<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article article-type="research-article" dtd-version="2.3" xml:lang="EN" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Phys.</journal-id>
<journal-title>Frontiers in Physics</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Phys.</abbrev-journal-title>
<issn pub-type="epub">2296-424X</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">821321</article-id>
<article-id pub-id-type="doi">10.3389/fphy.2022.821321</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Physics</subject>
<subj-group>
<subject>Original Research</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>UAV Swarm Resilience Assessment Considering Load Balancing</article-title>
<alt-title alt-title-type="left-running-head">Zhang et&#x20;al.</alt-title>
<alt-title alt-title-type="right-running-head">UAV Resilience Assessment Load Balancing</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname>Zhang</surname>
<given-names>Pengtao</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Wu</surname>
<given-names>Tao</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
<xref ref-type="aff" rid="aff2">
<sup>2</sup>
</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Cao</surname>
<given-names>Runhua</given-names>
</name>
<xref ref-type="aff" rid="aff2">
<sup>2</sup>
</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Li</surname>
<given-names>Zi</given-names>
</name>
<xref ref-type="aff" rid="aff3">
<sup>3</sup>
</xref>
</contrib>
<contrib contrib-type="author" corresp="yes">
<name>
<surname>Xu</surname>
<given-names>Jiwei</given-names>
</name>
<xref ref-type="aff" rid="aff4">
<sup>4</sup>
</xref>
<xref ref-type="corresp" rid="c001">&#x2a;</xref>
<uri xlink:href="https://loop.frontiersin.org/people/1277874/overview"/>
</contrib>
</contrib-group>
<aff id="aff1">
<sup>1</sup>
<institution>Equipment Management and UAV Engineering College</institution>, <institution>Air Force Engineering University</institution>, <addr-line>Xi&#x2019;an</addr-line>, <country>China</country>
</aff>
<aff id="aff2">
<sup>2</sup>
<institution>School of Automation</institution>, <institution>Northwestern Polytechnical University</institution>, <addr-line>Xi&#x2019;an</addr-line>, <country>China</country>
</aff>
<aff id="aff3">
<sup>3</sup>
<institution>Xinjiang Institute of Engineering</institution>, <addr-line>Urumqi</addr-line>, <country>China</country>
</aff>
<aff id="aff4">
<sup>4</sup>
<institution>School of Cyberspace Security</institution>, <institution>Xi&#x2019;an University of Posts and Telecommunications</institution>, <addr-line>Xi&#x2019;an</addr-line>, <country>China</country>
</aff>
<author-notes>
<fn fn-type="edited-by">
<p>
<bold>Edited by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1236885/overview">Dongli Duan</ext-link>, Xi&#x2019;an University of Architecture and Technology, China</p>
</fn>
<fn fn-type="edited-by">
<p>
<bold>Reviewed by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/434467/overview">Yilun Shang</ext-link>, Northumbria University, United&#x20;Kingdom</p>
<p>
<ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/818014/overview">Keke Huang</ext-link>, Central South University, China</p>
<p>
<ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1586307/overview">Husheng Wu</ext-link>, Engineering University of PAP, China</p>
</fn>
<corresp id="c001">&#x2a;Correspondence: Jiwei Xu, <email>xu@xupt.edu.cn</email>
</corresp>
<fn fn-type="other">
<p>This article was submitted to Social Physics, a section of the journal Frontiers in Physics</p>
</fn>
</author-notes>
<pub-date pub-type="epub">
<day>31</day>
<month>01</month>
<year>2022</year>
</pub-date>
<pub-date pub-type="collection">
<year>2022</year>
</pub-date>
<volume>10</volume>
<elocation-id>821321</elocation-id>
<history>
<date date-type="received">
<day>24</day>
<month>11</month>
<year>2021</year>
</date>
<date date-type="accepted">
<day>06</day>
<month>01</month>
<year>2022</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#xa9; 2022 Zhang, Wu, Cao, Li and Xu.</copyright-statement>
<copyright-year>2022</copyright-year>
<copyright-holder>Zhang, Wu, Cao, Li and Xu</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/">
<p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these&#x20;terms.</p>
</license>
</permissions>
<abstract>
