OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Adversarial Attack Mitigation Strategy for Machine Learning-Based Network Attack Detection Model in Power System
Rong Huang, Yuancheng Li
IEEE Transactions on Smart Grid (2022) Vol. 14, Iss. 3, pp. 2367-2376
Closed Access | Times Cited: 38

Showing 1-25 of 38 citing articles:

Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems
Mayra Macas, Chunming Wu, Walter Fuertes
Expert Systems with Applications (2023) Vol. 238, pp. 122223-122223
Closed Access | Times Cited: 41

Cyber-physical systems security: A systematic review
Houda Harkat, Luís M. Camarinha-Matos, João Goês, et al.
Computers & Industrial Engineering (2024) Vol. 188, pp. 109891-109891
Closed Access | Times Cited: 18

State‐of‐the‐art of cybersecurity in the power system: Simulation, detection, mitigation, and research gaps
Milad Beikbabaei, Ali Mehrizi‐Sani, Chen‐Ching Liu
IET Generation Transmission & Distribution (2025) Vol. 19, Iss. 1
Open Access

DMAPDQV: Design of an effective Pre-emption Model to Detect & Mitigate Adversarial Attacks using Deep Dyna Q with VARMAx
Chetan Patil, Mohd Zuber
International Research Journal of Multidisciplinary Technovation (2025), pp. 60-73
Open Access

Robustness in deep learning models for medical diagnostics: security and adversarial challenges towards robust AI applications
Haseeb Javed, Shaker El-Sappagh, Tamer Abuhmed
Artificial Intelligence Review (2024) Vol. 58, Iss. 1
Open Access | Times Cited: 4

Environmental Impact Assessment and Mitigation Strategies for WPCCN: Fostering Sustainable Development Through Technological and Policy Interventions
Lina Yuan, Huajun Chen, Jing Gong, et al.
International Journal of Distributed Sensor Networks (2025) Vol. 2025, Iss. 1
Open Access

Evasion Attack and Defense on Machine Learning Models in Cyber-Physical Systems: A Survey
Shunyao Wang, Ryan K. L. Ko, Guangdong Bai, et al.
IEEE Communications Surveys & Tutorials (2023) Vol. 26, Iss. 2, pp. 930-966
Open Access | Times Cited: 10

Adversarial Machine Learning for Detecting Advanced Threats Inspired by StuxNet in Critical Infrastructure Networks
Hafiz Bilal Ahmad, Haichang Gao, Naila Latif, et al.
(2024), pp. 01-07
Closed Access | Times Cited: 2

S3: Sneaky Spectral Strike Trojan Attacks on Deep Learning-based Time Series Smart Grid Models
Sultan Uddin Khan, Mohammed Mynuddin, Mahmoud Nabil
(2024)
Open Access | Times Cited: 1

Distributed Optimal Power Control Scheme for Structural Loads Minimization in Wind Farms via a Consensus Approach
Guan Bai, Sheng Huang, Yaojing Feng, et al.
IEEE Transactions on Sustainable Energy (2024) Vol. 15, Iss. 4, pp. 2143-2154
Closed Access | Times Cited: 1

Security Control of Cyber–Physical Systems under Cyber Attacks: A Survey
Wei Xing, Jun Shen
Sensors (2024) Vol. 24, Iss. 12, pp. 3815-3815
Open Access | Times Cited: 1

Enhancing Security in HIL-based Augmented Industrial Control Systems: Insights from Dataset Analysis and Model Development
Atul Kumar, Ishu Sharma, Nitin Thapliyal, et al.
(2024), pp. 1-5
Closed Access | Times Cited: 1

Critical-Metrics-Based Attack Strategy and Resilient H State Estimator Design for Multi-Area Power Systems
Guowei Liu, Engang Tian, Xiangpeng Xie
IEEE Transactions on Smart Grid (2024) Vol. 16, Iss. 2, pp. 1619-1628
Closed Access | Times Cited: 1

AdaptEdge: Targeted Universal Adversarial Attacks on Time Series Data in Smart Grids
Sultan Uddin Khan, Mohammed Mynuddin, Mahmoud Nabil
(2023)
Open Access | Times Cited: 3

Deep Reinforcement Learning-Driven Mitigation of Adverse Effects of Cyber-Attacks on Electric Vehicle Charging Station
Manoj Basnet, Mohd. Hasan Ali
Energies (2023) Vol. 16, Iss. 21, pp. 7296-7296
Open Access | Times Cited: 3

A Hybrid Monotonic Neural Network Approach for Multi-Area Power System Load Frequency Control Against FGSM Attack
Xinghua Liu, Qianmeng Jiao, Siwei Qiao, et al.
IEEE Transactions on Circuits & Systems II Express Briefs (2024) Vol. 71, Iss. 8, pp. 3780-3784
Closed Access

AdaptEdge: Targeted Universal Adversarial Attacks on Time Series Data in Smart Grids
Sultan Uddin Khan, Mohammed Mynuddin, Mahmoud Nabil
IEEE Transactions on Smart Grid (2024) Vol. 15, Iss. 5, pp. 5072-5086
Open Access

Research on Attack Path Discovery of Power Information Network Based on Bayesian Inference
Yuan Li, Haixia Liu, Fei Yao, et al.
Applied Mathematics and Nonlinear Sciences (2024) Vol. 9, Iss. 1
Open Access

A Review and Analysis of Attack and Countermeasure Approaches for Enhancing Smart Grid Cybersecurity
Amir Meydani, Hossein Shahinzadeh, Ali Ramezani, et al.
(2024), pp. 1-19
Closed Access

MPC-Based Droop Control Scheme for Fatigue Load Suppression in Wind Farms Based on Asynchronous Distributed Manner
Guan Bai, Sheng Huang, Yaojing Feng, et al.
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 10, pp. 12305-12316
Closed Access

Attacking Learning-based Models in Smart Grids: Current Challenges and New Frontiers
G. A. Sánchez, Ghada Elbez, Veit Hagenmeyer
(2024), pp. 589-595
Closed Access

Causal Effects of Adversarial Attacks on AI Models in 6G Consumer Electronics
Da Guo, Z.B. Feng, Zhen Zhang, et al.
IEEE Transactions on Consumer Electronics (2024) Vol. 70, Iss. 3, pp. 5804-5813
Closed Access

Real-time Threat Monitoring: Utilizing IoT Data for Intrusion Detection in Smart Environments
Atul Kumar, Kalpna Guleria, Rahul Chauhan, et al.
(2024) Vol. 2009, pp. 1566-1570
Closed Access

Optimized memory augmented graph neural network-based DoS attacks detection in wireless sensor network
A. Pushpalatha, Sunkari Pradeep, Matta Venkata Pullarao, et al.
Network Computation in Neural Systems (2024), pp. 1-27
Closed Access

Event‐Based Formation Control for Multi‐UAV Systems Under DoS and Deception Attacks
Kunpeng Pan, Feisheng Yang, Yang Lyu, et al.
International Journal of Robust and Nonlinear Control (2024)
Open Access

Page 1 - Next Page

Scroll to top