{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T18:44:17Z","timestamp":1767293057727,"version":"3.48.0"},"reference-count":70,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62472032"],"award-info":[{"award-number":["62472032"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62171454"],"award-info":[{"award-number":["62171454"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Laboratory of Mobile Application Innovation and Governance Technology, the Ministry of Industry and Information Technology","award":["2023IFS080601-K"],"award-info":[{"award-number":["2023IFS080601-K"]}]},{"name":"Young Elite Scientists Sponsorship Program by CAST","award":["2023QNRC001"],"award-info":[{"award-number":["2023QNRC001"]}]},{"name":"Key Laboratory of Computing Power Network and Information Security, Ministry of Education","award":["2024PY020"],"award-info":[{"award-number":["2024PY020"]}]},{"DOI":"10.13039\/501100019642","name":"State Key Laboratory of Integrated Services Networks","doi-asserted-by":"publisher","award":["ISN26-23"],"award-info":[{"award-number":["ISN26-23"]}],"id":[{"id":"10.13039\/501100019642","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cogn. Commun. Netw."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/tccn.2025.3631703","type":"journal-article","created":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T18:29:28Z","timestamp":1762885768000},"page":"3573-3585","source":"Crossref","is-referenced-by-count":0,"title":["AdaSP: Adaptive Soft Filter Pruning With Layer-Wise Ratios for Model Compression in Low-Altitude UAVs"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-5069-1612","authenticated-orcid":false,"given":"You","family":"Li","sequence":"first","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-3898-2534","authenticated-orcid":false,"given":"Xixi","family":"Zheng","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6959-0406","authenticated-orcid":false,"given":"Jianchao","family":"Zheng","sequence":"additional","affiliation":[{"name":"Academy of Military Science, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7907-2071","authenticated-orcid":false,"given":"Nan","family":"Cheng","sequence":"additional","affiliation":[{"name":"State Key Laboratory of ISN, School of Telecommunications Engineering, Xidian University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3333-9281","authenticated-orcid":false,"given":"Baokun","family":"Zheng","sequence":"additional","affiliation":[{"name":"School of Information Management for Law, China University of Political Science and Law, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7684-8540","authenticated-orcid":false,"given":"Chuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8350-7186","authenticated-orcid":false,"given":"Yinglong","family":"Wang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2025.3541027"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2025.145050"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2025.3613672"},{"key":"ref4","article-title":"Optimizing 6G integrated sensing and communications (ISAC) via expert networks","author":"Wang","year":"2024","journal-title":"arXiv:2406.00408"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN55064.2022.9892373"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.81"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/cai2.119"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.314"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00489"},{"key":"ref10","first-page":"4095","article-title":"Efficient neural architecture search via parameters sharing","volume-title":"Proc. 35th Int. Conf. Mach. Learn.","author":"Pham"},{"article-title":"Network pruning via transformable architecture search","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Dong","key":"ref11"},{"key":"ref12","article-title":"Locally free weight sharing for network width search","author":"Su","year":"2021","journal-title":"arXiv:2102.05258"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00748"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3005348"},{"key":"ref15","article-title":"Provable filter pruning for efficient neural networks","author":"Liebenwein","year":"2019","journal-title":"arXiv:1911.07412"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00447"},{"key":"ref17","first-page":"10820","article-title":"Good subnetworks provably exist: Pruning via greedy forward selection","volume-title":"Proc. 37th Int. Conf. Mach. Learn.","author":"Ye"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00915"},{"key":"ref19","article-title":"Discrimination-aware channel pruning for deep neural networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"31","author":"Zhuang"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00447"},{"key":"ref21","article-title":"Search spaces for neural model training","author":"Stosic","year":"2021","journal-title":"arXiv:2105.12920"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/309"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00161"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2019.2933477"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20083-0_38"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01067"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2022.02.024"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00293"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2023.3260903"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/LGRS.2019.2949930"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2020.2969809"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-024-01430-y"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s10707-022-00480-3"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2023.3277077"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01152"},{"key":"ref36","article-title":"Sparse networks from scratch: Faster training without losing performance","author":"Dettmers","year":"2019","journal-title":"arXiv:1907.04840"},{"key":"ref37","first-page":"2943","article-title":"Rigging the lottery: Making all tickets winners","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Evci"},{"key":"ref38","first-page":"4646","article-title":"Parameter efficient training of deep convolutional neural networks by dynamic sparse reparameterization","volume-title":"Proc. 36th Int. Conf. Mach. Learn.","author":"Mostafa"},{"key":"ref39","article-title":"Discovering neural wirings","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"32","author":"Wortsman"},{"key":"ref40","first-page":"5544","article-title":"Soft threshold weight reparameterization for learnable sparsity","volume-title":"Proc. 37th Int. Conf. Mach. Learn.","author":"Kusupati"},{"key":"ref41","first-page":"5122","article-title":"Operation-aware soft channel pruning using differentiable masks","volume-title":"Proc. 37th Int. Conf. Mach. Learn.","author":"Kang"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW63382.2024.00226"},{"key":"ref43","first-page":"10936","article-title":"Scop: Scientific control for reliable neural network pruning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Tang"},{"key":"ref44","first-page":"1607","article-title":"Approximated Oracle filter pruning for destructive CNN width optimization","volume-title":"Proc. 36th Int. Conf. Mach. Learn.","author":"Ding"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00339"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2023.3334614"},{"article-title":"Dynamic network surgery for efficient DNNs","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Guo","key":"ref47"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/336"},{"key":"ref49","article-title":"Dynamic model pruning with feedback","author":"Lin","year":"2020","journal-title":"arXiv:2006.07253"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.6098"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01213"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00528"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i4.28184"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2020.3035028"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/318"},{"key":"ref56","article-title":"Layer-compensated pruning for resource-constrained convolutional neural networks","author":"Chin","year":"2018","journal-title":"arXiv:1810.00518"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00907"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.01099"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2023.01.014"},{"key":"ref60","article-title":"Autoprune: Automatic network pruning by regularizing auxiliary parameters","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"32","author":"Xiao"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TGRS.2017.2685945"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.isprsjprs.2018.01.004"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2675998"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01197"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00850"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2024.3439435"},{"key":"ref67","article-title":"Pruning convolutional neural networks for resource efficient inference","author":"Molchanov","year":"2016","journal-title":"arXiv:1611.06440"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.298"},{"key":"ref69","article-title":"Drawing early-bird tickets: Towards more efficient training of deep networks","author":"You","year":"2019","journal-title":"arXiv:1909.11957"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3608665"}],"container-title":["IEEE Transactions on Cognitive Communications and Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6687307\/11304002\/11240151.pdf?arnumber=11240151","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T18:38:52Z","timestamp":1767292732000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11240151\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":70,"URL":"https:\/\/doi.org\/10.1109\/tccn.2025.3631703","relation":{},"ISSN":["2332-7731","2372-2045"],"issn-type":[{"type":"electronic","value":"2332-7731"},{"type":"electronic","value":"2372-2045"}],"subject":[],"published":{"date-parts":[[2026]]}}}