{"id":"https://openalex.org/W4387385795","doi":"https://doi.org/10.1109/tase.2023.3319334","title":"Secure Bearing-Based Target Localization for Multi-Agent Networks Against Malicious Agents","display_name":"Secure Bearing-Based Target Localization for Multi-Agent Networks Against Malicious Agents","publication_year":2023,"publication_date":"2023-10-05","ids":{"openalex":"https://openalex.org/W4387385795","doi":"https://doi.org/10.1109/tase.2023.3319334"},"language":"en","primary_location":{"id":"doi:10.1109/tase.2023.3319334","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tase.2023.3319334","pdf_url":null,"source":{"id":"https://openalex.org/S34881539","display_name":"IEEE Transactions on Automation Science and Engineering","issn_l":"1545-5955","issn":["1545-5955","1558-3783"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Automation Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049014147","display_name":"Chong\u2010Xiao Shi","orcid":"https://orcid.org/0000-0002-3878-1231"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chong-Xiao Shi","raw_affiliation_strings":["College of Information Science and Engineering, Northeastern University, Shenyang, Liaoning, China","College of Information Science and Engineering, Northeastern University, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Northeastern University, Shenyang, Liaoning, China","institution_ids":["https://openalex.org/I9224756"]},{"raw_affiliation_string":"College of Information Science and Engineering, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031737874","display_name":"Guang\u2010Hong Yang","orcid":"https://orcid.org/0000-0002-8911-0112"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]},{"id":"https://openalex.org/I185163786","display_name":"King Abdulaziz University","ror":"https://ror.org/02ma4wv74","country_code":"SA","type":"education","lineage":["https://openalex.org/I185163786"]}],"countries":["CN","SA"],"is_corresponding":false,"raw_author_name":"Guang-Hong Yang","raw_affiliation_strings":["College of Information Science and Engineering and Key Laboratory of Integrated Automation of Process Industry (Ministry of Education), Northeastern University, Shenyang, Liaoning, China","College of Information Science and Engineering and the Key Laboratory of Integrated Automation of Process Industry (Ministry of Education), Northeastern University, Shenyang, China","Department of Electrical and Computer Engineering, King Abdulaziz University, Jeddah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering and Key Laboratory of Integrated Automation of Process Industry (Ministry of Education), Northeastern University, Shenyang, Liaoning, China","institution_ids":["https://openalex.org/I9224756"]},{"raw_affiliation_string":"College of Information Science and Engineering and the Key Laboratory of Integrated Automation of Process Industry (Ministry of Education), Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, King Abdulaziz University, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I185163786"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5049014147"],"corresponding_institution_ids":["https://openalex.org/I9224756"],"apc_list":null,"apc_paid":null,"fwci":1.2037,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.8039265,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"21","issue":"4","first_page":"5812","last_page":"5825"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9276999831199646,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9075000286102295,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bearing","display_name":"Bearing (navigation)","score":0.5595753788948059},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.49883341789245605},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44110584259033203},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.40848344564437866},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3667190670967102},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.25320547819137573}],"concepts":[{"id":"https://openalex.org/C199978012","wikidata":"https://www.wikidata.org/wiki/Q1273815","display_name":"Bearing (navigation)","level":2,"score":0.5595753788948059},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.49883341789245605},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44110584259033203},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.40848344564437866},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3667190670967102},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.25320547819137573}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tase.2023.3319334","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tase.2023.3319334","pdf_url":null,"source":{"id":"https://openalex.org/S34881539","display_name":"IEEE Transactions on Automation Science and Engineering","issn_l":"1545-5955","issn":["1545-5955","1558-3783"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Automation Science