{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T18:54:17Z","timestamp":1776279257911,"version":"3.50.1"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T00:00:00Z","timestamp":1741824000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T00:00:00Z","timestamp":1741824000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Syst Sci Complex"],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s11424-025-4232-2","type":"journal-article","created":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T09:45:09Z","timestamp":1741859109000},"page":"972-999","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Constraint-Feature-Guided Evolutionary Algorithms for Multi-Objective Multi-Stage Weapon-Target Assignment Problems"],"prefix":"10.1007","volume":"38","author":[{"given":"Danjing","family":"Wang","sequence":"first","affiliation":[]},{"given":"Bin","family":"Xin","sequence":"additional","affiliation":[]},{"given":"Yipeng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jia","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Fang","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Xianpeng","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,13]]},"reference":[{"key":"4232_CR1","doi-asserted-by":"publisher","first-page":"106668","DOI":"10.1016\/j.engappai.2023.106668","volume":"125","author":"E Acar","year":"2023","unstructured":"Acar E, Hatipo\u011flu S, and Y\u0131lmaz \u0130, A quantum algorithm for solving weapon target assignment problem, Engineering Applications of Artificial Intelligence, 2023, 125: 106668.","journal-title":"Engineering Applications of Artificial Intelligence"},{"issue":"1","key":"4232_CR2","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/s11424-018-7437-9","volume":"31","author":"J Zeng","year":"2018","unstructured":"Zeng J, Dou L, and Xin B, Multi-objective cooperative salvo attack against group target, Journal of Systems Science & Complexity, 2018, 31(1): 244\u2013261.","journal-title":"Journal of Systems Science & Complexity"},{"issue":"2","key":"4232_CR3","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/s11424-017-6178-5","volume":"30","author":"G Fan","year":"2017","unstructured":"Fan G and Huang H, Scenario-based stochastic resource allocation with uncertain probability parameters, Journal of Systems Science & Complexity, 2017, 30(2): 357\u2013377.","journal-title":"Journal of Systems Science & Complexity"},{"issue":"2","key":"4232_CR4","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1142\/S2301385023500036","volume":"11","author":"L Liang","year":"2023","unstructured":"Liang L, Wang J, and Deng F, Targets-attackers-defenders game via pairwise outcomes, Unmanned Systems, 2023, 11(2): 133\u2013142.","journal-title":"Unmanned Systems"},{"key":"4232_CR5","first-page":"1054","volume-title":"IEEE Summer Simulation Conference","author":"S P Lloyd","year":"1986","unstructured":"Lloyd S P and Witsenhausen H S, Weapons allocation is NP-complete, IEEE Summer Simulation Conference, 1986, 1054\u20131058."},{"key":"4232_CR6","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.cor.2018.10.015","volume":"105","author":"A Kline","year":"2019","unstructured":"Kline A, Ahner D, and Hill R, The weapon-target assignment problem, Computers & Operations Research, 2019, 105: 226\u2013236.","journal-title":"Computers & Operations Research"},{"issue":"3","key":"4232_CR7","doi-asserted-by":"publisher","first-page":"1347","DOI":"10.1007\/s41870-023-01674-0","volume":"16","author":"H Tunga","year":"2024","unstructured":"Tunga H, Kar S, Giri D, et al., Efficacy analysis of NSGA-II and multi-objective particle swarm optimization (MOPSO) in agent based weapon target assignment (WTA) model, International Journal of Information Technology, 2024, 16(3): 1347\u20131356.","journal-title":"International Journal of Information Technology"},{"key":"4232_CR8","doi-asserted-by":"publisher","first-page":"102138","DOI":"10.1016\/j.omega.2019.102138","volume":"98","author":"Y Lu","year":"2021","unstructured":"Lu Y and Chen D Z, A new exact algorithm for the weapon-target assignment problem, Omega, 2021, 98: 102138.","journal-title":"Omega"},{"key":"4232_CR9","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1007\/s10898-020-00938-4","volume":"78","author":"A G Kline","year":"2020","unstructured":"Kline A G, Ahner D K, and Lunday B J, A heuristic and metaheuristic approach to the static weapon target assignment problem, Journal of Global Optimization, 2020, 78: 791\u2013812.","journal-title":"Journal