{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:20:46Z","timestamp":1750220446754,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,4]],"date-time":"2020-12-04T00:00:00Z","timestamp":1607040000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,4]]},"DOI":"10.1145\/3444370.3444554","type":"proceedings-article","created":{"date-parts":[[2021,1,5]],"date-time":"2021-01-05T06:32:34Z","timestamp":1609828354000},"page":"95-102","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on Penetration Strategy of UAV"],"prefix":"10.1145","author":[{"given":"Daojun","family":"Han","sequence":"first","affiliation":[{"name":"Institute of Data and Knowledge Engineering, Henan University, Kaifeng PR China"}]},{"given":"Hongzhen","family":"Xiang","sequence":"additional","affiliation":[{"name":"School of Computer and Information Engineering, Henan University, Kaifeng PR China"}]},{"given":"Haolin","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer and Information Engineering, Henan University, Kaifeng PR China"}]},{"given":"Yi","family":"Xie","sequence":"additional","affiliation":[{"name":"Henan Key Laboratory of Big Data Analysis and Processing, Henan University, Kaifeng PR China"}]}],"member":"320","published-online":{"date-parts":[[2021,1,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ChiCC.2016.7554878"},{"key":"e_1_3_2_1_2_1","first-page":"1","volume":"2017","author":"Zong Q","unstructured":"Zong Q , Wang D , Shao S , Research status and development of multi UAV coordinated formation flight control. Journal of Harbin Institute of Technology[J] , 2017 , 49(3): 1 -- 14 . Zong Q, Wang D, Shao S, et al. Research status and development of multi UAV coordinated formation flight control. Journal of Harbin Institute of Technology[J], 2017, 49(3): 1--14.","journal-title":"Journal of Harbin Institute of Technology[J]"},{"key":"e_1_3_2_1_3_1","first-page":"185","volume":"2015","author":"Ernest N","unstructured":"Ernest N , Cohen K , Kivelevitch E , Genetic Fuzzy Trees and their Application Towards Autonomous Training and Control of a Squadron of Unmanned Combat Aerial Vehicles. Unmanned Systems[J] , 2015 , 3(03): 185 -- 204 . Ernest N, Cohen K, Kivelevitch E, et al. Genetic Fuzzy Trees and their Application Towards Autonomous Training and Control of a Squadron of Unmanned Combat Aerial Vehicles. Unmanned Systems[J], 2015, 3(03): 185--204.","journal-title":"Unmanned Systems[J]"},{"key":"e_1_3_2_1_4_1","first-page":"1498","volume":"2015","author":"De","unstructured":"LUO De -lin, ZHANG Hai -yang, XIE Rong -zeng, Unmanned aerial vehicles swarm conflict based on multi-agent system. Control Theory & Applications[J] , 2015 , 32(11): 1498 -- 1504 . LUO De-lin, ZHANG Hai-yang, XIE Rong-zeng, et al. Unmanned aerial vehicles swarm conflict based on multi-agent system. Control Theory & Applications[J], 2015, 32(11): 1498--1504.","journal-title":"Control Theory & Applications[J]"},{"key":"e_1_3_2_1_5_1","first-page":"5","volume":"2016","author":"Su K","unstructured":"Su K , Zhu W , Tian D , UAV cluster information countermeasure system based on cognitive cloud. Aerospace Electronic Warfare[J] , 2016 , 32(5): 5 -- 8 . Su K, Zhu W, Tian D, et al. UAV cluster information countermeasure system based on cognitive cloud. Aerospace Electronic Warfare[J], 2016, 32(5): 5--8.","journal-title":"Aerospace Electronic Warfare[J]"},{"key":"e_1_3_2_1_6_1","first-page":"82","volume":"2018","author":"Gu J","unstructured":"Gu J , Su T , Wang Q , Multiple Moving Targets Surveillance Based on a Cooperative Network for Multi-UAV. IEEE Communications Magazine[J] , 2018 , 56(4): 82 -- 89 . Gu J, Su T, Wang Q, et al. Multiple Moving Targets Surveillance Based on a Cooperative Network for Multi-UAV. IEEE Communications Magazine[J], 2018, 56(4): 82--89.","journal-title":"IEEE Communications Magazine[J]"},{"key":"e_1_3_2_1_7_1","volume-title":"Flight verification of multiple UAVs collaborative air combat imitating the intelligent behavior in hawks. Control Theory & Applications[J]","author":"Hai","year":"2018","unstructured":"DUAN Hai -bin, HUO Meng -zhen, Yan -ming F. Flight verification of multiple UAVs collaborative air combat imitating the intelligent behavior in hawks. Control Theory & Applications[J] , 2018 , 35(12): 1812--1819. DUAN Hai-bin, HUO Meng-zhen, Yan-ming F. Flight verification of multiple UAVs collaborative air combat imitating the intelligent behavior in hawks. Control Theory & Applications[J], 2018, 35(12): 1812--1819."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2004.02.017"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2005.1559332"},{"key":"e_1_3_2_1_10_1","unstructured":"Lucas A Ronnquist R Howden N etal (2013). Teamed UAVs-a New Approach with Intelligent Agents. Aiaa \"unmanned Unlimited\" Conf & Workshop & Exhibit.  Lucas A Ronnquist R Howden N et al. (2013). Teamed UAVs-a New Approach with Intelligent Agents. Aiaa \"unmanned Unlimited\" Conf & Workshop & Exhibit."