{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T07:50:34Z","timestamp":1765871434590,"version":"3.48.0"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T00:00:00Z","timestamp":1761004800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T00:00:00Z","timestamp":1761004800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100004826","name":"Natural Science Foundation of Beijing Municipality","doi-asserted-by":"publisher","award":["No. Z220004"],"award-info":[{"award-number":["No. Z220004"]}],"id":[{"id":"10.13039\/501100004826","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010031","name":"Postdoctoral Research Foundation of China","doi-asserted-by":"publisher","award":["2025M773062"],"award-info":[{"award-number":["2025M773062"]}],"id":[{"id":"10.13039\/501100010031","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["CCF Trans. HPC"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s42514-025-00241-2","type":"journal-article","created":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T04:37:22Z","timestamp":1761021442000},"page":"523-536","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Defeating decoys: deletion-robust submodular optimization for UAV swarm target assignment problem"],"prefix":"10.1007","volume":"7","author":[{"given":"Jiaming","family":"Hu","sequence":"first","affiliation":[]},{"given":"Chuangbo","family":"Hao","sequence":"additional","affiliation":[]},{"given":"Mengzhen","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yuhao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Maowen","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Dachuan","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,21]]},"reference":[{"key":"241_CR1","doi-asserted-by":"crossref","unstructured":"Badanidiyuru, A., Vondr\u00e1k, J.: Fast algorithms for maximizing submodular functions. In: Proceedings of SODA, pp. 1497-1514, (2014)","DOI":"10.1137\/1.9781611973402.110"},{"key":"241_CR2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3395358","author":"P Cao","year":"2024","unstructured":"Cao, P., Lei, L., Cai, S., Shen, G., Liu, X., Wang, X., Zhang, L., Zhou, L., Guizani, M.: Computational intelligence algorithms for UAV swarm networking and collaboration: a comprehensive survey and future directions. IEEE Commun. Surv. Tutor. (2024). https:\/\/doi.org\/10.1109\/COMST.2024.3395358","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"241_CR3","doi-asserted-by":"crossref","unstructured":"Cohen-Addad, V., Saulpic, D., Schwiegelshohn, C.: A new coreset framework for clustering. In: Proceedings of STOC, pp. 169-182, (2021)","DOI":"10.1145\/3406325.3451022"},{"key":"241_CR4","unstructured":"D\u00fctting, P., Fusco, F., Lattanzi, S., Norouzi-Fard, A,. Zadimoghaddam, M.: Deletion robust submodular maximization over matroids. In: Proceedings of ICML, pp. 5671-5693, (2022)"},{"key":"241_CR5","doi-asserted-by":"crossref","unstructured":"Gupta, A., Roth, A., Schoenebeck, G., Talwar, K.: Constrained non-monotone submodular maximization: Offline and secretary algorithms. In: Proceedings of WINE, pp. 246-257, (2010)","DOI":"10.1007\/978-3-642-17572-5_20"},{"key":"241_CR6","doi-asserted-by":"crossref","unstructured":"Har-Peled, S., Mazumdar, S.: On coresets for $$k$$-means and $$k$$-median clustering. In: Proceedings of STOC, pp. 291-300, (2004)","DOI":"10.1145\/1007352.1007400"},{"issue":"5","key":"241_CR7","doi-asserted-by":"publisher","first-page":"832","DOI":"10.26599\/TST.2021.9010062","volume":"27","author":"P Huang","year":"2022","unstructured":"Huang, P., Guo, L., Zhong, Y.: Efficient algorithms for maximizing group influence in social networks. Tsinghua Sci. Technol. 27(5), 832\u2013842 (2022)","journal-title":"Tsinghua Sci. Technol."},{"key":"241_CR8","doi-asserted-by":"publisher","DOI":"10.1109\/JMASS.2024.3378726","author":"J Jian","year":"2024","unstructured":"Jian, J., Chen, Y., Li, Q., Li, H., Zheng, X., Han, C.: Decision-making method of multi-UAV cooperate air combat under uncertain environment. IEEE J. Miniat. Air Space Syst. (2024). https:\/\/doi.org\/10.1109\/JMASS.2024.3378726","journal-title":"IEEE J. Miniat. Air Space Syst."