<p>UAV swarm are often subjected to random interference or malicious attacks during the execution of their tasks, resulting in UAV failure or communication interruption. When the UAV swarm is out of interference or the repair command is executed, the performance of the UAV swarm will be restored to a certain extent. However, how to measure the changes of UAV swarm&#x2019;s performance during this process will be very important, and it is also crucial to determine whether the UAVs can continue to perform its mission. Based on this motivation, we propose a resilience assessment framework for UAV swarm considering load balancing after UAV swarm suffer from disturbances. We analyze the effects of different topologies and different parameters on the resilience of UAV swarm. The study found that attack intensity is the most important factor affecting UAV swarm performance. As the attack intensity increases, the performance of the UAV swarm decreases rapidly. At the same time, topology also has a very important impact on UAV swarm resilience.</p>
</abstract>
<kwd-group>
<kwd>resilience</kwd>
<kwd>networks</kwd>
<kwd>UAV swarm</kwd>
<kwd>load balancing</kwd>
<kwd>malicious attacks</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1">
<title>Introduction</title>
<p>The extensive use of unmanned aerial vehicles (UAV) improves the convenience of mission execution and reduces the cost of completing missions. Meanwhile, it allows the execution of boring and dangerous tasks without causing unnecessary risks to humans [<xref ref-type="bibr" rid="B1">1</xref>]. With the increasing maturity of UAV manufacturing technology and the relative reduction of manufacturing costs, more and more people are interested in using UAVs to perform various tasks. For example, power maintenance, water and soil supervision, high-voltage tower fault line inspection, construction site survey, forest patrol and fire prevention, environmental inspection, oil and gas pipeline inspection and search and rescue, UAV express, traffic monitoring, etc. [<xref ref-type="bibr" rid="B2">2</xref>&#x2013;<xref ref-type="bibr" rid="B4">4</xref>]. At this stage, one of the important application trends of UAVs is UAV swarms (especially military) [<xref ref-type="bibr" rid="B5">5</xref>]. In the swarm, a lot of small UAVs complete the set tasks through machine-machine coordination. Once individuals are concerned, each UAV has its own mission and needs to coordinate with other UAVs. Therefore, the local organizational structure is loose. Generally, the UAV swarm needs to be affected by the environment (Threats) for perception, assessment, and response. All UAVs are required to participate in this process. Therefore, the overall organizational structure is tight. In summary, UAV swarms need to be highly resilience in terms of link connection, communication, and recovery to realize the information exchange network [<xref ref-type="bibr" rid="B6">6</xref>]. Therefore, the UAV swarm be regarded as an information exchange network (IE network) in this article. The IE network can be represented by a graph. UAVs are nodes in the graph, and the information exchange links between UAVs represent edges in the&#x20;graph.</p>
<p>To date, a UAV swarm can consist of hundreds of UAVs. Although the scale of UAV swarms is increasing, there are few studies on its resilience. At this stage, the research on UAV swarms is mainly focused on survivability [<xref ref-type="bibr" rid="B7">7</xref>]. The survivability is considered to be that UAV swarms have different attack strengths and different attack methods (malicious attacks, random failures). The ability of the system to complete tasks normally is used to evaluate the ability of UAV swarms to perform tasks after being attacked (interference). Specifically, some research network survivability indicators have been developed and used to measure the performance of UAV systems, including natural connectivity and maximum connected subgraphs. In the above research, the damage of UAV nodes and link interference are considered irreversible.</p>