},{"key":"e_1_3_2_1_11_1","volume-title":"Dual Controller Approach to Three-Dimensional Autonomous Formation Control. Journal of Guidance Control and Dynamics[J]","author":"Yang E","year":"2015","unstructured":"Yang E , Masuko Y , Mita T. Dual Controller Approach to Three-Dimensional Autonomous Formation Control. Journal of Guidance Control and Dynamics[J] , 2015 , 27(3): 336--346. Yang E, Masuko Y, Mita T. Dual Controller Approach to Three-Dimensional Autonomous Formation Control. Journal of Guidance Control and Dynamics[J], 2015, 27(3): 336--346."},{"key":"e_1_3_2_1_12_1","first-page":"683","volume":"2009","author":"Fan Qiong","unstructured":"Fan Qiong jian, Yang Zhong , Fang Ting, Research Status of Coordinated Formation Flight Control for Multi-UAVs. ACTA AERONAUTICA ET AS TRONAUTICA SINICA[J] , 2009 , 30(4): 683 -- 691 . Fan Qiong jian, Yang Zhong, Fang Ting, et al. Research Status of Coordinated Formation Flight Control for Multi-UAVs. ACTA AERONAUTICA ET AS TRONAUTICA SINICA[J], 2009, 30(4): 683--691.","journal-title":"ACTA AERONAUTICA ET AS TRONAUTICA SINICA[J]"},{"key":"e_1_3_2_1_13_1","volume-title":"Influence diagram theory, method and Application. Tianjin","author":"Zhan Yuanrui","year":"1995","unstructured":"Zhan Yuanrui ( 1995 ). Influence diagram theory, method and Application. Tianjin , Tianjin University Press . Zhan Yuanrui (1995). Influence diagram theory, method and Application. Tianjin, Tianjin University Press."},{"key":"e_1_3_2_1_14_1","volume-title":"Modeling Pilot's Sequential Maneuvering Decisions by a Multistage Influence Diagram. Journal of Guidance Control and Dynamics[J]","author":"Virtanen K","year":"2004","unstructured":"Virtanen K , Raivio T , Hmlinen R P . Modeling Pilot's Sequential Maneuvering Decisions by a Multistage Influence Diagram. Journal of Guidance Control and Dynamics[J] , 2004 , 27(4). Virtanen K, Raivio T, Hmlinen R P. Modeling Pilot's Sequential Maneuvering Decisions by a Multistage Influence Diagram. Journal of Guidance Control and Dynamics[J], 2004, 27(4)."},{"key":"e_1_3_2_1_15_1","first-page":"89","volume":"2006","author":"De","unstructured":"LUO De -lin, SHEN Chun -lin, WU Wen -hai, Decision-Making for Air Combat Dogfight. JOURNAL OF APPLIED SCIENCES[J] , 2006 , 24(1): 89 -- 93 . LUO De-lin, SHEN Chun-lin, WU Wen-hai, et al. Decision-Making for Air Combat Dogfight. JOURNAL OF APPLIED SCIENCES[J], 2006, 24(1): 89--93.","journal-title":"Decision-Making for Air Combat Dogfight. JOURNAL OF APPLIED SCIENCES[J]"},{"volume-title":"Cooperative Combat Decision-making Research for Multi UAVs. Information and Control[J]","year":"2018","key":"e_1_3_2_1_16_1","unstructured":"SHAO J, XU Y, LUO D. Cooperative Combat Decision-making Research for Multi UAVs. Information and Control[J] , 2018 , 47(03): 347--354. SHAO J, XU Y, LUO D. Cooperative Combat Decision-making Research for Multi UAVs. Information and Control[J], 2018, 47(03): 347--354."},{"key":"e_1_3_2_1_17_1","volume-title":"Application of Receding Horizon Control Strategy to Pursuit-Evasion Problems. Optimal Control Applications & Methods[J]","author":"Shinar J","year":"1995","unstructured":"Shinar J , Glizer V J . Application of Receding Horizon Control Strategy to Pursuit-Evasion Problems. Optimal Control Applications & Methods[J] , 1995 , 16(2): 127--141. Shinar J, Glizer V J. Application of Receding Horizon Control Strategy to Pursuit-Evasion Problems. Optimal Control Applications & Methods[J], 1995, 16(2): 127--141."},{"key":"e_1_3_2_1_18_1","first-page":"1","volume":"2019","author":"Qiu J","unstructured":"Qiu J , Du L , Zhang D , Nei-TTE: Intelligent Traffic Time Estimation Based on Fine-grained Time Derivation of Road Segments for Smart City. IEEE Transactions on Industrial Informatics[J] , 2019 , PP (99): 1 -- 1 . Qiu J, Du L, Zhang D, et al. Nei-TTE: Intelligent Traffic Time Estimation Based on Fine-grained Time Derivation of Road Segments for Smart City. IEEE Transactions on Industrial Informatics[J], 2019, PP (99): 1--1.","journal-title":"IEEE Transactions on Industrial Informatics[J]"}],"event":{"name":"CIAT 2020: 2020 International Conference on Cyberspace Innovation of Advanced Technologies","sponsor":["Sun Yat-Sen University","CARLETON UNIVERSITY INSTITUTE FOR INTERDISCIPLINARY STUDIES","Beijing University of Posts and Telecommunications","Guangdong University of Technology Guangdong University of Technology","Deakin University"],"location":"Guangzhou China","acronym":"CIAT 2020"},"container-title":["Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3444370.3444554","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3444370.3444554","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:44Z","timestamp":1750193264000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3444370.3444554"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,4]]},"references-count":18,"alternative-id":["10.1145\/3444370.3444554","10.1145\/3444370"],"URL":"https:\/\/doi.org\/10.1145\/3444370.3444554","relation":{},"subject":[],"published":{"date-parts":[[2020,12,4]]},"assertion":[{"value":"2021-01-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}