{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:06:47Z","timestamp":1750309607725,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T00:00:00Z","timestamp":1729209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,18]]},"DOI":"10.1145\/3711129.3711173","type":"proceedings-article","created":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T12:51:16Z","timestamp":1740055876000},"page":"244-249","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on Collaborative Aerial Detection Threat Assessment Method Based on Intuitive Fuzzy Reasoning and Three-way Decision"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0185-3289","authenticated-orcid":false,"given":"Huan","family":"Zhou","sequence":"first","affiliation":[{"name":"Aviation Engineering School, Air Force Engineering University, Xi'an, Shaanxi, China"},{"name":"Research Center of Unmanned System Strategy Development, Northwestern Polytechnical University, Xi'an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8201-0971","authenticated-orcid":false,"given":"Xin","family":"Zhao","sequence":"additional","affiliation":[{"name":"Aviation Engineering School, Air Force Engineering University, Xi'an, Shaanxi, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-0902-8909","authenticated-orcid":false,"given":"Yue","family":"Shen","sequence":"additional","affiliation":[{"name":"Research Center of Unmanned System Strategy Development, Northwestern Polytechnical University, Xi'an, Shaanxi, China"}]}],"member":"320","published-online":{"date-parts":[[2025,2,20]]},"reference":[{"key":"e_1_3_3_1_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1978.1101793"},{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2023.3341698"},{"key":"e_1_3_3_1_3_2","first-page":"49","volume-title":"Aerospace Science and Technology","author":"Shidong Ma","year":"2017","unstructured":"Ma Shidong, Zhang Hongzhi, Yang Guoqing. 2017. Target threat level assessment based on cloud model under fuzzy and uncertain conditions in air combat simulation. Aerospace Science and Technology, 2017, 67: 49-53."},{"issue":"12","key":"e_1_3_3_1_4_2","first-page":"2357","article-title":"2020. Threat assessment of aerial combat target based on RS-CRITIC","volume":"46","author":"Aiwu Yang","year":"2020","unstructured":"Yang Aiwu, Li Zhanwu, Xu An, et al. 2020. Threat assessment of aerial combat target based on RS-CRITIC. Journal of Beijing University of Aeronautics and Astronautics, 2020, 46(12): 2357-2365.","journal-title":"Journal of Beijing University of Aeronautics and Astronautics"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3020814"},{"key":"e_1_3_3_1_6_2","volume-title":"Assessment of Aerial Target Threat Based on Genetic Algorithm Optimizing Fuzzy Recurrent Wavelet Neural Network","author":"Xia Chen","year":"2019","unstructured":"Chen Xia, Liu Zilong, Liang Hongli. 2019. Assessment of Aerial Target Threat Based on Genetic Algorithm Optimizing Fuzzy Recurrent Wavelet Neural Network. Journal of Northwestern Polytechnical University, 2019, 37(2): 424-432."},{"issue":"3","key":"e_1_3_3_1_7_2","first-page":"1","article-title":"2021","volume":"2021","author":"Yuan Cao","unstructured":"Cao Yuan, Kou Yingxin, Xu An, et al. 2021. Target Threat Assessment in Aerial Combat Based on Improved Glowworm Swarm Optimization and ELM Neural Network. International Journal of Aerospace Engineering, 2021(3): 1-19.","journal-title":"International Journal of Aerospace Engineering"},{"issue":"7","key":"e_1_3_3_1_8_2","first-page":"1459","article-title":"2022. Aerial Target Threat Assessment Method based on Deep Learning","volume":"34","author":"Huimin Chai","year":"2022","unstructured":"Chai Huimin, Zhang Yong, Li Xinyue, et al. 2022. Aerial Target Threat Assessment Method based on Deep Learning. Journal of System Simulation, 2022, 34(7): 1459-1467.","journal-title":"Journal of System Simulation"}],"event":{"name":"EITCE 2024: 2024 8th International Conference on Electronic Information Technology and Computer Engineering","acronym":"EITCE 2024","location":"Haikou Guangdong China"},"container-title":["Proceedings of the 2024 8th International Conference on Electronic Information Technology and Computer Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711129.3711173","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3711129.3711173","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:57:29Z","timestamp":1750298249000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711129.3711173"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,18]]},"references-count":8,"alternative-id":["10.1145\/3711129.3711173","10.1145\/3711129"],"URL":"https:\/\/doi.org\/10.1145\/3711129.3711173","relation":{},"subject":[],"published":{"date-parts":[[2024,10,18]]},"assertion":[{"value":"2025-02-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}