<p>When UAV swarms are used to monitor military targets and harsh environments, they will encounter unpredictable difficulties in these dangerous environments, which often cause UAV nodes or links to fail. Although sometimes failed nodes and links can be repaired, the mission fails due to the inability to assess the degree of UAV recovery. Under this condition, historical fault data cannot help people improve the performance of UAV swarms. In order to improve the success rate of UAV swarm mission execution, in traditional methods, it is necessary to improve the robustness of UAV components to reduce the failure rate of nodes or increase redundant nodes or links (as described in the previous section). It will increase the cost of UAV swarms, which is undesirable. On the contrary, the UAV swarm considers that the performance recovery in the event of damage will be more executable. Resilience provides new methods for engineering and system design, and characterizes the ability of the system to resist the influence of uncertain factors and the ability to recover afterwards. Therefore, it is of great significance to introduce the resilience index into the performance measurement of the UAV&#x20;swarm.</p>
<p>However, there are few researches on the resilience of UAV swarms. In the UAV swarm, when some UAV nodes fail due to interference, the swarm often uses load balancing methods to assign the tasks of the failed nodes to the normal nodes according to established rules (the degree of the nodes is considered in the article), which can improve the resilience and usability of UAV swarms. However, when the node is overloaded, it will reduce the efficiency of the normal node and affect the performance of the UAV swarm. Therefore, it is important to analyze the impact of load balancing on the resilience of UAV swarm. Based on the above motivation, we propose a method for measuring the resilience of UAV swarms considering load balancing, and establish a UAV swarm performance model, give a UAV swarm load distribution model, and the variation of UAV swarm resiliency under different topologies and parameters is analyzed. The research motivation of the article will be given in the first section. In the second section, we continue to introduce the current situation of resilience research. In the third section, we establish the UAV swarm resiliency evaluation model, and conducted a verification analysis in the fourth section. The conclusion will be given in the fifth section.</p>
</sec>
<sec id="s2">
<title>Related Works</title>
<p>Resilience comes from the related fields of materials and mechanics. Which refers to one thing to deform after being affected by outside, and to return to its original shape when the effect disappears [<xref ref-type="bibr" rid="B8">8</xref>]. Due to the ubiquity of the system, the concept of resilience is widely used in different disciplines. Although they own different definitions, the resilience system is generally considered the ability to resist external influences and recover quickly. Compared with similar concepts such as invulnerability, robustness, reliability [<xref ref-type="bibr" rid="B9">9</xref>&#x2013;<xref ref-type="bibr" rid="B12">12</xref>], the research focuses more on the degree of change and recovery speed of the system after being affected by outside.</p>
<p>When resilience proposed, it has attracted lots of attention. In recent years, people consider the research on resilience one of the hot topics in the scientific research field [<xref ref-type="bibr" rid="B13">13</xref>&#x2013;<xref ref-type="bibr" rid="B15">15</xref>]. We have gradually realized that various systems that humans rely on are vulnerable to various disasters and exhibit vulnerabilities. Once the system is affected, it will require a long recovery process, and it may not even be able to recover to its original state. For example, it is estimated that the virus COVID-19 has caused tens of trillions of dollars in economic losses around the world [<xref ref-type="bibr" rid="B16">16</xref>], and nuclear pollution caused by a leak at the nuclear power plant in Fukushima, Japan, will continue for 30&#xa0;years or more [<xref ref-type="bibr" rid="B17">17</xref>]. So research on system resilience is particularly important. It is necessary for scholars to carry out research on system resilience design and effects. We hope that resilience research can improve the ability of various systems to withstand emergencies, so as to avoid secondary disasters. So research on resilience has attracted extensive attention from researchers in different fields, such as the resilience of transportation networks, supply systems, and supply chains.</p>
