{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:10:53Z","timestamp":1750219853738,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T00:00:00Z","timestamp":1685059200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"State Market Regulation of China Science and Technology Project","award":["No. 2022MK095"],"award-info":[{"award-number":["No. 2022MK095"]}]},{"name":"Guangdong International Technology Cooperation Project ?Intelligent Operation, Maintenance and Test Optimization of Electronic Assembly Workshops?","award":["No. 2022A0505050047"],"award-info":[{"award-number":["No. 2022A0505050047"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,5,26]]},"DOI":"10.1145\/3603781.3603832","type":"proceedings-article","created":{"date-parts":[[2023,7,27]],"date-time":"2023-07-27T18:02:29Z","timestamp":1690480949000},"page":"297-303","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Security risk assessment method for delivery robot based on two-dimensional cloud model"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-5302-8601","authenticated-orcid":false,"given":"Wencai","family":"Huang","sequence":"first","affiliation":[{"name":"National Key Laboratory for Market Supervision (Intelligent Robot Safety), Guangdong Testing Institute of Product Quality Supervision, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-0768-5014","authenticated-orcid":false,"given":"Xinjie","family":"Wu","sequence":"additional","affiliation":[{"name":"Software Quality Engineering Center, The Fifth Electronic Research Institute of Ministry of Industry and Information Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-9665-223X","authenticated-orcid":false,"given":"Xuyang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Software Quality Engineering Center, The Fifth Electronic Research Institute of Ministry of Industry and Information Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-7671-9795","authenticated-orcid":false,"given":"Yuansheng","family":"Zhong","sequence":"additional","affiliation":[{"name":"National Key Laboratory for Market Supervision (Intelligent Robot Safety), Guangdong Testing Institute of Product Quality Supervision, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-1683-913X","authenticated-orcid":false,"given":"Xiaopeng","family":"Zhu","sequence":"additional","affiliation":[{"name":"National Key Laboratory for Market Supervision (Intelligent Robot Safety), Guangdong Testing Institute of Product Quality Supervision, China"}]}],"member":"320","published-online":{"date-parts":[[2023,7,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1561\/2300000052"},{"key":"e_1_3_2_1_2_1","volume-title":"Robots and robotic devices-safety requirements for industrial robots-part 1: robots","author":"Institution","year":"2011","unstructured":"B.S. Institution . \u201c Robots and robotic devices-safety requirements for industrial robots-part 1: robots ,\u201d 2011 . B.S. Institution. \u201cRobots and robotic devices-safety requirements for industrial robots-part 1: robots,\u201d 2011."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2020.104667"},{"key":"e_1_3_2_1_4_1","volume-title":"Human-robot interactions: model-based risk analysis and safety case construction","author":"Quynh A D H","year":"2012","unstructured":"Quynh A D H , Jeremie G , David P , \u201c Human-robot interactions: model-based risk analysis and safety case construction ,\u201d 2012 . Quynh A D H, Jeremie G, David P, \u201cHuman-robot interactions: model-based risk analysis and safety case construction,\u201d 2012."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.3389\/frobt.2021.602878"},{"issue":"09","key":"e_1_3_2_1_6_1","first-page":"186","article-title":"Research on methods and application of probabilistic safety assessment for robot manufacturing digital workshop based on RPN method","volume":"367","author":"Yan B J","year":"2021","unstructured":"Yan B J , Hu Bo , Xu A D , \u201c Research on methods and application of probabilistic safety assessment for robot manufacturing digital workshop based on RPN method ,\u201d Machinery Design & Manufacture , 2021 , 367 ( 09 ): 186 - 189 +194. Yan B J, Hu Bo, Xu A D, \u201cResearch on methods and application of probabilistic safety assessment for robot manufacturing digital workshop based on RPN method,\u201d Machinery Design & Manufacture, 2021, 367(09): 186-189+194.","journal-title":"Machinery Design & Manufacture"},{"key":"e_1_3_2_1_7_1","unstructured":"GB\/T 38244-2019 \u201cGeneral principles of robot safety\u201d.  GB\/T 38244-2019 \u201cGeneral principles of robot safety\u201d."