OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Observer-Based Security Fuzzy Control for Nonlinear Networked Systems Under Weighted Try-Once-Discard Protocol
Jinliang Liu, Enyu Gong, Lijuan Zha, et al.
IEEE Transactions on Fuzzy Systems (2023) Vol. 31, Iss. 11, pp. 3853-3865
Closed Access | Times Cited: 25

Showing 25 citing articles:

Outlier-Resistant Non-Fragile Control of Nonlinear Networked Systems Under DoS Attacks and Multi-Variable Event-Triggered SC Protocol
Jian Liu, Jiachen Ke, Jinliang Liu, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 2609-2622
Closed Access | Times Cited: 10

State Estimation for Delayed Memristive Neural Networks With Multichannel Round-Robin Protocol and Multimodal Injection Attacks
Lijuan Zha, Jinzhao Miao, Jinliang Liu, et al.
IEEE Transactions on Systems Man and Cybernetics Systems (2024) Vol. 54, Iss. 6, pp. 3738-3748
Closed Access | Times Cited: 7

Interval Type-2 Fuzzy-Model-Based Filtering for Nonlinear Systems With Event-Triggering Weighted Try-Once-Discard Protocol and Cyberattacks
Jinliang Liu, Enyu Gong, Lijuan Zha, et al.
IEEE Transactions on Fuzzy Systems (2023) Vol. 32, Iss. 3, pp. 721-732
Closed Access | Times Cited: 20

Resilient Recursive Filter Design for Complex Networks With Event-Triggering Random Access Scheme and Random Coupling Strengths
Lijuan Zha, Jinzhao Miao, Jinliang Liu, et al.
IEEE Systems Journal (2024) Vol. 18, Iss. 1, pp. 725-736
Closed Access | Times Cited: 5

Observer-Based Adaptive Event-Triggered Control for Nonlinear Networked Systems Under Multiple Cyber Attacks
Yu Shan, Xiangpeng Xie, Jiayue Sun, et al.
IEEE Transactions on Fuzzy Systems (2024) Vol. 32, Iss. 9, pp. 5272-5284
Closed Access | Times Cited: 5

Cooperative Control of Air–Ground Swarms Under DoS Attacks via Cloud–Fog Computing
Jiacheng Li, Dengxiu Yu, Wenhui Ma, et al.
IEEE Transactions on Network Science and Engineering (2024) Vol. 11, Iss. 5, pp. 4278-4292
Closed Access | Times Cited: 4

Observer-based improved event-triggered interval type-2 fuzzy networked control systems subject to deception attacks in dual communication channels
Q. Li, Xiao‐Heng Chang
Communications in Nonlinear Science and Numerical Simulation (2025) Vol. 142, pp. 108579-108579
Closed Access

Robust Fault Detection for Fuzzy‐Model‐Based Networked Control Systems Under Denial‐of‐Service Attacks and Sensor Faults Within a Stochastic Communication Protocol
Tongtong Ding, Cheng Tan, Ziran Chen, et al.
International Journal of Robust and Nonlinear Control (2025)
Closed Access

An Encoding-Based Privacy-Preserving Security Control Strategy Under Stealthy Attacks
Jian Liu, Shuailong Wang, Lijuan Zha, et al.
IEEE Transactions on Industrial Cyber-Physical Systems (2025) Vol. 3, pp. 208-217
Closed Access

Memory-Based Event-Triggered Control of Markov Jump Systems Under Hybrid Cyber Attacks: A Switching-Like Adaptive Law
Lan Yao, Xia Huang, Zhen Wang, et al.
IEEE Transactions on Automation Science and Engineering (2023) Vol. 21, Iss. 4, pp. 6347-6357
Closed Access | Times Cited: 7

Optimal preview pinning control of Boolean networks
Linye Wu, Jitao Sun
ISA Transactions (2023) Vol. 146, pp. 291-296
Closed Access | Times Cited: 5