<p>The infrastructure system is generally resilience [<xref ref-type="bibr" rid="B18">18</xref>, <xref ref-type="bibr" rid="B19">19</xref>] in transportation, more and more people concern the resilience of roads. For transportation, resilience is defined as &#x201c;the system&#x2019;s ability to maintain its proven service level or restore itself to that service level within a specified time frame&#x201d; [<xref ref-type="bibr" rid="B20">20</xref>&#x2013;<xref ref-type="bibr" rid="B22">22</xref>]. Current research on the resilience of transportation networks focuses on the measurement of resilience. Some researchers use the synonyms of robustness [<xref ref-type="bibr" rid="B23">23</xref>], redundancy [<xref ref-type="bibr" rid="B24">24</xref>], reliability or fragility [<xref ref-type="bibr" rid="B25">25</xref>], and they also use total traffic delays, economic losses, maximum post-disaster flow, and autonomous system components measure the resilience of the transportation network&#x20;[<xref ref-type="bibr" rid="B26">26</xref>].</p>
<p>As an important infrastructure, the urban water supply system plays an important role to improve the quality of life and ensure the functions of economic activities. Unfortunately, many natural disasters, such as earthquakes, tsunamis, hurricanes, etc., affect urban water supply system, and then affect our life, commerce and industry and other activities. Research on resilience of water supply systems mainly focuses on resilience evaluation and recovery strategy simulation. In terms of resilience evaluation, energy and graph theory are two commonly used methods. In a water supply system, resilience can be regarded as the ratio of node energy reserves to input energy from sources, storage tanks and pumping stations [<xref ref-type="bibr" rid="B27">27</xref>]. This type of resilience index can basically be regarded as a reliability substitute index, like entropy and Robustness index [<xref ref-type="bibr" rid="B28">28</xref>&#x2013;<xref ref-type="bibr" rid="B30">30</xref>]. Similarly, various graph metrics (such as link density, average node degree, and swarming coefficient) can be used to quantify network resilience [<xref ref-type="bibr" rid="B31">31</xref>,&#x20;<xref ref-type="bibr" rid="B32">32</xref>].</p>
<p>In recent years, when environmental uncertainty continues to rise, interruptions are unexpected situations that may have a negative impact on enterprises at any time. Therefore, supply chain resilience has been emphasized as an important capability [<xref ref-type="bibr" rid="B33">33</xref>]. In the field of supply chain, supply chain resilience generally refers to the ability of enterprises to be vigilant, quick to respond and adapt to changes brought about by supply chain interruptions. Scholars often quote &#x201c;the supply chain can be restored to its original state in time or reach a new More ideal state system capabilities&#x201d; to define resilience [<xref ref-type="bibr" rid="B34">34</xref>]. At this stage, the definition of supply chain resilience has attracted more and more scholars&#x2019; attention, and discussions have been conducted from the perspective of capabilities, which mainly include flexibility, responsiveness, and resilience. There are many angles to analyze the resilience of the supply chain, mainly including flexibility, redundancy, speed, visibility, time, space, density, complexity, node importance, inventory level, number of suppliers, cost, etc. [<xref ref-type="bibr" rid="B35">35</xref>,&#x20;<xref ref-type="bibr" rid="B36">36</xref>].</p>
<p>So, although the definition of resilience in different systems is not uniform, overall resilience is used to measure the ability to return to its original state or ideal state when it is disturbed. Resilience systems can withstand unexpected disturbances and recover quickly. Therefore, research on resilience can be found in different disciplines (such as engineering, economics, management, etc.), meanwhile more and more attention is paid. And the existing research mostly focuses on the resilience measurement and the design of resilience system. As mentioned above, UAV swarm often suffer attacks and random failures when performing tasks, which makes some UAV nodes unable to transmit information. At this time, load balancing strategies are often used to allocate tasks to complete the established tasks [<xref ref-type="bibr" rid="B37">37</xref>&#x2013;<xref ref-type="bibr" rid="B39">39</xref>]. When the function of the failed node is restored, the task will be reloaded to restore the swarm performance. In this process, the swarm performance shows a resilience process of change.</p>