of Global Optimization"},{"issue":"3","key":"4232_CR10","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1016\/S1004-4132(06)60097-2","volume":"17","author":"H Cai","year":"2006","unstructured":"Cai H, Liu J, Chen Y, et al., Survey of the research on dynamic weapon-target assignment problem, Journal of Systems Engineering and Electronics, 2006, 17(3): 559\u2013565.","journal-title":"Journal of Systems Engineering and Electronics"},{"issue":"6","key":"4232_CR11","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1109\/TSMCC.2010.2049261","volume":"40","author":"B Xin","year":"2010","unstructured":"Xin B, Chen J, Zhang J, et al., Efficient decision makings for dynamic weapon-target assignment by virtual permutation and tabu search heuristics, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 2010, 40(6): 649\u2013662.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews)"},{"key":"4232_CR12","doi-asserted-by":"publisher","first-page":"109303","DOI":"10.1016\/j.cie.2023.109303","volume":"181","author":"X Chang","year":"2023","unstructured":"Chang X, Shi J, Luo Z, et al., Adaptive large neighborhood search algorithm for multi-stage weapon target assignment problem, Computers & Industrial Engineering, 2023, 181: 109303.","journal-title":"Computers & Industrial Engineering"},{"key":"4232_CR13","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1109\/CDC.1990.203589","volume-title":"29th IEEE Conference on Decision and Control","author":"P A Hosein","year":"1990","unstructured":"Hosein P A and Athans M, An asymptotic result for the multi-stage weapon-target allocation problem, 29th IEEE Conference on Decision and Control, 1990, 240\u2013245."},{"key":"4232_CR14","doi-asserted-by":"publisher","first-page":"176339","DOI":"10.1109\/ACCESS.2019.2955482","volume":"7","author":"K Zhang","year":"2019","unstructured":"Zhang K, Zhou D, Yang Z, et al., Constrained multi-objective weapon target assignment for area targets by efficient evolutionary algorithm, IEEE Access, 2019, 7: 176339\u2013176360.","journal-title":"IEEE Access"},{"issue":"12","key":"4232_CR15","doi-asserted-by":"publisher","first-page":"1828","DOI":"10.1631\/FITEE.2200237","volume":"23","author":"K Meng","year":"2022","unstructured":"Meng K, Chen C, and Xin B, MSSSA: A multi-strategy enhanced sparrow search algorithm for global optimization, Frontiers of Information Technology & Electronic Engineering, 2022, 23(12): 1828\u20131847.","journal-title":"Frontiers of Information Technology & Electronic Engineering"},{"issue":"6","key":"4232_CR16","doi-asserted-by":"publisher","first-page":"839","DOI":"10.1631\/FITEE.2300170","volume":"25","author":"Z Duan","year":"2024","unstructured":"Duan Z, Yang S, Shao Q, et al., PEGA: Probabilistic environmental gradient-driven genetic algorithm considering epigenetic traits to balance global and local optimizations, Frontiers of Information Technology & Electronic Engineering, 2024, 25(6): 839\u2013855.","journal-title":"Frontiers of Information Technology & Electronic Engineering"},{"issue":"1","key":"4232_CR17","doi-asserted-by":"publisher","first-page":"82","DOI":"10.23919\/CSMS.2024.0003","volume":"4","author":"F Chen","year":"2024","unstructured":"Chen F, Luo C, Gong W, et al., Two-stage adaptive memetic algorithm with surprisingly popular mechanism for energy-aware distributed hybrid flow shop scheduling problem with sequence-dependent setup time, Complex System Modeling and Simulation, 2024, 4(1): 82\u2013108.","journal-title":"Complex System Modeling and Simulation"},{"issue":"1","key":"4232_CR18","doi-asserted-by":"publisher","first-page":"32","DOI":"10.23919\/CSMS.2022.0025","volume":"3","author":"X Ma","year":"2023","unstructured":"Ma X, Fu Y, Gao K, et al., A multi-objective scheduling and routing problem for home health care services via brain storm optimization, Complex System Modeling and Simulation, 2023, 3(1): 32\u201346.","journal-title":"Complex System Modeling and Simulation"},{"issue":"2","key":"4232_CR19","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/4235.996017","volume":"6","author":"K Deb","year":"2002","unstructured":"Deb K, Pratap A, Agarwal S, et al., A fast and elitist multiobjective genetic algorithm: NSGA-II, IEEE Transactions on Evolutionary Computation, 2002, 6(2): 182\u2013197.","journal-title":"IEEE Transactions on Evolutionary Computation"},{"issue":"4","key":"4232_CR20","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1109\/TEVC.2013.2281535","volume":"18","author":"K