OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A New False Data Injection Attack Detection Model for Cyberattack Resilient Energy Forecasting
Amirhossein Ahmadi, Mojtaba Nabipour, Saman Taheri, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 19, Iss. 1, pp. 371-381
Closed Access | Times Cited: 36

Showing 1-25 of 36 citing articles:

Model predictive control of heating, ventilation, and air conditioning (HVAC) systems: A state-of-the-art review
Saman Taheri, Paniz Hosseini, Ali Razban
Journal of Building Engineering (2022) Vol. 60, pp. 105067-105067
Open Access | Times Cited: 137

Industrial cyber-physical systems protection: A methodological review
Roberto Canonico, Giancarlo Sperlì
Computers & Security (2023) Vol. 135, pp. 103531-103531
Open Access | Times Cited: 23

Resiliency of forecasting methods in different application areas of smart grids: A review and future prospects
M. A. Rahman, Md. Rashidul Islam, Md. Alamgir Hossain, et al.
Engineering Applications of Artificial Intelligence (2024) Vol. 135, pp. 108785-108785
Closed Access | Times Cited: 8

Recent Advances on Capacitive Proximity Sensors: From Design and Materials to Creative Applications
Reza Moheimani, Paniz Hosseini, Saeed Mohammadi, et al.
C – Journal of Carbon Research (2022) Vol. 8, Iss. 2, pp. 26-26
Open Access | Times Cited: 30

A transient simulation for a novel solar-geothermal cogeneration system with a selection of heat transfer fluids using thermodynamics analysis and ANN intelligent (AI) modeling
Ehsanolah Assareh, Siamak Hoseinzadeh, Neha Agarwal, et al.
Applied Thermal Engineering (2023) Vol. 231, pp. 120698-120698
Open Access | Times Cited: 19

Deep Federated Learning-Based Privacy-Preserving Wind Power Forecasting
Amirhossein Ahmadi, Mohammad Talaei, Masod Sadipour, et al.
IEEE Access (2022) Vol. 11, pp. 39521-39530
Open Access | Times Cited: 26

A dagging‐based deep learning framework for transmission line flexibility assessment
Azita Morteza, Masod Sadipour, Reza Saadati Fard, et al.
IET Renewable Power Generation (2022) Vol. 17, Iss. 5, pp. 1092-1105
Open Access | Times Cited: 23

On Vulnerability of Renewable Energy Forecasting: Adversarial Learning Attacks
Jiaqi Ruan, Qihan Wang, Sicheng Chen, et al.
IEEE Transactions on Industrial Informatics (2023) Vol. 20, Iss. 3, pp. 3650-3663
Closed Access | Times Cited: 16

Cybersecurity challenges in IoT-based smart renewable energy
Alexandre Rekeraho, Daniel Tudor Cotfas, Petru Adrian Cotfas, et al.
International Journal of Information Security (2023) Vol. 23, Iss. 1, pp. 101-117
Open Access | Times Cited: 15

Assessment of spatiotemporally coordinated cyberattacks on renewable energy forecasting in smart energy system
Jiaqi Ruan, Chao Yang, Qihan Wang, et al.
Applied Energy (2023) Vol. 347, pp. 121470-121470
Closed Access | Times Cited: 12

Post-occurrence cybersecurity of Power-to-Gas hydrogen-based energy hubs using real-time optimal adaptive feasibility area estimation
Hadi Khani, Hany E. Z. Farag, Ehab F. El‐Saadany
International Journal of Hydrogen Energy (2024) Vol. 72, pp. 297-306
Closed Access | Times Cited: 4

Leveraging Meta‐Learning for Enhanced False Data Injection Detection in Smart Grids: The ONF‐ML Approach
Mohammadreza Pourshirazi, Mohsen Simab, Alireza Mirzaee, et al.
IET Renewable Power Generation (2025) Vol. 19, Iss. 1
Open Access

Adaptive RBF-neural-network resilient control of wind turbines under cyberattack: ensuring prescribed performance
Mohammad Hossein Abbasi, Alireza Yazdizadeh, Ali A. Afzalian
International Journal of Dynamics and Control (2025) Vol. 13, Iss. 4
Closed Access

Cyber Risk Identification and Classification‐Based Load Forecasting Tool for Pandemic Situations
Kuldeep Singh Shivran, Kyle Swire‐Thompson, Neetesh Saxena, et al.
IET Cyber-Physical Systems Theory & Applications (2025) Vol. 10, Iss. 1
Open Access

User Comfort and Energy Consumption Prediction Based on Building Dynamic Temperature Setting
Miao Yu, Anjiang Liu, Youzhuo Zheng, et al.
Lecture notes in electrical engineering (2025), pp. 477-485
Closed Access

A Review of Power System False Data Attack Detection Technology Based on Big Data
Zhengwei Chang, Jie Wu, Huihui Liang, et al.
Information (2024) Vol. 15, Iss. 8, pp. 439-439
Open Access | Times Cited: 3

Data-Driven Automatic Generation Control of Interconnected Power Grids Subject to Deception Attacks
Yasin Asadi, Malihe M. Farsangi, Ali Moradi Amani, et al.
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 9, pp. 7591-7600
Closed Access | Times Cited: 16

Attack-resilient framework for wind power forecasting against civil and adversarial attacks
Khadija Akter, M. A. Rahman, Md. Rashidul Islam, et al.
Electric Power Systems Research (2024) Vol. 238, pp. 111065-111065
Closed Access | Times Cited: 2

Possibilistic–Probabilistic Risk-Based Smart Energy Hub scheduling considering cyber security in advanced metering infrastructures
Banafsheh Alipour, Amir Abdollahi, Masoud Rashidinejad, et al.
Sustainable Energy Grids and Networks (2023) Vol. 36, pp. 101159-101159
Closed Access | Times Cited: 6

The Method for Identifying the Scope of Cyberattack Stages in Relation to Their Impact on Cyber-Sustainability Control over a System
Šarūnas Grigaliūnas, Rasa Brūzgienė, Algimantas Venčkauskas
Electronics (2023) Vol. 12, Iss. 3, pp. 591-591
Open Access | Times Cited: 5

Data-Driven Cyber-Resilient Control of Wide Area Power Systems
Yasin Asadi, Malihe M. Farsangi, Ali Moradi Amani, et al.
Power systems (2023), pp. 161-178
Closed Access | Times Cited: 5

Data-driven Technology Applications in Planning, Demand-side Management, and Cybersecurity for Smart Household Community
Dipanshu Naware, Arghya Mitra
IEEE Transactions on Artificial Intelligence (2024) Vol. 5, Iss. 10, pp. 4868-4883
Closed Access | Times Cited: 1

Defense strategy selection based on incomplete information game for the false data injection attack
Na Yi, Jianjun Xu
International Journal of Systems Science (2024) Vol. 55, Iss. 14, pp. 2897-2913
Closed Access | Times Cited: 1

Page 1 - Next Page

Scroll to top