{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T16:11:57Z","timestamp":1771517517485,"version":"3.50.1"},"reference-count":34,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62173336"],"award-info":[{"award-number":["62173336"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Scientific Research Plan of National University of Defense Technology","award":["ZK-20-38"],"award-info":[{"award-number":["ZK-20-38"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Systems Journal"],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1109\/jsyst.2022.3231346","type":"journal-article","created":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T18:42:47Z","timestamp":1673376167000},"page":"4497-4508","source":"Crossref","is-referenced-by-count":15,"title":["SHATTER: Searching Heterogeneous Combat Network Attack Sequences Through Network Embedding and Reinforcement Learning"],"prefix":"10.1109","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7395-2537","authenticated-orcid":false,"given":"Chengyi","family":"Zeng","sequence":"first","affiliation":[{"name":"College of Intelligence Science and Technology, National University of Defense Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1459-8424","authenticated-orcid":false,"given":"Hongfu","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Intelligence Science and Technology, National University of Defense Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1775-1831","authenticated-orcid":false,"given":"Lina","family":"Lu","sequence":"additional","affiliation":[{"name":"College of Intelligence Science and Technology, National University of Defense Technology, Changsha, China"}]},{"given":"Jing","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Intelligence Science and Technology, National University of Defense Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6423-8603","authenticated-orcid":false,"given":"Zongtan","family":"Zhou","sequence":"additional","affiliation":[{"name":"College of Intelligence Science and Technology, National University of Defense Technology, Changsha, China"}]}],"member":"263","reference":[{"key":"ref13","article-title":"Neural combinatorial optimization with reinforcement learning","author":"bello","year":"2016"},{"key":"ref12","first-page":"9861","article-title":"Reinforcement learning for solving the vehicle routing problem","author":"nazari","year":"0","journal-title":"Proc 32nd Int Conf Neural Inf Process Syst"},{"key":"ref34","article-title":"The Pagerank citation ranking: Bringing order to the web","author":"page","year":"1999"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"3806","DOI":"10.1109\/TITS.2019.2909109","article-title":"Online vehicle routing with neural combinatorial optimization and deep reinforcement learning","volume":"20","author":"james","year":"2019","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2020.07.063"},{"key":"ref31","article-title":"Semi-supervised classification with graph convolutional networks","author":"kipf","year":"2016"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10179"},{"key":"ref11","first-page":"6351","article-title":"Learning combinatorial optimization algorithms over graphs","author":"dai","year":"0","journal-title":"Proc 31st Int Conf Neural Inf Process Syst"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2018.2828779"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2215882"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2016.11.097"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1126\/science.257.5073.1078"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2008.08.016"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-020-0177-2"},{"key":"ref16","article-title":"Combinatorial optimization with graph convolutional networks and guided tree search","author":"li","year":"2018","journal-title":"Adv Neural Inf Process Syst"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/291"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1063\/5.0075575"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1126\/science.290.5500.2323"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1009440108"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939751"},{"key":"ref25","first-page":"585","article-title":"Laplacian eigenmaps and spectral techniques for embedding and clustering","author":"belkin","year":"0","journal-title":"Proc 14th Int Conf Neural Inf Process Syst Natural Synthetic"},{"key":"ref20","article-title":"An information age combat model","author":"cares","year":"2004","journal-title":"Alidade Inc"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.65.056109"},{"key":"ref21","first-page":"25","article-title":"C4ISR, the FINC methodology, and operations in urban terrain","volume":"8","author":"dekker","year":"2005","journal-title":"J Battlefield Technol"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939753"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1806108116"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2018.02.002"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1038\/nature14604"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2014.2309321"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s10898-010-9603-z"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1126\/science.286.5439.509"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/9781118918937"}],"container-title":["IEEE Systems Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4267003\/10235272\/10014651.pdf?arnumber=10014651","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T17:56:41Z","timestamp":1695059801000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10014651\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9]]},"references-count":34,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/jsyst.2022.3231346","relation":{},"ISSN":["1932-8184","1937-9234","2373-7816"],"issn-type":[{"value":"1932-8184","type":"print"},{"value":"1937-9234","type":"electronic"},{"value":"2373-7816","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9]]}}}