OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Optimal Stealthy Linear-Attack Schedules on Remote State Estimation
Junhui Zhang, Jitao Sun
IEEE Transactions on Signal Processing (2021) Vol. 69, pp. 2807-2817
Closed Access | Times Cited: 16

Showing 16 citing articles:

Optimal strictly stealthy attacks in cyber-physical systems with multiple channels under the energy constraint
Sheng‐Sheng Dong, Yigang Li, Liwei An
International Journal of Systems Science (2023) Vol. 54, Iss. 13, pp. 2608-2625
Closed Access | Times Cited: 11

Fast Attack Detection for Cyber–Physical Systems Using Dynamic Data Encryption
Tongxiang Li, Bo Chen, Shichao Liu, et al.
IEEE Transactions on Cybernetics (2023) Vol. 54, Iss. 5, pp. 3251-3264
Closed Access | Times Cited: 10

Optimal encryption strategy for cyber-physical systems against stealthy attacks with energy constraints: A Stackelberg game approach
Xuan Liu, Guang‐Hong Yang
Information Sciences (2022) Vol. 610, pp. 674-693
Closed Access | Times Cited: 12

Optimal Stealthy Attacks With Energy Constraint Against Remote State Estimation
Xuan Liu, Guang‐Hong Yang
IEEE Transactions on Cybernetics (2023) Vol. 54, Iss. 6, pp. 3577-3587
Closed Access | Times Cited: 7

Radix-Partition-Based Over-the-Air Aggregation and Low-Complexity State Estimation for IoT Systems Over Wireless Fading Channels
Minjie Tang, Songfu Cai, Vincent K. N. Lau
IEEE Transactions on Signal Processing (2022) Vol. 70, pp. 1464-1477
Closed Access | Times Cited: 9

A Novel Collusion Combination Cyberattack Strategy Against Integrated Energy System
Yunning Zhang, X. L. Tu, Wenlong Fu, et al.
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 11, pp. 12669-12683
Closed Access | Times Cited: 1

Intelligent Edge Sensing and Control Co-Design for Industrial Cyber-Physical System
Zhiduo Ji, Cailian Chen, Shanying Zhu, et al.
IEEE Transactions on Signal and Information Processing over Networks (2023) Vol. 9, pp. 175-189
Closed Access | Times Cited: 4

Optimal Innovation-Based Stealthy Attacks in Networked LQG Systems With Attack Cost
Kaijing Jin, Dan Ye
IEEE Transactions on Cybernetics (2022) Vol. 54, Iss. 2, pp. 787-796
Closed Access | Times Cited: 5

A Resilient Distributed Kalman Filtering Under Bidirectional Stealthy Attack
Wenjie Ding, Wen Yang, Chao Yang, et al.
IEEE Signal Processing Letters (2024) Vol. 31, pp. 356-360
Closed Access

Optimal Stealthy Attack With Side Information Under the Energy Constraint on Remote State Estimation
Sheng‐Sheng Dong, Yi-Gang Li, Li Chen, et al.
International Journal of Control Automation and Systems (2024) Vol. 22, Iss. 9, pp. 2723-2733
Closed Access

DeeBBAA: A Benchmark Deep Black-Box Adversarial Attack Against Cyber–Physical Power Systems
Arnab Bhattacharjee, Guangdong Bai, Wayes Tushar, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 24, pp. 40670-40688
Open Access

Optimal stealthy deception attack strategy under energy constraints
Xin Chen, Lianghong Peng, Y. G. Yi, et al.
Communications in Nonlinear Science and Numerical Simulation (2024), pp. 108423-108423
Closed Access

Information-based stealthy attacks against distributed state estimation over sensor networks
Yichao Wang, Kaijing Jin, Dan Ye
Neurocomputing (2024) Vol. 618, pp. 129087-129087
Closed Access

Optimal deception attacks under energy harvesting constraints for cyber–physical systems
Xuan Liu, Guang‐Hong Yang, Georgi M. Dimirovski, et al.
Neurocomputing (2024), pp. 128652-128652
Closed Access

Optimal Hybrid Attacks Scheduling on Remote State Estimation with Energy Constraint
Shilin Xu, Ying Wan, Guohua Liu, et al.
Lecture notes in electrical engineering (2022), pp. 802-812
Closed Access | Times Cited: 1

2021 Index IEEE Transactions on Signal Processing Vol. 69

IEEE Transactions on Signal Processing (2021) Vol. 69, pp. 6570-6638
Open Access

Page 1

Scroll to top