{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:16:31Z","timestamp":1750220191717,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T00:00:00Z","timestamp":1663891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,9,23]]},"DOI":"10.1145\/3573942.3574007","type":"proceedings-article","created":{"date-parts":[[2023,5,16]],"date-time":"2023-05-16T23:45:42Z","timestamp":1684280742000},"page":"1159-1163","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Analysis of Three-point Source Decoy Against Anti-radiation Missile"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2734-5071","authenticated-orcid":false,"given":"Jie","family":"Yang","sequence":"first","affiliation":[{"name":"Xi'an University of Posts and Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8316-2843","authenticated-orcid":false,"given":"Jinghui","family":"Xu","sequence":"additional","affiliation":[{"name":"Xi'an University of Posts and Telecommunications, China"}]}],"member":"320","published-online":{"date-parts":[[2023,5,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.16328\/j.htdz8511.2016.05.007"},{"key":"e_1_3_2_1_2_1","volume-title":"Design and simulation analysis of anti-anti-radiation missile decoy system[D]","author":"Xiang Sha","year":"2007","unstructured":"Sha Xiang. Design and simulation analysis of anti-anti-radiation missile decoy system[D]. University of Electronic Science and Technology of China, 2007."},{"issue":"04","key":"e_1_3_2_1_3_1","first-page":"26","article-title":"Development of anti-radiation missiles and countermeasures[J]","volume":"37","author":"Wei Song","year":"2019","unstructured":"Song Wei, Wu Xiaohua, Xu Shilong. Development of anti-radiation missiles and countermeasures[J]. Science and Technology Herald, 2019, 37(04): 26-29.","journal-title":"Science and Technology Herald"},{"key":"e_1_3_2_1_4_1","volume-title":"IOP Conference Series: Materials Science and Engineering","author":"Junyao Tang","year":"2017","unstructured":"Tang Junyao, Cao Fei, Li Sijia. Effectiveness evaluation method of anti-radiation missile against active decoy[J]. IOP Conference Series: Materials Science and Engineering, 2017, 207(1)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.16338\/j.issn.1009-1319.2016.02.10"},{"key":"e_1_3_2_1_6_1","first-page":"180","article-title":"Research on the classification method of complex electromagnetic environment for anti-radiation missile radar seeker[J]","volume":"2019","author":"Lei Shi","unstructured":"Shi Lei. Research on the classification method of complex electromagnetic environment for anti-radiation missile radar seeker[J]. Ship Electronic Engineering,2019,39(08): 180-184.","journal-title":"Ship Electronic Engineering"},{"issue":"07","key":"e_1_3_2_1_7_1","first-page":"101","article-title":"Analysis and research on anti-radiation missile with active decoy system[J]","volume":"34","author":"Zongkui Fang","year":"2014","unstructured":"Fang Zongkui. Analysis and research on anti-radiation missile with active decoy system[J]. Ship Electronics Engineering, 2014, 34(07): 101-104.","journal-title":"Ship Electronics Engineering"},{"issue":"02","key":"e_1_3_2_1_8_1","first-page":"1","article-title":"Research on two-point source decoupling technology of anti-radiation missile[J]","volume":"29","author":"Hongbin Han","year":"2013","unstructured":"Han Hongbin, Gu Zhenjie, Xu Dongdong, Research on two-point source decoupling technology of anti-radiation missile[J]. Aerospace Electronic Countermeasures, 2013, 29(02): 1-3+15.","journal-title":"Aerospace Electronic Countermeasures"},{"issue":"05","key":"e_1_3_2_1_9_1","first-page":"52","article-title":"Research on the optimal safe distance of two-point source anti-radiation missiles[J]","volume":"2016","author":"Yuan Chen","unstructured":"Chen Yuan, Zhang Lin. Research on the optimal safe distance of two-point source anti-radiation missiles[J]. Information and Communication,2016(05): 52-54.","journal-title":"Information and Communication"},{"key":"e_1_3_2_1_10_1","first-page":"1","article-title":"Research on three-point source decoy system against anti-radiation missile[J]","volume":"2012","author":"Tao Tang","unstructured":"Tang Tao, Su Wuxing, Li Jiandong, Research on three-point source decoy system against anti-radiation missile[J]. Aerospace Electronic Countermeasures,2012,28(05): 1-3.","journal-title":"Aerospace Electronic Countermeasures"},{"issue":"04","key":"e_1_3_2_1_11_1","first-page":"31","article-title":"Simulation research on radar active decoy system against ARM[J]","volume":"27","author":"Fang Hu","year":"2010","unstructured":"Hu Fang, Liu Yuchi, Tuo Xinyu, Simulation research on radar active decoy system against ARM[J]. Computer Simulation, 2010, 27(04): 31-35.","journal-title":"Computer Simulation"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.16592\/j.cnki.1004-7859.2007.03.003"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.16426\/j.cnki.jcdzdk.2013.03.006"},{"key":"e_1_3_2_1_14_1","first-page":"151","article-title":"Combat simulation of radar anti-radiation attack decoy deployment station[J]","volume":"2018","author":"Junling Shen","unstructured":"Shen Junling, Xu Hai, Qi Zhaolong. Combat simulation of radar anti-radiation attack decoy deployment station[J]. Firepower and Command and Control,2018,43(11):151-155+160.","journal-title":"Firepower and Command and Control"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.19472\/j.cnki.1008-8652.2020.01.002"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.16592\/j.cnki.1004-7859.2010.10.001"}],"event":{"name":"AIPR 2022: 2022 5th International Conference on Artificial Intelligence and Pattern Recognition","acronym":"AIPR 2022","location":"Xiamen China"},"container-title":["Proceedings of the 2022 5th International Conference on Artificial Intelligence and Pattern Recognition"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3573942.3574007","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3573942.3574007","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:32Z","timestamp":1750186952000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3573942.3574007"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,23]]},"references-count":16,"alternative-id":["10.1145\/3573942.3574007","10.1145\/3573942"],"URL":"https:\/\/doi.org\/10.1145\/3573942.3574007","relation":{},"subject":[],"published":{"date-parts":[[2022,9,23]]},"assertion":[{"value":"2023-05-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}