{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T21:23:06Z","timestamp":1770499386759,"version":"3.49.0"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T00:00:00Z","timestamp":1743465600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62171132"],"award-info":[{"award-number":["62171132"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62102088"],"award-info":[{"award-number":["62102088"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1905211"],"award-info":[{"award-number":["U1905211"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003392","name":"Natural Science Foundation of Fujian Province","doi-asserted-by":"publisher","award":["2024J09032"],"award-info":[{"award-number":["2024J09032"]}],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003392","name":"Natural Science Foundation of Fujian Province","doi-asserted-by":"publisher","award":["2021J05228"],"award-info":[{"award-number":["2021J05228"]}],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010261","name":"Fok Ying Tung Education Foundation","doi-asserted-by":"publisher","award":["171061"],"award-info":[{"award-number":["171061"]}],"id":[{"id":"10.13039\/501100010261","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw."],"published-print":{"date-parts":[[2025,4]]},"DOI":"10.1109\/tnet.2024.3507152","type":"journal-article","created":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T19:26:18Z","timestamp":1733340378000},"page":"849-864","source":"Crossref","is-referenced-by-count":7,"title":["Local Fault Diagnosis Analysis Based on Block Pattern of Regular Diagnosable Networks"],"prefix":"10.1109","volume":"33","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7227-6258","authenticated-orcid":false,"given":"Limei","family":"Lin","sequence":"first","affiliation":[{"name":"College of Computer and Cyber Security, Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, Fujian, China"}],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Kaineng","family":"Guan","sequence":"additional","affiliation":[{"name":"College of Computer and Cyber Security, Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, Fujian, China"}],"role":[{"role":"author","vocab":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9468-8701","authenticated-orcid":false,"given":"Yanze","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Mathematics, Fujian University of Technology, Fuzhou, Fujian, China"}],"role":[{"role":"author","vocab":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4746-3179","authenticated-orcid":false,"given":"Sun-Yuan","family":"Hsieh","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering, National Cheng Kung University, Tainan, Taiwan"}],"role":[{"role":"author","vocab":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8143-8930","authenticated-orcid":false,"given":"Gaolin","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Computer and Cyber Security, Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou, Fujian, China"}],"role":[{"role":"author","vocab":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2021.3052524"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2005.44"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.290"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2562620"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2018.03.008"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.03.009"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2005.33"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2016.06.043"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2015.07.026"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.12988\/ams.2015.510679"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2020.04.023"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2021.3129257"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2012.03.030"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.1022"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxx057"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2018.09.014"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2022.3147320"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.46"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.249"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3126257"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2020.3023120"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2014.10.046"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2400459"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2726541"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2512866"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2014.06.041"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2347961"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2019.04.028"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2020.09.012"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1080\/00207160.2016.1148813"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2018.12.032"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2018.07.017"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2019.2919282"},{"issue":"1","key":"ref34","first-page":"623","article-title":"A test round controllable local diagnosis algorithm under the PMC model","volume":"244","author":"Teng","year":"2014","journal-title":"Appl. Math. Comput."},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2014.09.003"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2018.04.054"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2017.02.006"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2023.3305611"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2016.2570559"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.08.014"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2020.3047630"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1142\/S0129054120500185"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxaa058"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1142\/S0129054112500256"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2015.10.030"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.228"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-007-0167-8"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.09.005"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.106"}],"container-title":["IEEE Transactions on Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10723154\/10969151\/10777942.pdf?arnumber=10777942","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T17:36:15Z","timestamp":1744997775000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10777942\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4]]},"references-count":49,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tnet.2024.3507152","relation":{},"ISSN":["2998-4157"],"issn-type":[{"value":"2998-4157","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4]]}}}