70443-70458
Open Access | Times Cited: 3
Enhancing Operational Resilience of Critical Infrastructure Processes Through Chaos Engineering
Panagiotis Dedousis, George Stergiopoulos, George Arampatzis, et al.
IEEE Access (2023) Vol. 11, pp. 106172-106189
Open Access | Times Cited: 3
Panagiotis Dedousis, George Stergiopoulos, George Arampatzis, et al.
IEEE Access (2023) Vol. 11, pp. 106172-106189
Open Access | Times Cited: 3
Secure Aperiodic Sampling Control for Micro-Grids Under Abnormal Deception Cyber Attacks
Xiao Cai, Kaibo Shi, Kun She, et al.
IEEE Transactions on Circuits and Systems I Regular Papers (2022) Vol. 70, Iss. 3, pp. 1392-1402
Closed Access | Times Cited: 4
Xiao Cai, Kaibo Shi, Kun She, et al.
IEEE Transactions on Circuits and Systems I Regular Papers (2022) Vol. 70, Iss. 3, pp. 1392-1402
Closed Access | Times Cited: 4