},{"key":"241_CR9","doi-asserted-by":"publisher","first-page":"1235","DOI":"10.1007\/s11590-019-01430-z","volume":"14","author":"Y Jiang","year":"2020","unstructured":"Jiang, Y., Wang, Y., Xu, D., Yang, R., Zhang, Y.: Streaming algorithm for maximizing a monotone non-submodular function under $$d$$-knapsack constraint. Optim. Lett. 14, 1235\u20131248 (2020)","journal-title":"Optim. Lett."},{"key":"241_CR10","unstructured":"Kazemi, E., Zadimoghaddam, M., Karbasi, A.: Scalable deletion-robust submodular maximization: Data summarization with privacy and fairness constraints. In: Proceedings of ICML, pp. 2544-2553, (2018)"},{"issue":"1","key":"241_CR11","first-page":"9980746","volume":"2024","author":"Y Li","year":"2024","unstructured":"Li, Y., Chen, W., Liu, S., Yang, G., He, F.: Multi-UAV cooperative air combat target assignment method based on VNS-IBPSO in complex dynamic environment. Int. J. Aerosp. Eng. 2024(1), 9980746 (2024)","journal-title":"Int. J. Aerosp. Eng."},{"key":"241_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2024.110227","volume":"249","author":"H Li","year":"2024","unstructured":"Li, H., Zhong, Y., Zhuang, X.: A soft resource optimization method based on autonomous coordination of unmanned swarms system driven by resilience. Reliab. Eng. Syst. Saf. 249, 110227 (2024)","journal-title":"Reliab. Eng. Syst. Saf."},{"issue":"5","key":"241_CR13","doi-asserted-by":"publisher","first-page":"896","DOI":"10.26599\/TST.2022.9010039","volume":"28","author":"Q Liu","year":"2023","unstructured":"Liu, Q., Yu, K., Li, M., Zhou, Y.: $$k$$-Submodular maximization with a knapsack constraint and $$p$$ matroid constraints. Tsinghua Sci. Technol. 28(5), 896\u2013905 (2023)","journal-title":"Tsinghua Sci. Technol."},{"issue":"10","key":"241_CR14","doi-asserted-by":"publisher","first-page":"2400","DOI":"10.1109\/JSAC.2020.3000373","volume":"38","author":"H Lu","year":"2020","unstructured":"Lu, H., Li, M.J., He, T., Wang, S., Narayanan, V., Chan, K.S.: Robust coreset construction for distributed machine learning. IEEE J. Sel. Areas Commun. 38(10), 2400\u20132417 (2020)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"241_CR15","unstructured":"Mirzasoleiman, B., Karbasi, A., Krause, A.: Deletion-robust submodular maximization: Data summarization with \u201cthe right to be forgotten\u201d. In: Proceedings of ICML, pp. 2449-2458, (2017)"},{"key":"241_CR16","doi-asserted-by":"crossref","unstructured":"Mirzasoleiman, B., Badanidiyuru, A., Karbasi, A., Vondr\u00e1k, J., Krause, A.: Lazier than lazy greedy. In: Proceedings of AAAI, pp. 1812-1818, (2015)","DOI":"10.1609\/aaai.v29i1.9486"},{"issue":"1","key":"241_CR17","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/BF01588971","volume":"14","author":"GL Nemhauser","year":"1978","unstructured":"Nemhauser, G.L., Wolsey, L.A., Fisher, M.L.: An analysis of approximations for maximizing submodular set functions-I. Math. Program. 14(1), 265\u2013294 (1978)","journal-title":"Math. Program."},{"key":"241_CR18","volume-title":"Policing terrorism: An executive\u2019s guide","author":"GR Newman","year":"2010","unstructured":"Newman, G.R., Clarke, R.V.G.: Policing terrorism: An executive\u2019s guide. Diane Publishing, Darby (2010)"},{"key":"241_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2023.114293","volume":"984","author":"X Sun","year":"2023","unstructured":"Sun, X., Zhang, J., Zhang, S., Zhang, Z.: Improved deterministic algorithms for non-monotone submodular maximization. Theor. Comput. Sci. 984, 114293 (2023)","journal-title":"Theor. Comput. Sci."},{"issue":"1","key":"241_CR20","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/S0167-6377(03)00062-2","volume":"32","author":"M Sviridenko","year":"2004","unstructured":"Sviridenko, M.: A note on maximizing a submodular set function subject to a knapsack constraint. Oper. Res. Lett. 32(1), 41\u201343 (2004)","journal-title":"Oper. Res. Lett."},{"issue":"5","key":"241_CR21","doi-asserted-by":"publisher","first-page":"888","DOI":"10.26599\/TST.2022.9010031","volume":"28","author":"J Tan","year":"2023","unstructured":"Tan, J., Sun, Y., Xu, Y., Zou, J.: Streaming algorithms for non-submodular maximization on the integer lattice. Tsinghua Sci. Technol. 