{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T13:35:19Z","timestamp":1762522519119,"version":"3.37.3"},"reference-count":99,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2019YFB1406002"],"award-info":[{"award-number":["2019YFB1406002"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62073202"],"award-info":[{"award-number":["62073202"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Young Experts of Taishan Scholar Project","award":["tsqn201909076"],"award-info":[{"award-number":["tsqn201909076"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3041119","type":"journal-article","created":{"date-parts":[[2020,11,27]],"date-time":"2020-11-27T20:23:51Z","timestamp":1606508631000},"page":"215806-215816","source":"Crossref","is-referenced-by-count":3,"title":["Further Results on Large-Scale Complex Logical Networks"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7861-2005","authenticated-orcid":false,"given":"Yuna","family":"Liu","sequence":"first","affiliation":[{"name":"School of Mathematics and Statistics, Shandong Normal University, Jinan, China"}]},{"given":"Xiangshan","family":"Kong","sequence":"additional","affiliation":[{"name":"School of Mathematics and Statistics, Shandong Normal University, Jinan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3517-2588","authenticated-orcid":false,"given":"Shuling","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Mathematics and Statistics, Shandong Normal University, Jinan, China"}]},{"given":"Xiaojuan","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Education, Shandong Normal University, Jinan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5322-5375","authenticated-orcid":false,"given":"Haitao","family":"Li","sequence":"additional","affiliation":[{"name":"School of Mathematics and Statistics, Shandong Normal University, Jinan, China"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/LCSYS.2019.2928474"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1002\/mma.4685"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/ACCESS.2018.2851391"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1137\/18M1170443"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1049\/iet-cta.2017.0714"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1016\/j.automatica.2015.08.006"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1002\/asjc.2303"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1016\/j.automatica.2018.11.036"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/TAC.2013.2294821"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1016\/j.jfranklin.2018.05.049"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/TAC.2014.2330432"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1049\/iet-cta.2018.5279"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1016\/j.automatica.2016.12.040"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1631\/FITEE.1900397"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1016\/j.automatica.2012.03.022"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1016\/j.automatica.2009.03.006"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1016\/j.amc.2019.03.059"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1016\/j.sysconle.2010.09.002"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1016\/j.sysconle.2015.11.004"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/TNNLS.2020.3025912"},{"doi-asserted-by":"publisher","key":"ref50","DOI":"10.1631\/FITEE.1900411"},{"doi-asserted-by":"publisher","key":"ref51","DOI":"10.1631\/FITEE.1900422"},{"doi-asserted-by":"publisher","key":"ref59","DOI":"10.1109\/TAC.2019.2934532"},{"doi-asserted-by":"publisher","key":"ref58","DOI":"10.1109\/TAC.2020.2985302"},{"key":"ref57","first-page":"736","article-title":"Stability and set stability in distribution of probabilistic Boolean networks","volume":"64","author":"guo","year":"2019","journal-title":"IEEE Trans Autom Control"},{"doi-asserted-by":"publisher","key":"ref56","DOI":"10.1109\/TAC.2015.2476175"},{"doi-asserted-by":"publisher","key":"ref55","DOI":"10.1109\/ACCESS.2018.2885951"},{"doi-asserted-by":"publisher","key":"ref54","DOI":"10.1016\/j.amc.2018.11.018"},{"doi-asserted-by":"publisher","key":"ref53","DOI":"10.1016\/j.jfranklin.2018.09.004"},{"doi-asserted-by":"publisher","key":"ref52","DOI":"10.1137\/18M1169308"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/ACCESS.2019.2934740"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1016\/j.amc.2018.01.036"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1155\/2013\/638496"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.15388\/NA.2018.6.6"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.3934\/mbe.2018069"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1016\/j.cam.2008.05.059"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1016\/j.automatica.2017.06.035"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1016\/0022-5193(69)90015-0"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1093\/imamat\/hxt027"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1109\/TNNLS.2018.2881279"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1186\/s13662-016-0909-0"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1002\/mma.6529"},{"doi-asserted-by":"publisher","key":"ref47","DOI":"10.1016\/j.ins.2019.09.029"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1016\/j.jfranklin.2019.10.005"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1109\/TCYB.2018.2842819"},{"key":"ref44","article-title":"A