Deb","year":"2013","unstructured":"Deb K and Jain H, An evolutionary many-objective optimization algorithm using reference-point-based nondominated sorting approach, part I: Solving problems with box constraints, IEEE Transactions on Evolutionary Computation, 2013, 18(4): 577\u2013601.","journal-title":"IEEE Transactions on Evolutionary Computation"},{"issue":"6","key":"4232_CR21","doi-asserted-by":"publisher","first-page":"712","DOI":"10.1109\/TEVC.2007.892759","volume":"11","author":"Q Zhang","year":"2007","unstructured":"Zhang Q and Li H, MOEA\/D: A multi-objective evolutionary algorithm based on decomposition, IEEE Transactions on Evolutionary Computation, 2007, 11(6): 712\u2013731.","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"4232_CR22","doi-asserted-by":"publisher","first-page":"102562","DOI":"10.1016\/j.omega.2021.102562","volume":"107","author":"M S Hughes","year":"2022","unstructured":"Hughes M S and Lunday B J, The weapon target assignment problem: Rational inference of adversary target utility valuations from observed solutions, Omega, 2022, 107: 102562.","journal-title":"Omega"},{"issue":"2","key":"4232_CR23","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1007\/s11424-023-2406-3","volume":"36","author":"Y Chen","year":"2023","unstructured":"Chen Y, Ye L, and Li R, A multi-period constrained multi-objective evolutionary algorithm with orthogonal learning for solving the complex carbon neutral stock portfolio optimization model, Journal of Systems Science & Complexity, 2023, 36(2): 686\u2013715.","journal-title":"Journal of Systems Science & Complexity"},{"issue":"2","key":"4232_CR24","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1109\/TEVC.2022.3155533","volume":"27","author":"J Liang","year":"2022","unstructured":"Liang J, Ban X, Yu K, et al., A survey on evolutionary constrained multi-objective optimization, IEEE Transactions on Evolutionary Computation, 2022, 27(2): 201\u2013221.","journal-title":"IEEE Transactions on Evolutionary Computation"},{"issue":"8","key":"4232_CR25","doi-asserted-by":"publisher","first-page":"5005","DOI":"10.1109\/TSMC.2019.2943973","volume":"51","author":"Z Ma","year":"2019","unstructured":"Ma Z, Wang Y, and Song W, A new fitness function with two rankings for evolutionary constrained multi-objective optimization, IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2019, 51(8): 5005\u20135016.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Systems"},{"key":"4232_CR26","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1016\/j.asoc.2013.10.008","volume":"14","author":"L Jiao","year":"2014","unstructured":"Jiao L, Luo J, Shang R, et al., A modified objective function method with feasible-guiding strategy to solve constrained multi-objective optimization problems, Applied Soft Computing, 2014, 14: 363\u2013380.","journal-title":"Applied Soft Computing"},{"key":"4232_CR27","doi-asserted-by":"publisher","first-page":"107653","DOI":"10.1016\/j.knosys.2021.107653","volume":"235","author":"K Qiao","year":"2022","unstructured":"Qiao K, Liang J, Yu K, et al., Self-adaptive resources allocation-based differential evolution for constrained evolutionary optimization, Knowledge-Based Systems, 2022, 235: 107653.","journal-title":"Knowledge-Based Systems"},{"key":"4232_CR28","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.asoc.2019.02.041","volume":"80","author":"Y Yang","year":"2019","unstructured":"Yang Y, Liu J, Tan S, et al., A multi-objective differential evolutionary algorithm for constrained multi-objective optimization problems with low feasible ratio, Applied Soft Computing, 2019, 80: 42\u201356.","journal-title":"Applied Soft Computing"},{"issue":"8","key":"4232_CR29","first-page":"3086","volume":"50","author":"Y Zhou","year":"2018","unstructured":"Zhou Y, Zhu M, Wang J, et al., Tri-goal evolution framework for constrained many-objective optimization, IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2018, 50(8): 3086\u20133099.