{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:16:06Z","timestamp":1730247366454,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,23]],"date-time":"2023-09-23T00:00:00Z","timestamp":1695427200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,23]],"date-time":"2023-09-23T00:00:00Z","timestamp":1695427200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012456","name":"National Social Science Fund of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012456","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,23]]},"DOI":"10.1109\/iciscae59047.2023.10393735","type":"proceedings-article","created":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T18:32:54Z","timestamp":1705948374000},"page":"329-333","source":"Crossref","is-referenced-by-count":0,"title":["Study on Threat Assessment of Time-sensitive-target for UAV Ground Attack Based on SPA Method"],"prefix":"10.1109","author":[{"given":"Wang","family":"Bingzhou","sequence":"first","affiliation":[{"name":"Air Force Engineering University,Air Traffic Control and Navigation College,Xi&#x2019;an,China,710051"}]},{"given":"Li","family":"Ye","sequence":"additional","affiliation":[{"name":"Air Force Engineering University,Air Traffic Control and Navigation College,Xi&#x2019;an,China,710051"}]},{"given":"Li","family":"Ze","sequence":"additional","affiliation":[{"name":"Xijing University,School of Mechanical Engineering,Xi&#x2019;an,China,710123"}]},{"given":"Wang","family":"Qian","sequence":"additional","affiliation":[{"name":"Xijing University,College of Science,Xi&#x2019;an,China,710123"}]}],"member":"263","reference":[{"volume-title":"Set pair analysis and its preliminary application","author":"Zhao","key":"ref1"},{"issue":"4","key":"ref2","first-page":"76","article-title":"The set pair analysis model for evaluation of multi-factor number and its application","volume":"29","author":"Wang","year":"2007","journal-title":"Journal of Gansu Lianhe University (Natural Sciences)"},{"key":"ref3","article-title":"A study on the bid-evaluation model and method based on set pair analysis theory","volume-title":"Thesis of Shenyang University of Technology","author":"Li","year":"2008"},{"issue":"6","key":"ref4","first-page":"476","article-title":"The theoretical basis and basic algorithm of binary connection A + Bi and its application in AI","volume":"3","author":"Zhao","year":"2008","journal-title":"CAAIT Transactions on Intelligent Systems"},{"issue":"6","key":"ref5","first-page":"103","article-title":"Application of risk evaluation in coalmine gas hazard based on model of SPA","volume":"6","author":"Tian","year":"2006","journal-title":"Journal of Safety and Environment"},{"issue":"6","key":"ref6","first-page":"86","article-title":"Risk assessment of coal mine based on set pair analysis","volume":"8","author":"Xu","year":"2012","journal-title":"Journal of Safety Science and Technology"},{"issue":"54","key":"ref7","first-page":"77","article-title":"Uncertainty theory in set pair analysis","volume":"14","author":"Zhao","year":"1995","journal-title":"Exploration of Nature"},{"issue":"1","key":"ref8","first-page":"77","article-title":"Advances in set pair analysis theory and its application","volume":"33","author":"Jiang","year":"2006","journal-title":"Computer Science"},{"issue":"3","key":"ref9","first-page":"32","article-title":"Uncertainty theory in set pair analysis","volume":"8","author":"Zhao","year":"2000","journal-title":"Journal of Systemic Dialectics"},{"issue":"3","key":"ref10","first-page":"40","article-title":"Uncertainty theory and several applications in set pair analysis","volume":"16","author":"Zhao","year":"1995","journal-title":"Nonferrous Metals Engineering AND Research"},{"volume-title":"Systemic Dialectics","year":"1991","author":"Wu","key":"ref11"},{"issue":"60","key":"ref12","first-page":"91","article-title":"Connection number and uncertainty in set pair analysis (SPA)","volume":"16","author":"Zhao","year":"1997","journal-title":"Exploration of Nature"},{"key":"ref13","article-title":"Research on attack decision-making technology of ground multi-time-sensitive-targets for UCAV","volume-title":"Thesis of Nanjing University of Aeronautics and Astronautics","author":"Han","year":"2013"}],"event":{"name":"2023 IEEE 6th International Conference on Information Systems and Computer Aided Education (ICISCAE)","start":{"date-parts":[[2023,9,23]]},"location":"Dalian, China","end":{"date-parts":[[2023,9,25]]}},"container-title":["2023 IEEE 6th International Conference on Information Systems and Computer Aided Education (ICISCAE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10391857\/10391858\/10393735.pdf?arnumber=10393735","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T02:12:38Z","timestamp":1706753558000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10393735\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,23]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/iciscae59047.2023.10393735","relation":{},"subject":[],"published":{"date-parts":[[2023,9,23]]}}}