{"id":"https://openalex.org/W2965657135","doi":"https://doi.org/10.1109/dessert.2019.8770054","title":"Secure Formation Communication Method Based on the Opportunity Theory","display_name":"Secure Formation Communication Method Based on the Opportunity Theory","publication_year":2019,"publication_date":"2019-06-01","ids":{"openalex":"https://openalex.org/W2965657135","doi":"https://doi.org/10.1109/dessert.2019.8770054","mag":"2965657135"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/dessert.2019.8770054","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103291009","display_name":"Bo Ju Jiang","orcid":null},"institutions":[],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Jiang","raw_affiliation_strings":["East-China Research Institute of Computer Technology, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"East-China Research Institute of Computer Technology, Shanghai, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100507821","display_name":"Xinjun Du","orcid":null},"institutions":[],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinjun Du","raw_affiliation_strings":["East-China Research Institute of Computer Technology, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"East-China Research Institute of Computer Technology, Shanghai, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074480258","display_name":"Yuxiao Yang","orcid":"https://orcid.org/0000-0001-9208-7956"},"institutions":[{"id":"https://openalex.org/I9842412","display_name":"Nanjing University of Aeronautics and Astronautics","ror":"https://ror.org/01scyh794","country_code":"CN","type":"funder","lineage":["https://openalex.org/I9842412"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuxiao Yang","raw_affiliation_strings":["Nanjing University of Aeronautics and Astronautics, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Nanjing University of Aeronautics and Astronautics, Nanjing, China","institution_ids":["https://openalex.org/I9842412"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":61},"biblio":{"volume":null,"issue":null,"first_page":"144","last_page":"148"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9974,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9974,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9972,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9972,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/communications-security","display_name":"Communications security","score":0.681669},{"id":"https://openalex.org/keywords/communication-theory","display_name":"Communication Theory","score":0.47304767}],"concepts":[{"id":"https://openalex.org/C151423352","wikidata":"https://www.wikidata.org/wiki/Q5154228","display_name":"Communications security","level":3,"score":0.681669},{"id":"https://openalex.org/C101765175","wikidata":"https://www.wikidata.org/wiki/Q577764","display_name":"Communications system","level":2,"score":0.66967905},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6533885},{"id":"https://openalex.org/C3716254","wikidata":"https://www.wikidata.org/wiki/Q83966","display_name":"Communication theory","level":2,"score":0.47304767},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.43292198},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.33819264},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3000123},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.17428082},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.10503423},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.092017055},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/dessert.2019.8770054","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","score":0.52,"display_name":"Affordable and clean energy"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":16,"referenced_works":["https://openalex.org/W1978572848","https://openalex.org/W1995260238","https://openalex.org/W2008745641","https://openalex.org/W2012723460","https://openalex.org/W2101090782","https://openalex.org/W2104911317","https://openalex.org/W2142802625","https://openalex.org/W2155592080","https://openalex.org/W2162650664","https://openalex.org/W2244359298","https://openalex.org/W2278852559","https://openalex.org/W2289111411","https://openalex.org/W2673654669","https://openalex.org/W2760949039","https://openalex.org/W4234390533","https://openalex.org/W4241732585"],"related_works":["https://openalex.org/W4309710663","https://openalex.org/W4298844345","https://openalex.org/W335838002","https://openalex.org/W3123257232","https://openalex.org/W3088635177","https://openalex.org/W3006305412","https://openalex.org/W2116865742","https://openalex.org/W2092253419","https://openalex.org/W2072857939","https://openalex.org/W1560558670"],"abstract_inverted_index":{"In":[0],"order":[1],"to":[2],"improve":[3],"the":[4,31,35,55,63],"security":[5,57],"of":[6,10,38,45,58,65],"formation":[7,14,40,60,66],"communication":[8,15,36,56],"system":[9],"aircraft,":[11],"a":[12],"new":[13],"method":[16,53],"based":[17],"on":[18],"opportunity":[19],"theory":[20],"is":[21],"proposed.":[22],"This":[23],"paper":[24],"assessed":[25],"radiation":[26,32],"power":[27],"and":[28,34],"topological":[29],"information,":[30],"energy":[33],"topology":[37],"flight":[39,59],"are":[41],"optimized":[42],"by":[43],"means":[44],"opportunistic":[46],"communication.":[47,67],"Simulation":[48],"results":[49],"show":[50],"that":[51],"this":[52],"improves":[54],"while":[61],"ensuring":[62],"performance":[64]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2965657135","counts_by_year":[],"updated_date":"2025-02-03T13:54:13.805591","created_date":"2019-08-13"}