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Systems"},{"key":"4232_CR30","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/j.swevo.2013.12.002","volume":"15","author":"Q Long","year":"2014","unstructured":"Long Q, A constraint handling technique for constrained multi-objective genetic algorithm, Swarm and Evolutionary Computation, 2014, 15: 66\u201379.","journal-title":"Swarm and Evolutionary Computation"},{"issue":"6","key":"4232_CR31","doi-asserted-by":"publisher","first-page":"2060","DOI":"10.1109\/TCYB.2018.2819208","volume":"49","author":"J Wang","year":"2018","unstructured":"Wang J, Liang G, and Zhang J, Cooperative differential evolution framework for constrained multi-objective optimization, IEEE Transactions on Cybernetics, 2018, 49(6): 2060\u20132072.","journal-title":"IEEE Transactions on Cybernetics"},{"key":"4232_CR32","doi-asserted-by":"publisher","first-page":"100940","DOI":"10.1016\/j.swevo.2021.100940","volume":"66","author":"Y Yang","year":"2021","unstructured":"Yang Y, Liu J, and Tan S, A partition-based constrained multi-objective evolutionary algorithm, Swarm and Evolutionary Computation, 2021, 66: 100940.","journal-title":"Swarm and Evolutionary Computation"},{"issue":"1","key":"4232_CR33","doi-asserted-by":"publisher","first-page":"7","DOI":"10.3390\/math8010007","volume":"8","author":"O Cuate","year":"2019","unstructured":"Cuate O, Ponsich A, Uribe L, et al., A new hybrid evolutionary algorithm for the treatment of equality constrained MOPs, Mathematics, 2019, 8(1): 7, DOI: https:\/\/doi.org\/10.3390\/math8010007.","journal-title":"Mathematics"},{"key":"4232_CR34","doi-asserted-by":"publisher","first-page":"100617","DOI":"10.1016\/j.swevo.2019.100617","volume":"52","author":"L Uribe","year":"2020","unstructured":"Uribe L, Lara A, and Schutze O, On the efficient computation and use of multi-objective descent directions within constrained MOEAs, Swarm and Evolutionary Computation, 2020, 52: 100617.","journal-title":"Swarm and Evolutionary Computation"},{"issue":"3","key":"4232_CR35","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1109\/TEVC.2020.3047835","volume":"25","author":"C He","year":"2020","unstructured":"He C, Cheng R, Tian Y, et al., Paired offspring generation for constrained large-scale multi-objective optimization, IEEE Transactions on Evolutionary Computation, 2020, 25(3): 448\u2013462.","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"4232_CR36","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1145\/3319619.3321983","volume-title":"Proceedings of the Genetic and Evolutionary Computation Conference Companion","author":"Y Liu","year":"2019","unstructured":"Liu Y, Li X, and Hao Q, A new constrained multi-objective optimization problems algorithm based on group-sorting, Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2019, 221\u2013222."},{"key":"4232_CR37","doi-asserted-by":"publisher","first-page":"50240","DOI":"10.1109\/ACCESS.2019.2910241","volume":"7","author":"C Gao","year":"2019","unstructured":"Gao C, Kou Y, Li Y, et al., Multi-objective weapon target assignment based on D-NSGA-III-A, IEEE Access, 2019, 7: 50240\u201350254.","journal-title":"IEEE Access"},{"key":"4232_CR38","doi-asserted-by":"publisher","first-page":"105542","DOI":"10.1016\/j.asoc.2019.105542","volume":"82","author":"C M Lai","year":"2019","unstructured":"Lai C M and Wu T H, Simplified swarm optimization with initialization scheme for dynamic weapon-target assignment problem, Applied Soft Computing, 2019, 82: 105542.","journal-title":"Applied Soft Computing"},{"issue":"1","key":"4232_CR39","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1007\/s10479-019-03435-4","volume":"296","author":"J Li","year":"2021","unstructured":"Li J, Xin B, Pardalos P M, et al., Solving bi-objective uncertain stochastic resource allocation problems by the CVAR-based risk measure and decomposition-based multi-objective evolutionary algorithms, Annals of Operations Research, 2021, 296(1): 639\u2013666.","journal-title":"Annals of Operations Research"},{"key":"4232_CR40","doi-asserted-by":"publisher","first-page":"112844","DOI":"10.1016\/j.eswa.2019.112844","volume":"140","author":"W Xu","year":"2020","unstructured":"Xu W, Chen C, Ding S, et al., A bi-objective dynamic collaborative task assignment under uncertainty using modified MOEA\/D with heuristic initialization, Expert Systems with Applications, 2020, 140: 112844.","journal-title":"Expert Systems with Applications"},{"key":"4232_CR41","doi-asserted-by":"publisher","first-page":"71832","DOI":"10.1109\/ACCESS.2021.3079152","volume":"9","author":"X Wu","year":"2021","unstructured":"Wu X, Chen C, and Ding S, A modified MOEA\/D algorithm for solving bi-objective multi-stage weapon-target assignment problem, IEEE Access, 2021, 9: 71832\u201371848.","journal-title":"IEEE Access"},{"issue":"11","key":"4232_CR42","first-page":"2006","volume":"52","author":"J Chen","year":"2009","unstructured":"Chen J, Xin B, Peng Z, et al., Evolutionary decision-makings for the dynamic weapon-target assignment