},{"issue":"03","key":"e_1_3_2_1_8_1","first-page":"87","article-title":"Research on safety evaluation method of robot system based on extension analytic hierarchy process","volume":"565","author":"Liu X","year":"2021","unstructured":"Liu X , Wang S , Yu H P , \u201c Research on safety evaluation method of robot system based on extension analytic hierarchy process ,\u201d Modular Machine Tool & Automatic Manufacturing Technique , 2021 , 565 ( 03 ): 87 - 89 +93. Liu X, Wang S, Yu H P, \u201cResearch on safety evaluation method of robot system based on extension analytic hierarchy process,\u201d Modular Machine Tool & Automatic Manufacturing Technique, 2021, 565(03): 87-89+93.","journal-title":"Modular Machine Tool & Automatic Manufacturing Technique"},{"key":"e_1_3_2_1_9_1","first-page":"2023","article-title":"Optimization of railway route scheme based on combinatorial weighted two-dimensional cloud model","volume":"1","author":"Zhao C S","unstructured":"Zhao C S . \u201c Optimization of railway route scheme based on combinatorial weighted two-dimensional cloud model ,\u201d Railway Standard Design : 1-9 [ 2023 - 2003 -13]. Zhao C S. \u201cOptimization of railway route scheme based on combinatorial weighted two-dimensional cloud model,\u201d Railway Standard Design:1-9[2023-03-13].","journal-title":"Railway Standard Design"},{"issue":"06","key":"e_1_3_2_1_10_1","first-page":"117","article-title":"Assessment for levee engineering based on a two-dimensional cloud model with combination weighting","volume":"42","author":"Guo J","year":"2022","unstructured":"Guo J , Gu C S , He J. \u201c Assessment for levee engineering based on a two-dimensional cloud model with combination weighting ,\u201d Advances in Science and Technology of Water Resources , 2022 , 42 ( 06 ): 117 - 122 . Guo J, Gu C S, He J. \u201cAssessment for levee engineering based on a two-dimensional cloud model with combination weighting,\u201d Advances in Science and Technology of Water Resources, 2022, 42(06): 117-122.","journal-title":"Advances in Science and Technology of Water Resources"},{"key":"e_1_3_2_1_11_1","first-page":"2022","article-title":"Study on ecological risk evaluation and optimum selection of desert expressway schemes based on the two-dimensional cloud model","author":"Han F","year":"2022","unstructured":"Han F , Liu Z B , Li L Y , Yin W H , \u201c Study on ecological risk evaluation and optimum selection of desert expressway schemes based on the two-dimensional cloud model ,\u201d Mathematical Problems in Engineering , 2022 , 2022 . Han F, Liu Z B, Li L Y, Yin W H, \u201cStudy on ecological risk evaluation and optimum selection of desert expressway schemes based on the two-dimensional cloud model,\u201d Mathematical Problems in Engineering, 2022, 2022.","journal-title":"Mathematical Problems in Engineering"},{"key":"e_1_3_2_1_12_1","volume-title":"IOP Conference Series: Earth and Environmental Science","author":"Jing C W","year":"2020","unstructured":"Jing C W , Wang J C , Zhang X X . \u201c Evaluation method of highway safety maintenance based on the two-dimensional cloud model considering equilibrium ,\u201d IOP Conference Series: Earth and Environmental Science , 2020 , 587(1). Jing C W, Wang J C, Zhang X X. \u201cEvaluation method of highway safety maintenance based on the two-dimensional cloud model considering equilibrium,\u201d IOP Conference Series: Earth and Environmental Science, 2020, 587(1)."},{"key":"e_1_3_2_1_13_1","unstructured":"GB\/T 16856-2015 \u201cSafety of machinery\u2013risk assessment\u2013practical guidance and examples of methods\u201d.  GB\/T 16856-2015 \u201cSafety of machinery\u2013risk assessment\u2013practical guidance and examples of methods\u201d."}],"event":{"name":"CNIOT'23: 2023 4th International Conference on Computing, Networks and Internet of Things","acronym":"CNIOT'23","location":"Xiamen China"},"container-title":["Proceedings of the 2023 4th International Conference on Computing, Networks and Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603781.3603832","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603781.3603832","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:10Z","timestamp":1750178830000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603781.3603832"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,26]]},"references-count":13,"alternative-id":["10.1145\/3603781.3603832","10.1145\/3603781"],"URL":"https:\/\/doi.org\/10.1145\/3603781.3603832","relation":{},"subject":[],"published":{"date-parts":[[2023,5,26]]},"assertion":[{"value":"2023-07-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}