
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Adversarial Attacks and Defense for CNN Based Power Quality Recognition in Smart Grid
Jiwei Tian, Buhong Wang, Jing Li, et al.
IEEE Transactions on Network Science and Engineering (2021) Vol. 9, Iss. 2, pp. 807-819
Closed Access | Times Cited: 46
Jiwei Tian, Buhong Wang, Jing Li, et al.
IEEE Transactions on Network Science and Engineering (2021) Vol. 9, Iss. 2, pp. 807-819
Closed Access | Times Cited: 46
Showing 1-25 of 46 citing articles:
Analysis of Cyber Security Attacks and Its Solutions for the Smart grid Using Machine Learning and Blockchain Methods
Tehseen Mazhar, Hafiz Muhammad Irfan, Sunawar Khan, et al.
Future Internet (2023) Vol. 15, Iss. 2, pp. 83-83
Open Access | Times Cited: 82
Tehseen Mazhar, Hafiz Muhammad Irfan, Sunawar Khan, et al.
Future Internet (2023) Vol. 15, Iss. 2, pp. 83-83
Open Access | Times Cited: 82
Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems
Mayra Macas, Chunming Wu, Walter Fuertes
Expert Systems with Applications (2023) Vol. 238, pp. 122223-122223
Closed Access | Times Cited: 41
Mayra Macas, Chunming Wu, Walter Fuertes
Expert Systems with Applications (2023) Vol. 238, pp. 122223-122223
Closed Access | Times Cited: 41
LESSON: Multi-Label Adversarial False Data Injection Attack for Deep Learning Locational Detection
Jiwei Tian, Chao Shen, Buhong Wang, et al.
IEEE Transactions on Dependable and Secure Computing (2024) Vol. 21, Iss. 5, pp. 4418-4432
Open Access | Times Cited: 31
Jiwei Tian, Chao Shen, Buhong Wang, et al.
IEEE Transactions on Dependable and Secure Computing (2024) Vol. 21, Iss. 5, pp. 4418-4432
Open Access | Times Cited: 31
Deep learning for power quality
Roger Alves de Oliveira, Math Bollen
Electric Power Systems Research (2022) Vol. 214, pp. 108887-108887
Open Access | Times Cited: 64
Roger Alves de Oliveira, Math Bollen
Electric Power Systems Research (2022) Vol. 214, pp. 108887-108887
Open Access | Times Cited: 64
Adversarial Attack Mitigation Strategy for Machine Learning-Based Network Attack Detection Model in Power System
Rong Huang, Yuancheng Li
IEEE Transactions on Smart Grid (2022) Vol. 14, Iss. 3, pp. 2367-2376
Closed Access | Times Cited: 38
Rong Huang, Yuancheng Li
IEEE Transactions on Smart Grid (2022) Vol. 14, Iss. 3, pp. 2367-2376
Closed Access | Times Cited: 38
Vulnerability of Machine Learning Approaches Applied in IoT-Based Smart Grid: A Review
Zhenyong Zhang, Mengxiang Liu, Mingyang Sun, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 11, pp. 18951-18975
Open Access | Times Cited: 12
Zhenyong Zhang, Mengxiang Liu, Mingyang Sun, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 11, pp. 18951-18975
Open Access | Times Cited: 12
Securing the grid: A comprehensive analysis of cybersecurity challenges in PMU-based cyber-physical power networks
Bilkisu Jimada-Ojuolape, Jiashen Teh, Ching‐Ming Lai
Electric Power Systems Research (2024) Vol. 233, pp. 110509-110509
Closed Access | Times Cited: 8
Bilkisu Jimada-Ojuolape, Jiashen Teh, Ching‐Ming Lai
Electric Power Systems Research (2024) Vol. 233, pp. 110509-110509
Closed Access | Times Cited: 8
Exploring Targeted and Stealthy False Data Injection Attacks via Adversarial Machine Learning
Jiwei Tian, Buhong Wang, Jing Li, et al.
