
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Attack Detection Based on Encoding–Decoding Approach for Cyber–Physical Systems
Gaofeng Ren, Hao Liu, Ye-Wei Zhang, et al.
IEEE Transactions on Systems Man and Cybernetics Systems (2023) Vol. 53, Iss. 10, pp. 6293-6302
Closed Access | Times Cited: 7
Gaofeng Ren, Hao Liu, Ye-Wei Zhang, et al.
IEEE Transactions on Systems Man and Cybernetics Systems (2023) Vol. 53, Iss. 10, pp. 6293-6302
Closed Access | Times Cited: 7
Showing 7 citing articles:
Generative AI Empowering Parallel Manufacturing: Building a “6S” Collaborative Production Ecology for Manufacturing 5.0
Jing Yang, Yutong Wang, Xingxia Wang, et al.
IEEE Transactions on Systems Man and Cybernetics Systems (2024) Vol. 54, Iss. 11, pp. 6522-6536
Closed Access | Times Cited: 13
Jing Yang, Yutong Wang, Xingxia Wang, et al.
IEEE Transactions on Systems Man and Cybernetics Systems (2024) Vol. 54, Iss. 11, pp. 6522-6536
Closed Access | Times Cited: 13
Detection and analysis of cybersecurity challenges for processing systems
Luyang Liu, Zaman Sajid, Costas Kravaris, et al.
Process Safety and Environmental Protection (2024) Vol. 185, pp. 1061-1071
Closed Access | Times Cited: 7
Luyang Liu, Zaman Sajid, Costas Kravaris, et al.
Process Safety and Environmental Protection (2024) Vol. 185, pp. 1061-1071
Closed Access | Times Cited: 7
An adaptive predefined time sliding mode control for uncertain nonlinear cyber-physical servo system under cyber attacks
Saleem Riaz, Bingqiang Li, Rong Qi, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 5
Saleem Riaz, Bingqiang Li, Rong Qi, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 5
Data‐Driven Stealthy Attacks Detection in Cyber‐Physical Systems Based on Complex Dynamical Networks Encoding Strategy
Jun‐Lan Wang, Xiaojian Li
International Journal of Robust and Nonlinear Control (2025)
Closed Access
Jun‐Lan Wang, Xiaojian Li
International Journal of Robust and Nonlinear Control (2025)
Closed Access
Anti-Watermarking Stealthy Deception Attacks Against Networked Unmanned Surface Vehicles
Xiangyu Kong, Guang‐Hong Yang
IEEE Transactions on Intelligent Transportation Systems (2024) Vol. 25, Iss. 9, pp. 12835-12840
Closed Access | Times Cited: 3
Xiangyu Kong, Guang‐Hong Yang
IEEE Transactions on Intelligent Transportation Systems (2024) Vol. 25, Iss. 9, pp. 12835-12840
Closed Access | Times Cited: 3
A technique to detect and mitigate false data injection attacks in Cyber-Physical Systems
Sushree Padhan, Ashok Kumar Turuk
Computers & Security (2024), pp. 104253-104253
Closed Access
Sushree Padhan, Ashok Kumar Turuk
Computers & Security (2024), pp. 104253-104253
Closed Access
Parallel intelligence in three decades: a historical review and future perspective on ACP and cyber-physical-social systems
Xingxia Wang, H. J. Yang, Yuhang Liu, et al.
Artificial Intelligence Review (2024) Vol. 57, Iss. 9
Open Access
Xingxia Wang, H. J. Yang, Yuhang Liu, et al.
Artificial Intelligence Review (2024) Vol. 57, Iss. 9
Open Access