<p>If we consider resilience of the UAV swarm at the beginning of the design, it can greatly improve the ability of the UAV swarm to perform tasks, and enhance the ability of the UAV swarm to resist the influence of uncertain factors, which is important for expanding the application range of the UAV swarm significance.</p>
</sec>
<sec id="s3">
<title>Model</title>
<p>As mentioned earlier, UAV swarm are often subject to random failures and malicious attacks during missions. There are many reasons, mainly including the random failure of the UAV itself, the influence of the natural environment (including natural climate, mountains, forests, etc.), and man-made random attacks; malicious attacks mainly come from the enemy&#x2019;s targeted Attacks generally refer to situations in which the enemy obtains the UAV swarm topology, such as attacks based on node degree centrality, or node betweenness centrality, and so&#x20;on.</p>
<p>When the UAV swarm is attacked, we assume <inline-formula id="inf1">
<mml:math id="m1">
<mml:mi mathvariant="italic">&#x3ba;</mml:mi>
</mml:math>
</inline-formula> as the attack intensity to indicate the proportion of nodes in the UAV swarm that are attacked, and <inline-formula id="inf2">
<mml:math id="m2">
<mml:mrow>
<mml:mi>&#x3ba;</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:mrow>
<mml:mo>[</mml:mo>
<mml:mrow>
<mml:mn>0,1</mml:mn>
</mml:mrow>
<mml:mo>]</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>. the number of nodes that are attacked by the UAV swarm is <inline-formula id="inf3">
<mml:math id="m3">
<mml:mrow>
<mml:mrow>
<mml:mo>&#x7c;</mml:mo>
<mml:mrow>
<mml:mi>&#x3ba;</mml:mi>
<mml:mo>&#x2217;</mml:mo>
<mml:mi>N</mml:mi>
</mml:mrow>
<mml:mo>&#x7c;</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>. After the UAV node is attacked and fails, in order to realize the normal operation of the function, it is necessary to replace the failed node with the surrounding nodes, so that the UAV swarm can continue to perform the task. At the same time, the system will take measures and repair nodes with a certain probability.</p>
<sec id="s3-1">
<title>Performance Model</title>
<p>In the UAV swarm, due to cost constraints and technical factors, each UAV node has a fixed communication capacity, that is, the amount of information that can be transmitted per unit time is fixed. Assuming the capacity of the UAV node <inline-formula id="inf4">
<mml:math id="m4">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is <inline-formula id="inf5">
<mml:math id="m5">
<mml:mrow>
<mml:msub>
<mml:mi>C</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, assuming the initial communication load of the UAV node is <inline-formula id="inf6">
<mml:math id="m6">
<mml:mrow>
<mml:msub>
<mml:mi>L</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, then there is a tolerance coefficient <inline-formula id="inf7">
<mml:math id="m7">
<mml:mi>&#x3b7;</mml:mi>
</mml:math>
</inline-formula> that satisfies the following conditions.<disp-formula id="e1">
<mml:math id="m8">
<mml:mrow>
<mml:msub>
<mml:mi>C</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>&#x3b7;</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:msub>
<mml:mi>L</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>,</mml:mo>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1,2</mml:mn>
<mml:mo>,</mml:mo>
<mml:mo>&#x2026;</mml:mo>
<mml:mo>,</mml:mo>
<mml:mi>N</mml:mi>
</mml:mrow>
</mml:math>
<label>(1)</label>
</disp-formula>
</p>
<p>Among them, <inline-formula id="inf8">
<mml:math id="m9">
<mml:mi>N</mml:mi>
</mml:math>
</inline-formula> is the number of UAV nodes, and the value <inline-formula id="inf9">
<mml:math id="m10">
<mml:mrow>
<mml:msub>
<mml:mi>L</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> can be determined by node degree, betweenness centrality, etc., which can be expressed as [<xref ref-type="bibr" rid="B40">40</xref>]:<disp-formula id="e2">
<mml:math id="m11">
<mml:mrow>
<mml:msub>
<mml:mi>L</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi mathvariant="normal">0</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:msubsup>
<mml:mi>d</mml:mi>
<mml:mi>i</mml:mi>
<mml:mrow>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>&#x3b2;</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:msubsup>