IEEE Internet of Things Journal (2022) Vol. 9, Iss. 15, pp. 14116-14125
Closed Access | Times Cited: 32
Jiwei Tian, Buhong Wang, Jing Li, et al.
IEEE Internet of Things Journal (2022) Vol. 9, Iss. 15, pp. 14116-14125
Closed Access | Times Cited: 32
Overview of Smart Cyber‐Physical Power Systems: Fundamentals, Challenges, and Solutions
Ali Parizad, Hamid Reza Baghaee, Saifur Rahman
(2025), pp. 1-69
Closed Access
Ali Parizad, Hamid Reza Baghaee, Saifur Rahman
(2025), pp. 1-69
Closed Access
An attack-resistant and stable deep learning approach for voltage-reactive power support in grids with inverter-based resources
Joshua Olowolaju, Hanif Livani
e-Prime - Advances in Electrical Engineering Electronics and Energy (2025), pp. 100940-100940
Open Access
Joshua Olowolaju, Hanif Livani
e-Prime - Advances in Electrical Engineering Electronics and Energy (2025), pp. 100940-100940
Open Access
Datadriven false data injection attacks against cyber-physical power systems
Jiwei Tian, Buhong Wang, Jing Li, et al.
Computers & Security (2022) Vol. 121, pp. 102836-102836
Closed Access | Times Cited: 17
Jiwei Tian, Buhong Wang, Jing Li, et al.
Computers & Security (2022) Vol. 121, pp. 102836-102836
Closed Access | Times Cited: 17
A Comparative Analysis of Deep Learning Models for Power Quality Disturbance Classification
Sultan Uddin Khan, Mohammed Mynuddin, Dewan Mohammed Abdul Ahad, et al.
2022 IEEE World AI IoT Congress (AIIoT) (2023), pp. 0317-0323
Closed Access | Times Cited: 9
Sultan Uddin Khan, Mohammed Mynuddin, Dewan Mohammed Abdul Ahad, et al.
2022 IEEE World AI IoT Congress (AIIoT) (2023), pp. 0317-0323
Closed Access | Times Cited: 9
Adversarial attack and training for deep neural network based power quality disturbance classification
Liangheng Zhang, Congmei Jiang, Zhaosen Chai, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 127, pp. 107245-107245
Closed Access | Times Cited: 9
Liangheng Zhang, Congmei Jiang, Zhaosen Chai, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 127, pp. 107245-107245
Closed Access | Times Cited: 9
Deep Learning Based Power Quality Disturbance Recognition using Residual Network in Smart Grid
Sultan Uddin Khan, Mohammed Mynuddin, Mohammad Anwarul Islam, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 8
Sultan Uddin Khan, Mohammed Mynuddin, Mohammad Anwarul Islam, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 8
Countering Evasion Attacks for Smart Grid Reinforcement Learning-Based Detectors
Ahmed T. El-Toukhy, Mohamed Mahmoud, Atef H. Bondok, et al.
IEEE Access (2023) Vol. 11, pp. 97373-97390
Open Access | Times Cited: 7
Ahmed T. El-Toukhy, Mohamed Mahmoud, Atef H. Bondok, et al.
IEEE Access (2023) Vol. 11, pp. 97373-97390
Open Access | Times Cited: 7
Power Network Smart Meter Data Driven Cross-Task Transfer Learning for Resident Characteristics Estimation
Hai‐Tao Zhang, Zhiyue Wang, Xingjian Liu, et al.
IEEE Journal of Emerging and Selected Topics in Industrial Electronics (2024) Vol. 5, Iss. 2, pp. 652-661
Closed Access | Times Cited: 2
Hai‐Tao Zhang, Zhiyue Wang, Xingjian Liu, et al.
IEEE Journal of Emerging and Selected Topics in Industrial Electronics (2024) Vol. 5, Iss. 2, pp. 652-661
Closed Access | Times Cited: 2
ATTACKS AND DEFENSE METHODS IN MACHINE LEARNING SYSTEMS: ANALYSIS OF MODERN RESEARCH
Igor Kotenko, Igor Saenko, Oleg Lauta, et al.
