{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T08:16:33Z","timestamp":1771661793474,"version":"3.50.1"},"reference-count":31,"publisher":"Zhejiang University Press","issue":"8","license":[{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front Inform Technol Electron Eng"],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1631\/fitee.2400251","type":"journal-article","created":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T03:33:27Z","timestamp":1757648007000},"page":"1279-1292","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Output difference feedback and system benefit control based dynamic heterogeneous redundancy architecture","\u57fa\u4e8e\u8f93\u51fa\u5dee\u5f02\u53cd\u9988\u548c\u7cfb\u7edf\u6548\u76ca\u63a7\u5236\u7684\u52a8\u6001\u5f02\u6784\u5197\u4f59\u67b6\u6784"],"prefix":"10.1631","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-9026-0133","authenticated-orcid":false,"given":"Sisi","family":"Shao","sequence":"first","affiliation":[]},{"given":"Zhibo","family":"He","sequence":"additional","affiliation":[]},{"given":"Shangdong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Weili","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Fei","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Fukang","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Zuo","sequence":"additional","affiliation":[]},{"given":"Longfei","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Yukun","family":"Niu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7019-3942","authenticated-orcid":false,"given":"Yimu","family":"Ji","sequence":"additional","affiliation":[]}],"member":"635","published-online":{"date-parts":[[2025,9,12]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2019.2963791"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/itoec53115.2022.9734532"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2017.0086"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2024.3387725"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2020.3029076"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2021.3074917"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2024.3406602"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-019-01473-6"},{"issue":"4","key":"ref9","first-page":"193","article-title":"Competitive arbitration model for mimic defense system","volume":"44","author":"Lin","year":"2018","journal-title":"Comput Eng"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2023.3241057"},{"issue":"7","key":"ref11","first-page":"188","article-title":"Heterogeneous redundancies scheduling algorithm for mimic security defense","volume":"39","author":"Liu","year":"2018","journal-title":"J Commun"},{"issue":"2","key":"ref12","first-page":"8","article-title":"A multi-index mimic voting algorithm based on improved AHP-FCE model","volume":"44","author":"Lu","year":"2021","journal-title":"J Beijing Univ Posts Telecommun"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/cc.2017.8107630"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1080\/20403313.2023.2243712"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103685"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1049\/cje.2020.05.001"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-022-3635-2"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.23919\/cje.2021.00.289"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-020-3008-1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1631\/fitee.1800621"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2020.102661"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2022.3210139"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1117\/12.2660317"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.eng.2021.05.015"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-021-3379-2"},{"issue":"3","key":"ref26","first-page":"122","article-title":"Defense-enhanced dynamic heterogeneous redundancy architecture based on executor partition","volume":"42","author":"Wu","year":"2021","journal-title":"J Commun"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/autocom60220.2024.10486073"},{"issue":"5","key":"ref28","first-page":"1437","article-title":"Multi executor decision algorithm and scheduling algorithm based on differential distance feedback","volume":"39","author":"Yu","year":"2022","journal-title":"Appl Res Comput"},{"issue":"2","key":"ref29","first-page":"564","article-title":"Quantification method for heterogeneity on web server with mimic construction","volume":"31","author":"Zhang","year":"2020","journal-title":"J Softw"},{"issue":"4","key":"ref30","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1016\/j.dcan.2021.07.006","article-title":"Dynamic defenses in cyber security: techniques, methods and challenges","volume":"8","author":"Zheng","year":"2022","journal-title":"Digit Commun Netw"},{"issue":"5","key":"ref31","first-page":"179","article-title":"Research progress of mimic multi-execution scheduling algorithm","volume":"42","author":"Zhu","year":"2021","journal-title":"J Commun"}],"container-title":["Frontiers of Information Technology &amp; Electronic Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.2400251.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1631\/FITEE.2400251\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.2400251.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:34:04Z","timestamp":1771659244000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1631\/FITEE.2400251"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8]]},"references-count":31,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["2067"],"URL":"https:\/\/doi.org\/10.1631\/fitee.2400251","relation":{},"ISSN":["2095-9184","2095-9230"],"issn-type":[{"value":"2095-9184","type":"print"},{"value":"2095-9230","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8]]},"assertion":[{"value":"2 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 October 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"All the authors declare that they have no conflict of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}