and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2926331188","display_name":null,"funder_award_id":"62203096","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5053323464","display_name":null,"funder_award_id":"U1908213","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8086002158","display_name":null,"funder_award_id":"61621004","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W1979014233","https://openalex.org/W1987263538","https://openalex.org/W1995710828","https://openalex.org/W2065860562","https://openalex.org/W2071083687","https://openalex.org/W2090219750","https://openalex.org/W2094636498","https://openalex.org/W2101823128","https://openalex.org/W2108217958","https://openalex.org/W2110099156","https://openalex.org/W2129168063","https://openalex.org/W2130137998","https://openalex.org/W2130218305","https://openalex.org/W2133940231","https://openalex.org/W2135098895","https://openalex.org/W2136777038","https://openalex.org/W2158976021","https://openalex.org/W2159796097","https://openalex.org/W2161772304","https://openalex.org/W2165140188","https://openalex.org/W2167696017","https://openalex.org/W2193142622","https://openalex.org/W2304072589","https://openalex.org/W2594569362","https://openalex.org/W2768073288","https://openalex.org/W2802324011","https://openalex.org/W2803878161","https://openalex.org/W2897735485","https://openalex.org/W2900364463","https://openalex.org/W2902778604","https://openalex.org/W2902926856","https://openalex.org/W2920505407","https://openalex.org/W2942364088","https://openalex.org/W2963196424","https://openalex.org/W3033311084","https://openalex.org/W3113520686","https://openalex.org/W3132569378","https://openalex.org/W3159527824","https://openalex.org/W3161511631","https://openalex.org/W4213217764","https://openalex.org/W4220980249","https://openalex.org/W4238608674","https://openalex.org/W4252575260","https://openalex.org/W4289654478","https://openalex.org/W4312993878","https://openalex.org/W4315779569","https://openalex.org/W4320005669","https://openalex.org/W6635170509"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W2382290278","https://openalex.org/W4395014643"],"abstract_inverted_index":{"Secure":[0],"target":[1,32,62,121,189,198,245,266,279,304],"localization":[2,15,22,33,63,87,93,122,163,190,199,237,246,267,280,288,305,310],"is":[3,64,79,98,104,128,153,184,251,268,282],"a":[4,56,70,83,213],"crucial":[5],"problem":[6,34,123,191],"in":[7,19,159,192,211,219,247,291],"multi-agent":[8,36,202,214],"networks.":[9],"Most":[10],"of":[11,40,85,95,106,109,173,225,235,294],"the":[12,20,29,41,48,67,75,92,101,107,115,118,132,145,149,156,160,171,174,187,226,233,236,241,260,272,287,292],"existing":[13,161,196],"secure":[14,31,61,86,120,265,278,309],"methods":[16],"are":[17,167,204,228],"developed":[18],"distance-based":[21,162],"framework.":[23,164],"By":[24],"comparison,":[25],"this":[26,258],"paper":[27,183],"studies":[28],"bearing-based":[30,60,119,188,197,244,264,277],"for":[35,59,201,243,263,311],"networks,":[37],"where":[38,223],"some":[39,224],"agents":[42,227],"may":[43,216],"be":[44,53,217],"malicious":[45,110,295],"such":[46,307],"that":[47,91],"corresponding":[49],"bearing":[50],"measurements":[51,108],"can":[52,285],"arbitrary.":[54],"First,":[55],"quantitative":[57,261],"condition":[58,262],"characterized.":[65],"Under":[66,271],"given":[68,168,273],"condition,":[69,274],"novel":[71],"technique":[72],"named":[73],"as":[74,308],"vector":[76],"cross":[77],"product":[78],"used":[80],"to":[81,169,180],"design":[82,138],"class":[84],"algorithms,":[88],"which":[89,152,230,284],"guarantees":[90],"error":[94,102,127],"each":[96],"agent":[97],"bounded,":[99],"and":[100,136,254,313],"bound":[103],"independent":[105],"agents.":[111,296],"Moreover,":[112],"based":[113],"on":[114,140,301],"proposed":[116,175],"approach,":[117],"with":[124],"random":[125],"measurement":[126],"studied.":[129],"Note":[130],"that,":[131],"above":[133],"theoretical":[134],"analysis":[135],"algorithm":[137],"rely":[139],"an":[141,220,248,252,275],"important":[142,253],"definition,":[143],"called":[144],"cone":[146],"generated":[147],"by":[148,186],"agent\u2019s":[150],"measurement,":[151],"different":[154],"from":[155],"ring":[157],"defined":[158],"Finally,":[165],"simulations":[166],"demonstrate":[170],"effectiveness":[172],"approach.":[176],"<italic":[177],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[178],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">Note":[179],"Practitioners</i>":[181],"\u2014This":[182],"motivated":[185],"network":[193,215],"engineering.":[194],"The":[195],"approaches":[200],"networks":[203],"often":[205],"investigated":[206],"under":[207],"reliable":[208],"environment.":[209],"However,":[210],"practice,":[212],"deployed":[218],"adversarial":[221,249],"environment,":[222],"malicious,":[229],"could":[231],"deteriorate":[232],"accuracy":[234,289],"result.":[238],"Therefore,":[239],"studying":[240],"security":[242],"environment":[250],"practical":[255],"issue.":[256],"In":[257],"paper,":[259],"systematically":[269],"analyzed.":[270],"effective":[276],"approach":[281],"developed,":[283],"guarantee":[286],"even":[290],"presence":[293],"Future":[297],"research":[298],"should":[299],"focus":[300],"more":[302],"complex":[303],"scenario,":[306],"mobile":[312],"multiple":[314],"targets.":[315]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
