{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T18:29:13Z","timestamp":1770748153003,"version":"3.49.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,14]],"date-time":"2021-10-14T00:00:00Z","timestamp":1634169600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,14]],"date-time":"2021-10-14T00:00:00Z","timestamp":1634169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,14]],"date-time":"2021-10-14T00:00:00Z","timestamp":1634169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,14]]},"DOI":"10.1109\/iccais52680.2021.9624532","type":"proceedings-article","created":{"date-parts":[[2021,12,9]],"date-time":"2021-12-09T21:21:26Z","timestamp":1639084886000},"page":"1053-1057","source":"Crossref","is-referenced-by-count":5,"title":["Multiple Active False Target Suppression Based on Distributed GM-PHD Filter"],"prefix":"10.1109","author":[{"given":"Yongfeng","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Kai","family":"Da","sequence":"additional","affiliation":[]},{"given":"Ye","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Fu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3389\/fmars.2019.00164"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2015.2440769"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CIE-Radar.2011.6159518"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/URSIGASS.2014.6929631"},{"key":"ref14","author":"liu","year":"2018","journal-title":"The Methods for Deception ECCM on Multiple-Radar System"},{"key":"ref15","author":"zhao","year":"2016","journal-title":"The Methods for Deception ECCM on Multiple-Radar System"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2003.1261119"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2006.881190"},{"key":"ref18","author":"mahler","year":"2014","journal-title":"Advances in Statistical Multisource-Multitarget Information Fusion"},{"key":"ref19","author":"mahler","year":"2007","journal-title":"Statistical Multisource-Multitarget Information Fusion"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2013.6494414"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSIPN.2020.3016478"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1049\/iet-rsn.2013.0341"},{"key":"ref6","first-page":"454","article-title":"Tracking technique for radar network in the presence of multi-range-false-target deception jamming","volume":"35","author":"zhao","year":"2007","journal-title":"ACTA ELECTONICA SINICA"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2014.2322612"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPCC.2018.8567751"},{"key":"ref7","first-page":"269","article-title":"Anti-jamming transmitter independent radar networks 2008 International Conference on Signal Processing","author":"stavroulakis","year":"2008","journal-title":"Communications and Networking"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-rsn.2015.0371"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1175\/BAMS-88-11-1739"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753118"},{"key":"ref20","article-title":"Robust multi-object sensor fusion with unknown correlations","author":"clark","year":"2010","journal-title":"IEEE Signal Processing Letters"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2013.2250911"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2013.2257162"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2016.2617825"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2014.2313177"},{"key":"ref26","author":"zhao","year":"2015","journal-title":"Principles of Radar Countermeasures"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2018.2811750"}],"event":{"name":"2021 International Conference on Control, Automation and Information Sciences (ICCAIS)","location":"Xi'an, China","start":{"date-parts":[[2021,10,14]]},"end":{"date-parts":[[2021,10,17]]}},"container-title":["2021 International Conference on Control, Automation and Information Sciences (ICCAIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9624464\/9624202\/09624532.pdf?arnumber=9624532","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:53:45Z","timestamp":1652201625000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9624532\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,14]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/iccais52680.2021.9624532","relation":{},"subject":[],"published":{"date-parts":[[2021,10,14]]}}}