
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Vulnerability of Machine Learning Approaches Applied in IoT-Based Smart Grid: A Review
Zhenyong Zhang, Mengxiang Liu, Mingyang Sun, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 11, pp. 18951-18975
Open Access | Times Cited: 16
Zhenyong Zhang, Mengxiang Liu, Mingyang Sun, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 11, pp. 18951-18975
Open Access | Times Cited: 16
Showing 16 citing articles:
Enhancing Cyber-Resiliency of DER-Based Smart Grid: A Survey
Mengxiang Liu, Fei Teng, Zhenyong Zhang, et al.
IEEE Transactions on Smart Grid (2024) Vol. 15, Iss. 5, pp. 4998-5030
Closed Access | Times Cited: 27
Mengxiang Liu, Fei Teng, Zhenyong Zhang, et al.
IEEE Transactions on Smart Grid (2024) Vol. 15, Iss. 5, pp. 4998-5030
Closed Access | Times Cited: 27
Cybersecurity in microgrids: A review on advanced techniques and practical implementation of resilient energy systems
Ijaz Ahmed, Ali M. El‐Rifaie, F. Akhtar, et al.
Energy Strategy Reviews (2025) Vol. 58, pp. 101654-101654
Open Access
Ijaz Ahmed, Ali M. El‐Rifaie, F. Akhtar, et al.
Energy Strategy Reviews (2025) Vol. 58, pp. 101654-101654
Open Access
Exploring the emerging role of large language models in smart grid cybersecurity: a survey of attacks, detection mechanisms, and mitigation strategies
Nourhan M. Ibrahim, Rasha Kashef
Frontiers in Energy Research (2025) Vol. 13
Open Access
Nourhan M. Ibrahim, Rasha Kashef
Frontiers in Energy Research (2025) Vol. 13
Open Access
CASI: Context-aware Automatic Semantic Inference by fusing video and network traffic information in industrial control systems
Zheqiu Hetu, Zhenyong Zhang, Mufeng Wang, et al.
Information Fusion (2025), pp. 103174-103174
Closed Access
Zheqiu Hetu, Zhenyong Zhang, Mufeng Wang, et al.
Information Fusion (2025), pp. 103174-103174
Closed Access
Enhancing grid resilience and cybersecurity considering visible light communication in electric vehicle charging units powered by green hydrogen
Gökay Bayrak, Manjulika Das
International Journal of Hydrogen Energy (2025)
Closed Access
Gökay Bayrak, Manjulika Das
International Journal of Hydrogen Energy (2025)
Closed Access
Improve the Physics-Constrained Robustness for Tree Ensemble-Based Applications in Power Systems
Zhenyong Zhang, Zhibo Yang, Xiaohan Huang
Elsevier eBooks (2025)
Closed Access
Zhenyong Zhang, Zhibo Yang, Xiaohan Huang
Elsevier eBooks (2025)
Closed Access
CyberDualNER: A Dual-Stage Approach for Few-Shot Named Entity Recognition in Cybersecurity
Conghui Zheng, Cheng Lu, Changqing Li, et al.
Electronics (2025) Vol. 14, Iss. 9, pp. 1791-1791
Open Access
Conghui Zheng, Cheng Lu, Changqing Li, et al.
Electronics (2025) Vol. 14, Iss. 9, pp. 1791-1791
Open Access
Mutual Knowledge Distillation Based Federated Learning for Short-term Forecasting in Electric IoT Systems
Cheng Tong, Linghua Zhang, Yin Ding, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 19, pp. 31190-31205
Closed Access | Times Cited: 3
Cheng Tong, Linghua Zhang, Yin Ding, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 19, pp. 31190-31205
Closed Access | Times Cited: 3
Digital Transformation in Energy Sector: Cybersecurity Challenges and Implications
Saqib Saeed, Hina Gull, Muneera Mohammad Aldossary, et al.
Information (2024) Vol. 15, Iss. 12, pp. 764-764
Open Access | Times Cited: 2
Saqib Saeed, Hina Gull, Muneera Mohammad Aldossary, et al.
Information (2024) Vol. 15, Iss. 12, pp. 764-764
Open Access | Times Cited: 2
Detection-Triggered Recursive Impact Mitigation against Secondary False Data Injection Attacks in Cyber-Physical Microgrids
Mengxiang Liu, Xin Zhang, Rui Zhang, et al.
IEEE Transactions on Smart Grid (2024) Vol. 16, Iss. 2, pp. 1744-1761
Closed Access | Times Cited: 1
Mengxiang Liu, Xin Zhang, Rui Zhang, et al.
IEEE Transactions on Smart Grid (2024) Vol. 16, Iss. 2, pp. 1744-1761
Closed Access | Times Cited: 1
Attacking Learning-based Models in Smart Grids: Current Challenges and New Frontiers
Gustavo Sánchez, Ghada Elbez, Veit Hagenmeyer
(2024), pp. 589-595
Closed Access
Gustavo Sánchez, Ghada Elbez, Veit Hagenmeyer
(2024), pp. 589-595
Closed Access
An Improved YOLOv5s-Based Smoke Detection System for Outdoor Parking Lots
Ruobing Zuo, Xiaohan Huang, Xuguo Jiao, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 80, Iss. 2, pp. 3333-3349
Open Access
Ruobing Zuo, Xiaohan Huang, Xuguo Jiao, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 80, Iss. 2, pp. 3333-3349
Open Access
Physics-Constrained Robustness Enhancement for Tree Ensembles Applied in Smart Grid
Zhibo Yang, Xiaohan Huang, Bingdong Wang, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 80, Iss. 2, pp. 3001-3019
Open Access
Zhibo Yang, Xiaohan Huang, Bingdong Wang, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 80, Iss. 2, pp. 3001-3019
Open Access
Precise Defense Approach Against Small-Scale Backdoor Attacks in Industrial Internet of Things
Ziyong Ran, Yu Yao, Wenxuan Li, et al.
IEEE Internet of Things Journal (2024) Vol. 12, Iss. 5, pp. 5742-5754
Closed Access
Ziyong Ran, Yu Yao, Wenxuan Li, et al.
IEEE Internet of Things Journal (2024) Vol. 12, Iss. 5, pp. 5742-5754
Closed Access
Application Analysis and Prospect of GPT-enabled Digital Transformation of Power Systems
Lu Gan, Peng Wang, Di Zhang, et al.
(2024), pp. 1-6
Closed Access
Lu Gan, Peng Wang, Di Zhang, et al.
(2024), pp. 1-6
Closed Access
GOOSE Secure: A Comprehensive Dataset for In-Depth Analysis of GOOSE Spoofing Attacks in Digital Substations
Óscar Andrés Tobar Rosero, Omar Roa, Germán Carvajal, et al.
Energies (2024) Vol. 17, Iss. 23, pp. 6098-6098
Open Access
Óscar Andrés Tobar Rosero, Omar Roa, Germán Carvajal, et al.
Energies (2024) Vol. 17, Iss. 23, pp. 6098-6098
Open Access
A Secure Data Sharing Model Utilizing Attribute-Based Signcryption in Blockchain Technology
Chaoyue Song, Lifeng Chen, Xuguang Wu, et al.
Sensors (2024) Vol. 25, Iss. 1, pp. 160-160
Open Access
Chaoyue Song, Lifeng Chen, Xuguang Wu, et al.
Sensors (2024) Vol. 25, Iss. 1, pp. 160-160
Open Access