{"id":"https://openalex.org/W2972364497","doi":"https://doi.org/10.1109/access.2019.2940822","title":"Quantitative Assessment of Wireless Connected Intelligent Robot Swarms Network Security Situation","display_name":"Quantitative Assessment of Wireless Connected Intelligent Robot Swarms Network Security Situation","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2972364497","doi":"https://doi.org/10.1109/access.2019.2940822","mag":"2972364497"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2940822","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08834820.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08834820.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081140857","display_name":"Weihong Han","orcid":"https://orcid.org/0000-0001-9997-1509"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"funder","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weihong Han","raw_affiliation_strings":["Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056608045","display_name":"Zhihong Tian","orcid":"https://orcid.org/0000-0002-9409-5359"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"funder","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhihong Tian","raw_affiliation_strings":["Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013474424","display_name":"Zizhong Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"funder","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zizhong Huang","raw_affiliation_strings":["Computer School, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"Computer School, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032751885","display_name":"Dongqiu Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"funder","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongqiu Huang","raw_affiliation_strings":["Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101605746","display_name":"Yan Jia","orcid":"https://orcid.org/0000-0002-1233-1507"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"funder","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yan Jia","raw_affiliation_strings":["Computer School, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"Computer School, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":1.352,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":14,"citation_normalized_percentile":{"value":0.912693,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":88,"max":89},"biblio":{"volume":"7","issue":null,"first_page":"134293","last_page":"134300"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9948,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9755,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.78196216},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.5217905},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4556265},{"id":"https://openalex.org/C14982408","wikidata":"https://www.wikidata.org/wiki/Q11006334","display_name":"Network Access Control","level":4,"score":0.4342652},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4312747},{"id":"https://openalex.org/C90509273","wikidata":"https://www.wikidata.org/wiki/Q11012","display_name":"Robot","level":2,"score":0.4299246},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.42954132},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.42171532},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.33713555},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.32317775},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.13461608},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.101819366},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.10159421},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2940822","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08834820.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":false,"landing_page_url":"https://doaj.org/article/d32a29a20e624e6a9b216a84f359ab9d","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2940822","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08834820.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"U1636215"},{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61972106"}],"datasets":[],"versions":[],"referenced_works_count":32,"referenced_works":["https://openalex.org/W111228695","https://openalex.org/W1631951852","https://openalex.org/W1752315353","https://openalex.org/W1968736168","https://openalex.org/W1977958153","https://openalex.org/W1992806376","https://openalex.org/W2033310064","https://openalex.org/W2046245732","https://openalex.org/W2061361060","https://openalex.org/W2069437351","https://openalex.org/W2080765376","https://openalex.org/W2104000715","https://openalex.org/W2335999708","https://openalex.org/W2476429474","https://openalex.org/W2480418144","https://openalex.org/W2484365341","https://openalex.org/W2508015754","https://openalex.org/W2532192503","https://openalex.org/W2541841318","https://openalex.org/W2557513839","https://openalex.org/W2736937187","https://openalex.org/W2789067871","https://openalex.org/W2791501391","https://openalex.org/W2808451969","https://openalex.org/W2808681425","https://openalex.org/W2894383926","https://openalex.org/W2907369926","https://openalex.org/W2918891759","https://openalex.org/W2931991156","https://openalex.org/W2949341542","https://openalex.org/W2963273426","https://openalex.org/W825007691"],"related_works":["https://openalex.org/W3210072418","https://openalex.org/W3015787821","https://openalex.org/W2389055262","https://openalex.org/W2382223981","https://openalex.org/W2367880870","https://openalex.org/W2366195220","https://openalex.org/W2364612064","https://openalex.org/W2348947824","https://openalex.org/W2020006617","https://openalex.org/W1601783894"],"abstract_inverted_index":{"The":[0],"wirelessly":[1],"connected":[2,39,55,88,178,256],"intelligent":[3,40,56,89,179,257],"robot":[4,41,57,90,180,258],"swarms":[5,42,58,91,181,259],"are":[6,27,241,289],"more":[7,28],"vulnerable":[8],"to":[9,13,101,131,198,211],"be":[10,264],"attacked":[11,26],"due":[12],"their":[14],"unstable":[15],"network":[16,43,59,75,92,116,154,182,190,215,225,238,260,272],"connection":[17],"and":[18,21,66,81,96,98,111,145,164,201,205,217,276,285],"limited":[19],"resources,":[20],"the":[22,34,51,115,132,140,193,206,214,219,223,231,237,251,268,280,286],"consequences":[23],"of":[24,37,53,114,139,152,176,227,233,236,254,270,293],"being":[25],"serious":[29],"than":[30,291],"other":[31,294],"systems.":[32],"Therefore,":[33,84],"quantitative":[35,102,149,173,234,252],"assessment":[36,150,174,235,253],"wireless":[38,54,87,177,255],"security":[44,60,76,93,117,155,183,239,261,273],"situation":[45,156,184,240,262],"is":[46,119,127,196,209,283],"very":[47,121],"important.":[48],"Factors":[49],"determining":[50],"state":[52,118],"have":[61],"characteristics":[62,269],"such":[63,104],"as":[64,160,162],"mass":[65],"diversity,":[67],"which":[68],"constantly":[69],"evolve":[70],"with":[71,157,244],"time.":[72],"In":[73,167],"fact,":[74],"measurement":[77,94],"has":[78],"multi-level,":[79],"multi-dimensional,":[80],"multi-granularity":[82],"characteristics.":[83,166],"properly":[85],"selecting":[86],"parameters":[95],"reducing":[97],"converging":[99],"them":[100],"values":[103],"that":[105,250,279],"they":[106],"can":[107,263],"enable":[108],"a":[109,120,128,148,153,172,187,271],"true":[110],"objective":[112],"reflection":[113],"challenging":[122],"problem.":[123],"However,":[124],"deep":[125,224,295],"learning":[126,296],"novel":[129],"solution":[130],"abovementioned":[133],"problems;":[134],"its":[135],"algorithm":[136],"gets":[137],"rid":[138],"dependence":[141],"on":[142,186],"feature":[143],"engineering":[144],"automatically":[146],"builds":[147],"model":[151],"dynamic":[158],"adjustment":[159],"well":[161],"self-adaptive":[163],"self-learning":[165],"this":[168],"study,":[169],"we":[170],"propose":[171],"method":[175],"based":[185],"convolutional":[188,194],"neural":[189],"(CNN).":[191],"Generally,":[192],"layer":[195,208],"used":[197,210],"locally":[199],"detect":[200],"deeply":[202],"extract":[203],"features,":[204],"pooling":[207],"rapidly":[212],"shrink":[213],"scale":[216],"highlight":[218],"summary":[220],"features.":[221],"Using":[222],"structure":[226],"several":[228],"hidden":[229],"layers,":[230],"results":[232,248,288],"highly":[242],"consistent":[243],"expert":[245],"experience.":[246],"Experimental":[247],"show":[249],"realized":[265],"by":[266],"combining":[267],"index":[274],"system":[275],"CNN.":[277],"Note":[278],"accuracy":[281],"rate":[282],"95%,":[284],"calculation":[287],"better":[290],"those":[292],"models.":[297]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2972364497","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1}],"updated_date":"2025-04-20T13:38:41.944327","created_date":"2019-09-19"}