{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:17:37Z","timestamp":1771658257769,"version":"3.50.1"},"reference-count":34,"publisher":"Zhejiang University Press","issue":"8","license":[{"start":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:00:00Z","timestamp":1656374400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:00:00Z","timestamp":1656374400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front Inform Technol Electron Eng"],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1631\/fitee.2100418","type":"journal-article","created":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T07:06:12Z","timestamp":1656399972000},"page":"1142-1157","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":55,"title":["Mutually trustworthy human-machine knowledge automation and hybrid augmented intelligence: mechanisms and applications of cognition, management, and control for complex systems","\u4eba\u673a\u4e92\u4fe1\u7684\u77e5\u8bc6\u81ea\u52a8\u5316\u4e0e\u6df7\u5408\u589e\u5f3a\u667a\u80fd: \u590d\u6742\u7cfb\u7edf\u8ba4\u77e5\u7ba1\u63a7\u673a\u5236\u53ca\u5176\u5e94\u7528"],"prefix":"10.1631","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9185-3989","authenticated-orcid":false,"given":"Fei-Yue","family":"Wang","sequence":"first","affiliation":[]},{"given":"Jianbo","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Guangquan","family":"Bu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6908-2671","authenticated-orcid":false,"given":"Jun Jason","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"635","published-online":{"date-parts":[[2022,6,28]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780198513940.001.0001"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.17775\/cseejpes.2020.07070"},{"issue":"11","key":"ref3","first-page":"17","article-title":"Deep reinforcement learning control policy extraction based on weighted oblique decision tree","volume":"19","author":"Dai","year":"2021a","journal-title":"Electr Power Inform Commun Technol"},{"issue":"6","key":"ref4","first-page":"184","article-title":"Intelligent diagnosis and auxiliary decision of power system secondary equipment based on functional defect text","volume":"41","author":"Dai","year":"2021b","journal-title":"Electr Power Autom Equip"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1126\/science.284.5411.79"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1088\/0031-9112\/28\/9\/027"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/drpt.2008.4523595"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33299-9_1"},{"key":"ref9","volume-title":"Hidden Order: How Adaptation Builds Complexity","author":"Holland","year":"1995"},{"key":"ref10","volume-title":"The Theory, Method & Technique for Complex System Modeling","author":"Liu","year":"2008"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1175\/1520-0469(1963)020<0130:dnf>2.0.co;2"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.1989.0038"},{"key":"ref13","volume-title":"Complex Networks: a Networking and Signal Processing Perspective","author":"Manoj","year":"2018"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1515\/9781400835522"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-663-01511-6_10"},{"key":"ref16","volume-title":"Grid2Op","year":"2021"},{"key":"ref17","volume-title":"Introduction to the Modeling and Analysis of Complex Systems","author":"Sayama","year":"2015"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref19","first-page":"1","article-title":"Prsobabilistic security evaluation of bulk power system considering cascading outages","volume-title":"Int Conf on Power System Technology","author":"Song","year":"2006"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(76)90030-3"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780198821939.001.0001"},{"key":"ref22","volume-title":"Electric System Operations: Evolving to the Modern Grid","author":"Vadari","year":"2012"},{"key":"ref23","volume-title":"General System Theory","author":"Von Bertalanffy","year":"1968"},{"issue":"5","key":"ref24","first-page":"485","article-title":"Parallel system methods for management and control of complex systems","volume":"19","author":"Wang","year":"2004","journal-title":"Contr Dec"},{"key":"ref25","volume-title":"Intelligent Control Method and Application","author":"Wang","year":"2020"},{"issue":"12","key":"ref26","first-page":"2061","article-title":"Internet of Minds: the concept, issues and platforms","volume":"43","author":"Wang","year":"2017","journal-title":"Acta Autom Sin"},{"issue":"9","key":"ref27","first-page":"1606","article-title":"Industrial Internet of Minds: concept, technology and application","volume":"44","author":"Wang","year":"2018","journal-title":"Acta Autom Sin"},{"key":"ref28","volume-title":"An Introduction to Human Factors Engineering","author":"Wickens","year":"1998"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/11810.001.0001"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.17775\/cseejpes.2020.07090"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/tcss.2021.3096824"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/DTPI52967.2021.9540198"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/EI250167.2020.9347303"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1631\/fitee.1700053"}],"container-title":["Frontiers of Information Technology &amp; Electronic Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.2100418.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1631\/FITEE.2100418\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.2100418.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T06:58:21Z","timestamp":1771657101000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1631\/FITEE.2100418"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,28]]},"references-count":34,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2022,8]]}},"alternative-id":["1823"],"URL":"https:\/\/doi.org\/10.1631\/fitee.2100418","relation":{},"ISSN":["2095-9184","2095-9230"],"issn-type":[{"value":"2095-9184","type":"print"},{"value":"2095-9230","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,28]]},"assertion":[{"value":"2 September 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 October 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 June 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Fei-Yue WANG, Jianbo GUO, Guangquan BU, and Jun Jason ZHANG declare that they have no conflict of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethics guidelines"}}]}}