Stochastic Communication Protocol-Based Security Control for Discrete-Time Networked Systems Using State Observer
Jian Liu, Jiachen Ke, Jinliang Liu, et al.
IEEE Transactions on Systems Man and Cybernetics Systems (2024) Vol. 54, Iss. 9, pp. 5501-5512
Closed Access | Times Cited: 1

Outlier‐resistant quantized control for T‐S fuzzy systems under multi‐channel‐enabled round‐robin protocol and deception attacks
Lijuan Zha, Tao Huang, Jinliang Liu, et al.
International Journal of Robust and Nonlinear Control (2023) Vol. 33, Iss. 18, pp. 10916-10931
Closed Access | Times Cited: 3

Dissipative Fuzzy Filtering for Nonlinear Networked Systems with Dynamic Quantization and Data Packet Dropouts
Shuxia Jing, Chengming Lu, Zhimin Li
Mathematics (2024) Vol. 12, Iss. 2, pp. 203-203
Open Access

Non‐fragile observer‐based security control for networked systems via event‐triggered WTOD protocol
Jian Liu, Shuailong Wang, Hu Bing, et al.
International Journal of Robust and Nonlinear Control (2024) Vol. 34, Iss. 9, pp. 5852-5872
Closed Access

Event-Triggered Secure Control for Consensus of the Discrete-Time Multiagent System Against Complex Cooperative Attacks
Zunjie Yu, Weihai Zhang
IEEE Transactions on Systems Man and Cybernetics Systems (2024) Vol. 54, Iss. 6, pp. 3834-3842
Closed Access

Secure consensus for multiagent systems with hybrid cyber attacks: A multi-round-robin protocol-based approach
Jinliang Liu, Hao Zheng, Lijuan Zha, et al.
Information Sciences (2024) Vol. 677, pp. 120878-120878
Closed Access

Privacy‐preserving‐based fuzzy filtering for nonlinear networked systems with adaptive‐event‐triggered mechanism and FDI attacks
Jinliang Liu, Jiahui Tang, Lijuan Zha, et al.
International Journal of Robust and Nonlinear Control (2024) Vol. 34, Iss. 14, pp. 9716-9736
Closed Access

Stabilization for 2-D switched T-S fuzzy systems under the state-dependent switching
Xiaozeng Xu, Qunxian Zheng, Yang Li, et al.
Journal of the Franklin Institute (2024) Vol. 361, Iss. 17, pp. 107192-107192
Closed Access

H∞ control for interval type-2 fuzzy singularly perturbed systems with multi-node round-robin protocol and packet dropouts
Hu Yue, Oh‐Min Kwon, Seung-Hoon Lee
Fuzzy Sets and Systems (2024), pp. 109202-109202
Closed Access

DFA-mode-dependent stability of impulsive switched memristive neural networks under channel-covert aperiodic asynchronous attacks
Xinyi Han, Yongbin Yu, Xiangxiang Wang, et al.
Neural Networks (2024) Vol. 183, pp. 106962-106962
Closed Access

Security-Based Asynchronous Event-Triggered $\mathcal{H}_{\infty}$ Control of Markov Jump Systems Under Aperiodic DoS Attacks
Huilan Yang, Xin Wang, Nankun Mu, et al.
IEEE Transactions on Systems Man and Cybernetics Systems (2024) Vol. 55, Iss. 3, pp. 1759-1770
Closed Access

Dynamic memory-event-triggered consensus of uncertain MASs with networked attacks and delays
Qingcao Zhang, Qing An, Housheng Su, et al.
Journal of the Franklin Institute (2023) Vol. 361, Iss. 2, pp. 852-866
Closed Access | Times Cited: 1

2023 Index IEEE Transactions on Fuzzy Systems Vol. 31

IEEE Transactions on Fuzzy Systems (2023) Vol. 31, Iss. 12, pp. 4553-4629
Open Access

Page 1

Scroll to top