{"id":"https://openalex.org/W7113895890","doi":"https://doi.org/10.1145/3761668.3761690","title":"Simulation and Deduction Method for UAVs Swarm in Air-to-ground Attack Scenarios","display_name":"Simulation and Deduction Method for UAVs Swarm in Air-to-ground Attack Scenarios","publication_year":2025,"publication_date":"2025-06-13","ids":{"openalex":"https://openalex.org/W7113895890","doi":"https://doi.org/10.1145/3761668.3761690"},"language":null,"primary_location":{"id":"doi:10.1145/3761668.3761690","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3761668.3761690","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3761668.3761690","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 17th International Conference on Computer Modeling and Simulation","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3761668.3761690","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Juan Yan","orcid":"https://orcid.org/0009-0000-9561-3050"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Juan Yan","raw_affiliation_strings":["School of Machatronicl Engineer Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Machatronicl Engineer Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Juan LI","orcid":"https://orcid.org/0000-0002-9836-5125"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Juan LI","raw_affiliation_strings":["School of Machatronicl Engineer Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Machatronicl Engineer Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jie Li","orcid":"https://orcid.org/0000-0002-6077-3924"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Li","raw_affiliation_strings":["School of Machatronicl Engineer Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Machatronicl Engineer Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Chang Liu","orcid":"https://orcid.org/0009-0007-3685-7136"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chang Liu","raw_affiliation_strings":["Yangtze Delta Region Academy of Beijing Institute of Technology, Jiaxing, China"],"affiliations":[{"raw_affiliation_string":"Yangtze Delta Region Academy of Beijing Institute of Technology, Jiaxing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"last","author":{"id":null,"display_name":"Yanyi Guo","orcid":"https://orcid.org/0009-0000-7682-6667"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]},{"id":"https://openalex.org/I4210152380","display_name":"Shenzhen Technology University","ror":"https://ror.org/04qzpec27","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210152380"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yanyi Guo","raw_affiliation_strings":["Shenzhen MSU-BIT University, Shenzhen, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Shenzhen MSU-BIT University, Shenzhen, Shenzhen, China","institution_ids":["https://openalex.org/I4210152380","https://openalex.org/I180726961"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I125839683"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.74674706,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"135","last_page":"144"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13371","display_name":"Military Defense Systems Analysis","score":0.6022999882698059,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13371","display_name":"Military Defense Systems Analysis","score":0.6022999882698059,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12158","display_name":"Guidance and Control Systems","score":0.13459999859333038,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12888","display_name":"Military Strategy and Technology","score":0.034699998795986176,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/swarm-behaviour","display_name":"Swarm behaviour","score":0.8776999711990356},{"id":"https://openalex.org/keywords/offensive","display_name":"Offensive","score":0.70660001039505},{"id":"https://openalex.org/keywords/simulation-modeling","display_name":"Simulation modeling","score":0.36340001225471497},{"id":"https://openalex.org/keywords/modeling-and-simulation","display_name":"Modeling and simulation","score":0.3614000082015991},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.3091000020503998},{"id":"https://openalex.org/keywords/drone","display_name":"Drone","score":0.28949999809265137}],"concepts":[{"id":"https://openalex.org/C181335050","wikidata":"https://www.wikidata.org/wiki/Q14915018","display_name":"Swarm behaviour","level":2,"score":0.8776999711990356},{"id":"https://openalex.org/C176856949","wikidata":"https://www.wikidata.org/wiki/Q2001676","display_name":"Offensive","level":2,"score":0.70660001039505},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5347999930381775},{"id":"https://openalex.org/C44154836","wikidata":"https://www.wikidata.org/wiki/Q45045","display_name":"Simulation","level":1,"score":0.3986000120639801},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.3781999945640564},{"id":"https://openalex.org/C133731056","wikidata":"https://www.wikidata.org/wiki/Q4917288","display_name":"Control engineering","level":1,"score":0.3718999922275543},{"id":"https://openalex.org/C108215451","wikidata":"https://www.wikidata.org/wiki/Q7263963","display_name":"Simulation modeling","level":2,"score":0.36340001225471497},{"id":"https://openalex.org/C167343916","wikidata":"https://www.wikidata.org/wiki/Q6888384","display_name":"Modeling and simulation","level":2,"score":0.3614000082015991},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.3091000020503998},{"id":"https://openalex.org/C59519942","wikidata":"https://www.wikidata.org/wiki/Q650665","display_name":"Drone","level":2,"score":0.28949999809265137},{"id":"https://openalex.org/C500300565","wikidata":"https://www.wikidata.org/wiki/Q925667","display_name":"Computer simulation","level":2,"score":0.27900001406669617},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.27730000019073486},{"id":"https://openalex.org/C119487961","wikidata":"https://www.wikidata.org/wiki/Q863960","display_name":"Swarm intelligence","level":3,"score":0.25189998745918274}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3761668.3761690","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3761668.3761690","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3761668.3761690","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 17th International Conference on Computer Modeling and Simulation","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3761668.3761690","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3761668.3761690","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3761668.3761690","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 17th International Conference on Computer Modeling and Simulation","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7113895890.pdf","grobid_xml":"https://content.openalex.org/works/W7113895890.grobid-xml"},"referenced_works_count":6,"referenced_works":["https://openalex.org/W1982098782","https://openalex.org/W2034838419","https://openalex.org/W2128364681","https://openalex.org/W2167340365","https://openalex.org/W3156089158","https://openalex.org/W3198838862"],"related_works":[],"abstract_inverted_index":{"In":[0],"the":[1,11,20,50,73,111,117,120,135],"scenario":[2],"of":[3,14,76,93,119,138],"breaking":[4],"through":[5],"ground":[6,26,53,142],"air":[7],"defense":[8],"systems":[9],"using":[10],"coordinated":[12],"operation":[13],"UAV":[15,23,51,102,139],"swarm":[16,24,52,140],"in":[17],"attack-defense":[18],"confrontations,":[19],"interaction":[21],"between":[22],"and":[25,36,42,66,104,108,123],"defensive":[27],"forces":[28],"is":[29,88,126],"highly":[30],"complex.":[31],"This":[32,45,128],"demands":[33],"advanced":[34],"pre-research":[35],"imposes":[37],"higher":[38],"requirements":[39],"on":[40,48,110,114],"simulation":[41,56,60,94,106,122],"deduction":[43,124],"methods.":[44],"paper":[46],"focuses":[47],"improving":[49],"attack":[54,143],"operational":[55,81],"system,":[57],"constructing":[58],"high-fidelity":[59],"models":[61],"for":[62,90,101,133],"both":[63,77],"opposing":[64],"sides,":[65],"designing":[67,97],"AI-driven":[68],"behavior":[69,74],"trees":[70],"to":[71],"control":[72],"logic":[75],"parties.":[78],"Additionally,":[79],"an":[80,130],"effectiveness":[82],"evaluation":[83,115],"system":[84],"with":[85],"damage":[86],"assessment":[87],"established":[89],"systematic":[91],"analysis":[92],"results.":[95],"By":[96],"various":[98],"offensive":[99],"tactics":[100,112],"swarms":[103],"conducting":[105],"exercises,":[107],"iterating":[109],"based":[113],"results,":[116],"feasibility":[118],"proposed":[121],"method":[125],"validated.":[127],"provides":[129],"effective":[131],"approach":[132],"researching":[134],"tactical":[136],"simulations":[137],"autonomous":[141],"operations.":[144]},"counts_by_year":[],"updated_date":"2026-03-13T14:20:09.374765","created_date":"2025-12-11T00:00:00"}