Voprosy kiberbezopasnosti (2024), Iss. 1 (59)
Open Access | Times Cited: 2
Igor Kotenko, Igor Saenko, Oleg Lauta, et al.
Voprosy kiberbezopasnosti (2024), Iss. 1 (59)
Open Access | Times Cited: 2
S3: Sneaky Spectral Strike Trojan Attacks on Deep Learning-based Time Series Smart Grid Models
Sultan Uddin Khan, Mohammed Mynuddin, Mahmoud Nabil
(2024)
Open Access | Times Cited: 1
Sultan Uddin Khan, Mohammed Mynuddin, Mahmoud Nabil
(2024)
Open Access | Times Cited: 1
ATTACKS AND DEFENSE METHODS IN MACHINE LEARNING SYSTEMS: ANALYSIS OF MODERN RESEARCH
Igor Kotenko, Igor Saenko, Oleg Lauta, et al.
Voprosy kiberbezopasnosti (2024), Iss. 1 (59)
Open Access | Times Cited: 1
Igor Kotenko, Igor Saenko, Oleg Lauta, et al.
Voprosy kiberbezopasnosti (2024), Iss. 1 (59)
Open Access | Times Cited: 1
Super-efficient detector and defense method for adversarial attacks in power quality classification
Liangheng Zhang, Congmei Jiang, Aiping Pang, et al.
Applied Energy (2024) Vol. 361, pp. 122872-122872
Closed Access | Times Cited: 1
Liangheng Zhang, Congmei Jiang, Aiping Pang, et al.
Applied Energy (2024) Vol. 361, pp. 122872-122872
Closed Access | Times Cited: 1
Data-driven Technology Applications in Planning, Demand-side Management, and Cybersecurity for Smart Household Community
Dipanshu Naware, Arghya Mitra
IEEE Transactions on Artificial Intelligence (2024) Vol. 5, Iss. 10, pp. 4868-4883
Closed Access | Times Cited: 1
Dipanshu Naware, Arghya Mitra
IEEE Transactions on Artificial Intelligence (2024) Vol. 5, Iss. 10, pp. 4868-4883
Closed Access | Times Cited: 1
Attack-resilient framework for wind power forecasting against civil and adversarial attacks
Khadija Akter, M. A. Rahman, Md. Rashidul Islam, et al.
Electric Power Systems Research (2024) Vol. 238, pp. 111065-111065
Closed Access | Times Cited: 1
Khadija Akter, M. A. Rahman, Md. Rashidul Islam, et al.
Electric Power Systems Research (2024) Vol. 238, pp. 111065-111065
Closed Access | Times Cited: 1
AdaptEdge: Targeted Universal Adversarial Attacks on Time Series Data in Smart Grids
Sultan Uddin Khan, Mohammed Mynuddin, Mahmoud Nabil
(2023)
Open Access | Times Cited: 3
Sultan Uddin Khan, Mohammed Mynuddin, Mahmoud Nabil
(2023)
Open Access | Times Cited: 3
Black-box attacks and defense for DNN-based power quality classification in smart grid
Liangheng Zhang, Congmei Jiang, Aiping Pang
Energy Reports (2022) Vol. 8, pp. 12203-12214
Open Access | Times Cited: 5
Liangheng Zhang, Congmei Jiang, Aiping Pang
Energy Reports (2022) Vol. 8, pp. 12203-12214
Open Access | Times Cited: 5
A Comprehensive Investigation into the Application of Convolutional Neural Networks (ConvNet/CNN) in Smart Grids
Rituraj Rituraj, Diana Ecker
(2022), pp. 000359-000368
Open Access | Times Cited: 3
Rituraj Rituraj, Diana Ecker
(2022), pp. 000359-000368
Open Access | Times Cited: 3