{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T10:13:10Z","timestamp":1768990390546,"version":"3.49.0"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2016,8,1]],"date-time":"2016-08-01T00:00:00Z","timestamp":1470009600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61170033"],"award-info":[{"award-number":["61170033"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National High-Tech Research and Development Plan of China","award":["2014BAD10B02"],"award-info":[{"award-number":["2014BAD10B02"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cybern."],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1109\/tcyb.2015.2446443","type":"journal-article","created":{"date-parts":[[2015,7,7]],"date-time":"2015-07-07T14:32:03Z","timestamp":1436279523000},"page":"1807-1816","source":"Crossref","is-referenced-by-count":32,"title":["Toward Risk Reduction for Mobile Service Composition"],"prefix":"10.1109","volume":"46","author":[{"given":"Shuiguang","family":"Deng","sequence":"first","affiliation":[]},{"given":"Longtao","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Li","sequence":"additional","affiliation":[]},{"given":"Honggeng","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Zhaohui","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Xiongfei","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Mikhail Yu","family":"Kataev","sequence":"additional","affiliation":[]},{"given":"Ling","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1810931.1810937"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2306799"},{"key":"ref33","first-page":"817","article-title":"Parallel optimization for data-intensive service composition","volume":"14","author":"deng","year":"2013","journal-title":"J Internet Technol"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICCP.2011.6047841"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2008.16"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2008.2009533"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-012-0541-6"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.4018\/ijwsr.2014010104"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2014.2361138"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2009.2037018"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2014.2320717"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1497185.1497251"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2014.2328659"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2014.2371139"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1398","DOI":"10.1109\/TSMCB.2012.2192107","article-title":"Robust multiperson detection and tracking for mobile service and social robots","volume":"42","author":"li","year":"2012","journal-title":"IEEE Trans Syst Man Cybern B Cybern"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2004.836886"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2014.050324"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.10.008"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2014.2382666"},{"key":"ref18","first-page":"42","article-title":"Research on efficient and reliable service composition in mobile ad hoc networking based on risk analysis","volume":"11","author":"hu","year":"2012","journal-title":"Telecommunication Science"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-014-9492-7"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.01.091"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2009.2037018"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2180861.2180864"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2014.2318898"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2301143"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2013.2"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2013.2280559"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2014.2365799"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-013-0716-5"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2011.2167156"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2381640"},{"key":"ref1","author":"wu","year":"2014","journal-title":"Service Computing Concepts Methods and Technology"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2300753"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28073-3_27"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-010-0303-x"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2014.2306931"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.010312.110783"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2007.68"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2307875"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2000.905001"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2010.46"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/0304-4076(94)90038-8"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2013.100"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1126\/science.220.4598.671"}],"container-title":["IEEE Transactions on Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221036\/7511816\/07151802.pdf?arnumber=7151802","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:45:06Z","timestamp":1641987906000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7151802\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":45,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tcyb.2015.2446443","relation":{},"ISSN":["2168-2267","2168-2275"],"issn-type":[{"value":"2168-2267","type":"print"},{"value":"2168-2275","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,8]]}}}