{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T00:24:58Z","timestamp":1769819098904,"version":"3.49.0"},"reference-count":26,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61571104"],"award-info":[{"award-number":["61571104"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U20B2070"],"award-info":[{"award-number":["U20B2070"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Sichuan Science and Technology Program","award":["2018JY0539"],"award-info":[{"award-number":["2018JY0539"]}]},{"name":"Key Projects of the Sichuan Provincial Education Department","award":["18ZA0219"],"award-info":[{"award-number":["18ZA0219"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["ZYGX2017KYQD170"],"award-info":[{"award-number":["ZYGX2017KYQD170"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"CERNET Innovation Project","award":["NGII20190111"],"award-info":[{"award-number":["NGII20190111"]}]},{"name":"CERNET Innovation Project","award":["2020-JCJQ-ZD-016-11"],"award-info":[{"award-number":["2020-JCJQ-ZD-016-11"]}]},{"name":"CERNET Innovation Project","award":["61403110405"],"award-info":[{"award-number":["61403110405"]}]},{"name":"CERNET Innovation Project","award":["315075802"],"award-info":[{"award-number":["315075802"]}]},{"name":"CERNET Innovation Project","award":["JZX6Y202001010161"],"award-info":[{"award-number":["JZX6Y202001010161"]}]},{"name":"Open Fund of Digital Media Art, Key Laboratory of Sichuan Province","award":["20DMAKL01"],"award-info":[{"award-number":["20DMAKL01"]}]},{"name":"Innovation Funding","award":["2018510007000134"],"award-info":[{"award-number":["2018510007000134"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2023,2]]},"DOI":"10.1109\/tii.2022.3210139","type":"journal-article","created":{"date-parts":[[2022,9,28]],"date-time":"2022-09-28T20:06:07Z","timestamp":1664395567000},"page":"2019-2027","source":"Crossref","is-referenced-by-count":12,"title":["AI-Assisted Trustworthy Architecture for Industrial IoT Based on Dynamic Heterogeneous Redundancy"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1989-3067","authenticated-orcid":false,"given":"Zhihao","family":"Wang","sequence":"first","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0284-5624","authenticated-orcid":false,"given":"Dingde","family":"Jiang","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2525-3074","authenticated-orcid":false,"given":"Zhihan","family":"Lv","sequence":"additional","affiliation":[{"name":"Department of Game Design, Faculty of Arts, Uppsala University, Uppsala, Sweden"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3099306"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.112963"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-019-00482-7"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2018.1700291"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-015-1420-1"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2524258"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2687918"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-020-0177-2"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3022611"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.23919\/ICN.2020.0015"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3024847"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2017.0086"},{"key":"ref6","first-page":"143","article-title":"Markov game modeling of mimic defense and defense strategy determination","volume":"39","author":"zhang","year":"2018","journal-title":"J Commun"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CompComm.2018.8780759"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3004415"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2994747"},{"key":"ref2","first-page":"2025","article-title":"A mimic defense automaton model of dynamic heterogeneous redundancy structures","volume":"47","author":"zhu","year":"2019","journal-title":"ACTA ELECTONICA SINICA"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3035437"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2021.3095083"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2901791"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2020.2973376"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2900035"},{"key":"ref24","article-title":"A security analysis approach for dynamic heterogeneous redundancy model based on probability analysis","volume":"49","author":"qiu-hua","year":"2021","journal-title":"ACTA ELECTONICA SINICA"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2020.2984614"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3097131"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3098317"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424\/9989328\/09904873.pdf?arnumber=9904873","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T19:21:31Z","timestamp":1673896891000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9904873\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2]]},"references-count":26,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tii.2022.3210139","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"value":"1551-3203","type":"print"},{"value":"1941-0050","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2]]}}}