{"id":"https://openalex.org/W4406610708","doi":"https://doi.org/10.1109/jiot.2025.3531789","title":"KNIGCN: Key Node Identification in UAV Swarm Networks Using a Graph Convolutional Network","display_name":"KNIGCN: Key Node Identification in UAV Swarm Networks Using a Graph Convolutional Network","publication_year":2025,"publication_date":"2025-01-20","ids":{"openalex":"https://openalex.org/W4406610708","doi":"https://doi.org/10.1109/jiot.2025.3531789"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2025.3531789","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3531789","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5115946932","display_name":"Qixun Ai","orcid":null},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qixun Ai","raw_affiliation_strings":["College of Information and Communication Engineering, Harbin Engineering University, Harbin, China"],"affiliations":[{"raw_affiliation_string":"College of Information and Communication Engineering, Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082008959","display_name":"Changbo Hou","orcid":"https://orcid.org/0000-0002-6421-3481"},"institutions":[{"id":"https://openalex.org/I890469752","display_name":"Ministry of Industry and Information Technology","ror":"https://ror.org/0385nmy68","country_code":"CN","type":"government","lineage":["https://openalex.org/I890469752"]},{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Changbo Hou","raw_affiliation_strings":["College of Information and Communication Engineering and the Key Laboratory of Advanced Marine Communication and Information Technology, Ministry of Industry and Information Technology, Harbin Engineering University, Harbin, China","Ministry of Industry and Information Technology, College of Information and Communication Engineering and the Key Laboratory of Advanced Marine Communication and Information Technology, Harbin Engineering University, Harbin, China"],"affiliations":[{"raw_affiliation_string":"College of Information and Communication Engineering and the Key Laboratory of Advanced Marine Communication and Information Technology, Ministry of Industry and Information Technology, Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225","https://openalex.org/I890469752"]},{"raw_affiliation_string":"Ministry of Industry and Information Technology, College of Information and Communication Engineering and the Key Laboratory of Advanced Marine Communication and Information Technology, Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225","https://openalex.org/I890469752"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049260701","display_name":"Zhichao Zhou","orcid":"https://orcid.org/0000-0001-5148-8542"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhichao Zhou","raw_affiliation_strings":["College of Information and Communication Engineering, Harbin Engineering University, Harbin, China"],"affiliations":[{"raw_affiliation_string":"College of Information and Communication Engineering, Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021998562","display_name":"Xiangyu Wu","orcid":"https://orcid.org/0000-0003-2055-5890"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangyu Wu","raw_affiliation_strings":["College of Information and Communication Engineering, Harbin Engineering University, Harbin, China"],"affiliations":[{"raw_affiliation_string":"College of Information and Communication Engineering, Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003529118","display_name":"Zhen Song","orcid":"https://orcid.org/0009-0004-8737-2727"},"institutions":[{"id":"https://openalex.org/I151727225","display_name":"Harbin Engineering University","ror":"https://ror.org/03x80pn82","country_code":"CN","type":"education","lineage":["https://openalex.org/I151727225"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Song","raw_affiliation_strings":["College of Information and Communication Engineering, Harbin Engineering University, Harbin, China"],"affiliations":[{"raw_affiliation_string":"College of Information and Communication Engineering, Harbin Engineering University, Harbin, China","institution_ids":["https://openalex.org/I151727225"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5115946932"],"corresponding_institution_ids":["https://openalex.org/I151727225"],"apc_list":null,"apc_paid":null,"fwci":17.4023,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.9852938,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":"12","issue":"11","first_page":"16227","last_page":"16242"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11133","display_name":"UAV Applications and Optimization","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9861999750137329,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10331","display_name":"Video Surveillance and Tracking Methods","score":0.9855999946594238,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8274936676025391},{"id":"https://openalex.org/keywords/convolution","display_name":"Convolution (computer science)","score":0.6019927859306335},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5807846784591675},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5441360473632812},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5330718159675598},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.49521222710609436},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.36104220151901245},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.338082492351532},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.33583760261535645},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.18072187900543213},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10487872362136841},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.0835416316986084}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8274936676025391},{"id":"https://openalex.org/C45347329","wikidata":"https://www.wikidata.org/wiki/Q5166604","display_name":"Convolution (computer science)","level":3,"score":0.6019927859306335},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5807846784591675},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5441360473632812},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5330718159675598},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.49521222710609436},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.36104220151901245},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.338082492351532},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.33583760261535645},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.18072187900543213},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10487872362136841},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.0835416316986084},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3531789","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3531789","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4718972896","display_name":null,"funder_award_id":"U23A20271","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W1931400479","https://openalex.org/W1978699935","https://openalex.org/W1992250165","https://openalex.org/W2070449754","https://openalex.org/W2133131640","https://openalex.org/W2185516019","https://openalex.org/W2271521560","https://openalex.org/W2320534365","https://openalex.org/W2327622231","https://openalex.org/W2351830081","https://openalex.org/W2786782150","https://openalex.org/W2792824988","https://openalex.org/W2796063520","https://openalex.org/W2811426411","https://openalex.org/W2895177043","https://openalex.org/W2907962963","https://openalex.org/W2964015378","https://openalex.org/W2964895634","https://openalex.org/W2998547369","https://openalex.org/W3014362800","https://openalex.org/W3030859533","https://openalex.org/W3043948261","https://openalex.org/W3111296254","https://openalex.org/W3166984733","https://openalex.org/W3185578060","https://openalex.org/W3199911255","https://openalex.org/W4229075624","https://openalex.org/W4281289204","https://openalex.org/W4384699129","https://openalex.org/W4385652208","https://openalex.org/W4388180044","https://openalex.org/W4389817884","https://openalex.org/W4391114532","https://openalex.org/W6682889407"],"related_works":["https://openalex.org/W2898732673","https://openalex.org/W2410053581","https://openalex.org/W2383658677","https://openalex.org/W3123203398","https://openalex.org/W4387838477","https://openalex.org/W1972473893","https://openalex.org/W2466435674","https://openalex.org/W2765200542","https://openalex.org/W2067193074","https://openalex.org/W2182785089"],"abstract_inverted_index":{"In":[0],"the":[1,43,66,89,116,133,158,171,183,196,202,227],"field":[2],"of":[3,5,45,92,122,136,150,163,179,205,215,231],"Internet":[4],"Things":[6],"(IoT),":[7],"uncrewed":[8],"aerial":[9],"vehicle":[10],"(UAV)":[11],"swarms":[12],"are":[13,51,118],"widely":[14],"used":[15,130],"to":[16,21,31,42,53,131,144],"assist":[17],"IoT":[18,34],"communication":[19,106],"due":[20,41],"their":[22],"simple":[23],"deployment,":[24],"high":[25,28],"mobility":[26],"and":[27,37,56,108,125,139,182,229],"cost":[29],"effectiveness":[30],"help":[32],"improve":[33,201],"network":[35,67,82,95,104,117,193,234],"coverage":[36],"topological":[38],"flexibility.":[39],"However,":[40],"openness":[44],"UAV":[46,49,93,216,232],"swarm":[47,233],"network,":[48],"nodes":[50,185,207],"vulnerable":[52],"malicious":[54],"attacks":[55],"fail,":[57],"especially":[58],"some":[59],"key":[60,74,151,164,184,206],"nodes,":[61],"which":[62],"will":[63],"seriously":[64],"degrade":[65],"performance.":[68,194],"To":[69],"solve":[70],"this":[71],"problem,":[72],"a":[73,147,175,188],"node":[75,112,138,165,180],"identification":[76,203],"model":[77,91,128,159],"based":[78,99],"on":[79,100,192],"graph":[80],"convolutional":[81],"(GCN),":[83],"named":[84],"KNIGCN,":[85],"is":[86,96,129],"proposed.":[87],"Specifically,":[88],"topology":[90,214],"cluster":[94,217],"first":[97],"built":[98],"flying":[101],"ad":[102],"hoc":[103],"(FANET)":[105],"architecture":[107],"Dijkstra\u2019s":[109],"algorithm,":[110],"then":[111],"criticality":[113,134],"labels":[114],"in":[115,208],"made":[119],"by":[120],"means":[121],"traffic":[123],"statistics,":[124],"finally":[126],"KNIGCN":[127],"predict":[132],"scores":[135],"each":[137],"sort":[140],"them":[141],"so":[142],"as":[143],"screen":[145],"out":[146],"certain":[148],"number":[149],"nodes.":[152],"The":[153],"experimental":[154],"results":[155],"show":[156],"that":[157],"has":[160],"good":[161],"performance":[162],"identification.":[166],"Compared":[167],"with":[168],"traditional":[169],"methods,":[170],"proposed":[172,197],"method":[173],"makes":[174],"more":[176,189],"reasonable":[177],"judgment":[178],"criticality,":[181],"identified":[186],"have":[187],"important":[190],"impact":[191],"Moreover,":[195],"scheme":[198,224],"can":[199,220],"effectively":[200],"speed":[204],"large-scale,":[209],"complex":[210],"or":[211],"dynamically":[212],"changing":[213],"networks.":[218],"It":[219],"provide":[221],"an":[222],"effective":[223],"for":[225],"maintaining":[226],"security":[228],"stability":[230],"communication.":[235]},"counts_by_year":[{"year":2025,"cited_by_count":5}],"updated_date":"2026-02-25T23:00:34.991745","created_date":"2025-01-21T00:00:00"}