problem, Science in China Series F: Information Sciences, 2009, 52(11): 2006\u20132018.","journal-title":"Science in China Series F: Information Sciences"},{"issue":"1","key":"4232_CR43","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/s11424-007-9005-6","volume":"20","author":"X Zhao","year":"2007","unstructured":"Zhao X and Hao J, Exploration\/exploitation tradeoff with cell-shift and heuristic crossover for evolutionary algorithms, Journal of Systems Science & Complexity, 2007, 20(1): 66\u201374.","journal-title":"Journal of Systems Science & Complexity"},{"key":"4232_CR44","first-page":"181","volume":"1","author":"T Blickle","year":"2000","unstructured":"Blickle T, Tournament selection, Evolutionary Computation, 2000, 1: 181\u2013186.","journal-title":"Evolutionary Computation"},{"issue":"12","key":"4232_CR45","doi-asserted-by":"publisher","first-page":"2536","DOI":"10.1109\/TSMC.2017.2784187","volume":"49","author":"B Xin","year":"2018","unstructured":"Xin B, Wang Y, and Chen J, An efficient marginal-return-based constructive heuristic to solve the sensor-weapon-target assignment problem, IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2018, 49(12): 2536\u20132547.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Systems"},{"key":"4232_CR46","doi-asserted-by":"publisher","first-page":"57757","DOI":"10.1109\/ACCESS.2021.3070634","volume":"9","author":"S Verma","year":"2021","unstructured":"Verma S, Pant M, and Snasel V, A comprehensive review on NSGA-II for multi-objective combinatorial optimization problems, IEEE Access, 2021, 9: 57757\u201357791.","journal-title":"IEEE Access"},{"key":"4232_CR47","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s10710-005-6164-x","volume":"6","author":"C A C Coello","year":"2005","unstructured":"Coello C A C and Cort\u00e9s N C, Solving multiobjective optimization problems using an artificial immune system, Genetic Programming and Evolvable Machines, 2005, 6: 163\u2013190.","journal-title":"Genetic Programming and Evolvable Machines"},{"key":"4232_CR48","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1145\/2739480.2754754","volume-title":"Proceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation","author":"S Zapotecas-Mart\u00ednez","year":"2015","unstructured":"Zapotecas-Mart\u00ednez S, Derbel B, Liefooghe A, et al., Injecting CMA-ES into MOEA\/D, Proceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation, 2015, 783\u2013790."},{"key":"4232_CR49","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.asoc.2016.10.039","volume":"50","author":"M Afzalirad","year":"2017","unstructured":"Afzalirad M and Rezaeian J, A realistic variant of bi-objective unrelated parallel machine scheduling problem: NSGA-II and MOACO approaches, Applied Soft Computing, 2017, 50: 109\u2013123.","journal-title":"Applied Soft Computing"},{"key":"4232_CR50","doi-asserted-by":"publisher","first-page":"3045","DOI":"10.1109\/CEC.2016.7744174","volume-title":"2016 IEEE Congress on Evolutionary Computation (CEC)","author":"H Ishibuchi","year":"2016","unstructured":"Ishibuchi H, Imada R, and Setoguchi Y, Performance comparison of NSGA-II and NSGA-III on various many-objective test problems, 2016 IEEE Congress on Evolutionary Computation (CEC), 2016, 3045\u20133052."}],"container-title":["Journal of Systems Science and Complexity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-025-4232-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11424-025-4232-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-025-4232-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T15:05:29Z","timestamp":1749481529000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11424-025-4232-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,13]]},"references-count":50,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["4232"],"URL":"https:\/\/doi.org\/10.1007\/s11424-025-4232-2","relation":{},"ISSN":["1009-6124","1559-7067"],"issn-type":[{"value":"1009-6124","type":"print"},{"value":"1559-7067","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,13]]},"assertion":[{"value":"30 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 August 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 March 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"XIN Bin is an editorial board member for Journal of Systems Science & Complexity and was not involved in the editorial review or the decision to publish this article. All authors declare that there are no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}