new approach to pinning control of Boolean networks","author":"zhong","year":"2019","journal-title":"arXiv 1912 01411"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1002\/asjc.2115"},{"doi-asserted-by":"publisher","key":"ref73","DOI":"10.1007\/s11432-013-4796-7"},{"doi-asserted-by":"publisher","key":"ref72","DOI":"10.1631\/FITEE.1900447"},{"doi-asserted-by":"publisher","key":"ref71","DOI":"10.1016\/j.neucom.2020.07.065"},{"doi-asserted-by":"publisher","key":"ref70","DOI":"10.1109\/TCSI.2020.2977417"},{"key":"ref76","first-page":"32","article-title":"Survey on applications of semi-tensor product method in networked evolutionary games","volume":"10","author":"zhao","year":"2020","journal-title":"J Appl Anal Comput"},{"doi-asserted-by":"publisher","key":"ref77","DOI":"10.1049\/iet-cta.2018.5230"},{"doi-asserted-by":"publisher","key":"ref74","DOI":"10.1007\/s13235-017-0228-4"},{"doi-asserted-by":"publisher","key":"ref75","DOI":"10.1016\/j.amc.2017.02.020"},{"doi-asserted-by":"publisher","key":"ref78","DOI":"10.1080\/00207179.2017.1306113"},{"doi-asserted-by":"publisher","key":"ref79","DOI":"10.1080\/00207179.2020.1803411"},{"doi-asserted-by":"publisher","key":"ref60","DOI":"10.1016\/j.matcom.2020.04.008"},{"doi-asserted-by":"publisher","key":"ref62","DOI":"10.1016\/j.jfranklin.2018.12.027"},{"doi-asserted-by":"publisher","key":"ref61","DOI":"10.1109\/TAC.2020.2997282"},{"doi-asserted-by":"publisher","key":"ref63","DOI":"10.1109\/TCYB.2019.2932914"},{"doi-asserted-by":"publisher","key":"ref64","DOI":"10.1155\/2018\/9259348"},{"doi-asserted-by":"publisher","key":"ref65","DOI":"10.1109\/ACCESS.2020.3018456"},{"doi-asserted-by":"publisher","key":"ref66","DOI":"10.1016\/j.automatica.2019.04.028"},{"doi-asserted-by":"publisher","key":"ref67","DOI":"10.1109\/ACCESS.2020.3002533"},{"doi-asserted-by":"publisher","key":"ref68","DOI":"10.1109\/ACCESS.2018.2828128"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/TAC.2008.2007862"},{"doi-asserted-by":"publisher","key":"ref69","DOI":"10.1109\/TAC.2015.2504723"},{"key":"ref1","first-page":"770","article-title":"Modelling and analysis of gene regulatory networks","volume":"9","author":"karlebach","year":"2008","journal-title":"Nature"},{"doi-asserted-by":"publisher","key":"ref95","DOI":"10.1016\/j.jfranklin.2020.08.009"},{"doi-asserted-by":"publisher","key":"ref94","DOI":"10.1080\/00207179.2020.1805126"},{"doi-asserted-by":"publisher","key":"ref93","DOI":"10.1109\/TAC.2018.2880411"},{"doi-asserted-by":"publisher","key":"ref92","DOI":"10.1109\/TAC.2014.2348216"},{"doi-asserted-by":"publisher","key":"ref91","DOI":"10.1109\/TNNLS.2015.2442593"},{"doi-asserted-by":"publisher","key":"ref90","DOI":"10.1109\/TAC.2013.2251819"},{"doi-asserted-by":"publisher","key":"ref98","DOI":"10.1016\/j.amc.2012.12.033"},{"doi-asserted-by":"publisher","key":"ref99","DOI":"10.1016\/j.amc.2014.10.113"},{"year":"0","author":"liu","article-title":"Logical matrix factorization towards topological structure and stability of probabilistic Boolean networks","key":"ref96"},{"doi-asserted-by":"publisher","key":"ref97","DOI":"10.1016\/j.amc.2018.09.003"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.22436\/jnsa.010.06.41"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1016\/j.amc.2020.125467"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1155\/2020\/5285046"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1155\/2018\/4352714"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1016\/j.nonrwa.2011.07.003"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1007\/s11424-013-2047-z"},{"year":"2011","author":"cheng","journal-title":"Analysis and Control of Boolean Networks A Semi-Tensor Product Approach","key":"ref16"},{"doi-asserted-by":"publisher","key":"ref82","DOI":"10.1016\/j.automatica.2019.04.006"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1007\/s11432-012-4666-8"},{"doi-asserted-by":"publisher","key":"ref81","DOI":"10.1109\/TAC.2014.2365684"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1080\/23307706.2015.1098577"},{"key":"ref84","article-title":"A novel synthesis method for reliable feedback shift registers via Boolean networks","author":"lu","year":"0","journal-title":"Sci China Inf Sci"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1007\/s11432-017-9238-1"},{"doi-asserted-by":"publisher","key":"ref83","DOI":"10.1631\/FITEE.1900459"},{"doi-asserted-by":"publisher","key":"ref80","DOI":"10.1109\/TCSII.2020.2983180"},{"doi-asserted-by":"publisher","key":"ref89","DOI":"10.1109\/TAC.2020.2968836"},{"doi-asserted-by":"publisher","key":"ref85","DOI":"10.1007\/s11432-019-2813-7"},{"doi-asserted-by":"publisher","key":"ref86","DOI":"10.1007\/s11432-017-9269-6"},{"doi-asserted-by":"publisher","key":"ref87","DOI":"10.1049\/iet-cta.2016.1659"},{"doi-asserted-by":"publisher","key":"ref88","DOI":"10.1109\/WCICA.2012.6358254"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09272772.pdf?arnumber=9272772","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,8]],"date-time":"2022-09-08T19:58:30Z","timestamp":1662667110000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9272772\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":99,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3041119","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2020]]}}}