28(5), 888\u2013895 (2023)","journal-title":"Tsinghua Sci. Technol."},{"key":"241_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ast.2024.109146","volume":"149","author":"G Wang","year":"2024","unstructured":"Wang, G., Wang, F., Wang, J., Li, M., Gai, L., Xu, D.: Collaborative target assignment problem for large-scale UAV swarm based on two-stage greedy auction algorithm. Aerosp. Sci. Technol. 149, 109146 (2024)","journal-title":"Aerosp. Sci. Technol."},{"issue":"4","key":"241_CR23","doi-asserted-by":"publisher","first-page":"4518","DOI":"10.1109\/TAES.2024.3382627","volume":"60","author":"L Wen","year":"2024","unstructured":"Wen, L., Zhen, Z., Tao, C., Ding, J.: Distributed cooperative strategy of UAV swarm without speed measurement under saturation attack mission. IEEE Trans. Aerosp. Electron. Syst. 60(4), 4518\u20134529 (2024)","journal-title":"IEEE Trans. Aerosp. Electron. Syst."},{"issue":"4","key":"241_CR24","doi-asserted-by":"publisher","first-page":"3822","DOI":"10.1109\/TAES.2024.3368996","volume":"60","author":"A Yang","year":"2024","unstructured":"Yang, A., Liang, X., Zhang, J., Hou, Y., Wang, N.: Global optimal consensus for UAV swarms with time-varying objective functions and bounded input constraints. IEEE Trans. Aerosp. Electron. Syst. 60(4), 3822\u20133836 (2024)","journal-title":"IEEE Trans. Aerosp. Electron. Syst."},{"key":"241_CR25","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Chen, J., Chin, F.Y., Han, X., Ting, H.F., Tsin, Y.H.: Improved online algorithms for 1-space bounded 2-dimensional bin packing. In: Proceedings of ISAAC, pp. 242-253, (2010)","DOI":"10.1007\/978-3-642-17514-5_21"},{"issue":"6","key":"241_CR26","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1016\/j.cja.2023.12.027","volume":"37","author":"Z Zhang","year":"2024","unstructured":"Zhang, Z., Jiang, J., Xu, H., Zhang, W.A.: Distributed dynamic task allocation for unmanned aerial vehicle swarm systems: a networked evolutionary game-theoretic approach. Chinese J. Aeronaut. 37(6), 182\u2013204 (2024)","journal-title":"Chinese J. Aeronaut."},{"key":"241_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2023.109904","volume":"244","author":"C Zhang","year":"2024","unstructured":"Zhang, C., Liu, T., Bai, G., Tao, J., Zhu, W.: A dynamic resilience evaluation method for cross-domain swarms in confrontation. Reliab. Eng. Syst. Saf. 244, 109904 (2024)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"241_CR28","doi-asserted-by":"crossref","unstructured":"Zhang, G., Tatti, N., Gionis, A.: Coresets remembered and items forgotten: submodular maximization with deletions. In: Proceedings of ICDM, pp. 676-685, (2022)","DOI":"10.1109\/ICDM54844.2022.00078"}],"container-title":["CCF Transactions on High Performance Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42514-025-00241-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42514-025-00241-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42514-025-00241-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T07:47:18Z","timestamp":1765871238000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42514-025-00241-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,21]]},"references-count":28,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["241"],"URL":"https:\/\/doi.org\/10.1007\/s42514-025-00241-2","relation":{},"ISSN":["2524-4922","2524-4930"],"issn-type":[{"type":"print","value":"2524-4922"},{"type":"electronic","value":"2524-4930"}],"subject":[],"published":{"date-parts":[[2025,10,21]]},"assertion":[{"value":"30 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The third, fifth and sixth authors are supported by Beijing Natural Science Foundation Project (No. Z220004). The first author is supported by the China Postdoctoral Science Foundation (Certificate Number: 2025M773062). The authors confirm that these interests do not alter their adherence to journal policies.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}