
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Localizing False Data Injection Attacks in Smart Grid: A Spectrum-Based Neural Network Approach
Sha Peng, Zhenyong Zhang, Ruilong Deng, et al.
IEEE Transactions on Smart Grid (2023) Vol. 14, Iss. 6, pp. 4827-4838
Closed Access | Times Cited: 17
Sha Peng, Zhenyong Zhang, Ruilong Deng, et al.
IEEE Transactions on Smart Grid (2023) Vol. 14, Iss. 6, pp. 4827-4838
Closed Access | Times Cited: 17
Showing 17 citing articles:
Enhancing Cyber-Resiliency of DER-Based Smart Grid: A Survey
Mengxiang Liu, Fei Teng, Zhenyong Zhang, et al.
IEEE Transactions on Smart Grid (2024) Vol. 15, Iss. 5, pp. 4998-5030
Closed Access | Times Cited: 26
Mengxiang Liu, Fei Teng, Zhenyong Zhang, et al.
IEEE Transactions on Smart Grid (2024) Vol. 15, Iss. 5, pp. 4998-5030
Closed Access | Times Cited: 26
A survey on detection and localisation of false data injection attacks in smart grids
Muhammad Irfan, Alireza Sadighian, Adeen Tanveer, et al.
IET Cyber-Physical Systems Theory & Applications (2024)
Open Access | Times Cited: 7
Muhammad Irfan, Alireza Sadighian, Adeen Tanveer, et al.
IET Cyber-Physical Systems Theory & Applications (2024)
Open Access | Times Cited: 7
Enhancing cybersecurity via attribute reduction with deep learning model for false data injection attack recognition
Faheed A. F. Alrslani, Manal Abdullah Alohali, Mohammed Aljebreen, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Faheed A. F. Alrslani, Manal Abdullah Alohali, Mohammed Aljebreen, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Dual-hybrid intrusion detection system to detect False Data Injection in smart grids
Saad Hammood Mohammed, Mandeep Singh, Abdulmajeed Al-Jumaily, et al.
PLoS ONE (2025) Vol. 20, Iss. 1, pp. e0316536-e0316536
Open Access
Saad Hammood Mohammed, Mandeep Singh, Abdulmajeed Al-Jumaily, et al.
PLoS ONE (2025) Vol. 20, Iss. 1, pp. e0316536-e0316536
Open Access
Detecting Attacks and Estimating States of Power Grids from Partial Observations with Machine Learning
Zheng-Meng Zhai, Mohammadamin Moradi, Ying–Cheng Lai
PRX Energy (2025) Vol. 4, Iss. 1
Open Access
Zheng-Meng Zhai, Mohammadamin Moradi, Ying–Cheng Lai
PRX Energy (2025) Vol. 4, Iss. 1
Open Access
Artificial intelligence-based power market price prediction in smart renewable energy systems: Combining prophet and transformer models
Cheng Huang, Tianhui Zhao, Di Huang, et al.
Heliyon (2024) Vol. 10, Iss. 20, pp. e38227-e38227
Open Access | Times Cited: 1
Cheng Huang, Tianhui Zhao, Di Huang, et al.
Heliyon (2024) Vol. 10, Iss. 20, pp. e38227-e38227
Open Access | Times Cited: 1
Security Defense of Large-Scale Networks Under False Data Injection Attacks: An Attack Detection Scheduling Approach
Yuhan Suo, Senchun Chai, Runqi Chai, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 19, pp. 1908-1921
Open Access | Times Cited: 2
Yuhan Suo, Senchun Chai, Runqi Chai, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 19, pp. 1908-1921
Open Access | Times Cited: 2
Smart grid power load type forecasting: research on optimization methods of deep learning models
Huadong Sun, Yonghao Ren, Shanshan Wang, et al.
Frontiers in Energy Research (2023) Vol. 11
Open Access | Times Cited: 2
Huadong Sun, Yonghao Ren, Shanshan Wang, et al.
Frontiers in Energy Research (2023) Vol. 11
Open Access | Times Cited: 2
A Transformer and Cnn-Based Hybrid Model for Localization Detection of False Data Injection Attacks in Smart Grids
Huan Pan, Hang Yang, chunning na, et al.
(2024)
Closed Access
Huan Pan, Hang Yang, chunning na, et al.
(2024)
Closed Access
A Privacy-Preserving Matching Service Scheme for Power Data Trading
Zewei Liu, Chunqiang Hu, Conghao Ruan, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 19, pp. 32296-32309
Closed Access
Zewei Liu, Chunqiang Hu, Conghao Ruan, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 19, pp. 32296-32309
Closed Access
Detection of Faults and Attacks in Power Monitoring System via Semi-Supervised Learning with Pseudo Label Refinery
Wei Chen, Wei Zhang, Yuanzhi Li, et al.
2022 34th Chinese Control and Decision Conference (CCDC) (2024), pp. 5669-5673
Closed Access
Wei Chen, Wei Zhang, Yuanzhi Li, et al.
2022 34th Chinese Control and Decision Conference (CCDC) (2024), pp. 5669-5673
Closed Access
Localization of False Data Injection Attacks in Smart Grids With Renewable Energy Integration via Spatiotemporal Network
Yu Yang, Chensheng Liu, Luolin Xiong, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 23, pp. 37571-37581
Closed Access
Yu Yang, Chensheng Liu, Luolin Xiong, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 23, pp. 37571-37581
Closed Access
CDQKL: Consensus-Based Distributed Quantum Kernel Learning
Wenxuan Ma, Mengxiang Liu, Ruilong Deng
(2024), pp. 33-40
Closed Access
Wenxuan Ma, Mengxiang Liu, Ruilong Deng
(2024), pp. 33-40
Closed Access
Energy-efficient data routing using neuro-fuzzy based data routing mechanism for IoT-enabled WSNs
P. Sakthi Shunmuga Sundaram, T. Deepa
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access
P. Sakthi Shunmuga Sundaram, T. Deepa
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access
Privacy-preserving incentive mechanism for integrated demand response: A homomorphic encryption-based approach
Wen-Ting Lin, Guo Chen, Jueyou Li, et al.
International Journal of Electrical Power & Energy Systems (2024) Vol. 164, pp. 110407-110407
Closed Access
Wen-Ting Lin, Guo Chen, Jueyou Li, et al.
International Journal of Electrical Power & Energy Systems (2024) Vol. 164, pp. 110407-110407
Closed Access
Ultra-short-term Forecast of Wind Speed in Qingdao Port Based on Spatiotemporal Large Graph Network Model
Meijin Yang, Fan Yang, Shan Jiang, et al.
(2023) Vol. 32, pp. 717-726
Closed Access
Meijin Yang, Fan Yang, Shan Jiang, et al.
(2023) Vol. 32, pp. 717-726
Closed Access
Security Defense of Large Scale Networks Under False Data Injection Attacks: An Attack Detection Scheduling Approach
Yuhan Suo, Senchun Chai, Runqi Chai, et al.
arXiv (Cornell University) (2022)
Open Access
Yuhan Suo, Senchun Chai, Runqi Chai, et al.
arXiv (Cornell University) (2022)
Open Access