</mml:mrow>
</mml:math>
<label>(2)</label>
</disp-formula>
</p>
<p>Among them, <inline-formula id="inf10">
<mml:math id="m12">
<mml:mrow>
<mml:msub>
<mml:mi>d</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is the degree of the node <inline-formula id="inf11">
<mml:math id="m13">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>. In order to adjust the parameter, the value used for adjustment is in accordance with the actual situation.</p>
<p>When the node of UAV swarm is attacked and fails, in order to maintain the normal operation of the communication network, the network of UAV swarm will distribute the load of the failed node to its neighbor nodes. Considering that the capacity of a node to accept load is proportional to the capacity of the node, the node&#x2019;s acceptance of new load is directly proportional to the initial load. Suppose the set of adjacent nodes <inline-formula id="inf12">
<mml:math id="m14">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> of a node is <inline-formula id="inf13">
<mml:math id="m15">
<mml:mrow>
<mml:msub>
<mml:mi>&#x393;</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>. Then the new load of the node <inline-formula id="inf14">
<mml:math id="m16">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is shown as:<disp-formula id="e3">
<mml:math id="m17">
<mml:mrow>
<mml:mi>&#x394;</mml:mi>
<mml:msub>
<mml:mi>L</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mi>L</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:munder>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>k</mml:mi>
<mml:mo>&#x2208;</mml:mo>
<mml:msub>
<mml:mi mathvariant="normal">&#x393;</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:munder>
<mml:mrow>
<mml:msub>
<mml:mi>L</mml:mi>
<mml:mi>k</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:mstyle>
</mml:mrow>
</mml:mfrac>
<mml:msub>
<mml:mi>L</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(3)</label>
</disp-formula>
</p>
<p>Among them, <inline-formula id="inf15">
<mml:math id="m18">
<mml:mrow>
<mml:msub>
<mml:mi>L</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> is the load of the node <inline-formula id="inf16">
<mml:math id="m19">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> at the moment <inline-formula id="inf17">
<mml:math id="m20">
<mml:mi>t</mml:mi>
</mml:math>
</inline-formula>. Load distribution requires time. Let the time required for load distribution once be a discrete time. Therefore, the load change of the node can be shown as:<disp-formula id="e4">
<mml:math id="m21">
<mml:mrow>
<mml:msub>
<mml:mi>L</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:msub>
<mml:mi>L</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x2b;</mml:mo>
<mml:mi mathvariant="normal">&#x394;</mml:mi>
<mml:msub>
<mml:mi>L</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(4)</label>
</disp-formula>
</p>
<p>Among them, <inline-formula id="inf18">
<mml:math id="m22">
<mml:mrow>
<mml:mi>&#x394;</mml:mi>
<mml:msub>
<mml:mi>L</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> add load for the node <inline-formula id="inf19">
<mml:math id="m23">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> at <inline-formula id="inf20">
<mml:math id="m24">
<mml:mrow>
<mml:mi>t</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>. After the node load is redistributed, the load of some nodes increases, which may cause overload. There are three states of the node <inline-formula id="inf21">
<mml:math id="m25">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula>, namely normal, overload and failure. Define the node <inline-formula id="inf22">
<mml:math id="m26">
<mml:mrow>
<mml:msub>
<mml:mi>v</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> information transmission capacity of the node at the moment t, as shown below,<disp-formula id="e5">
<mml:math id="m27">
<mml:mrow>
<mml:msub>
<mml:mi>s</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:mtable>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mi>n</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>m</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>l</mml:mi>
</mml:mrow>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>L</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x2264;</mml:mo>
<mml:msub>
<mml:mi>C</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mi>o</mml:mi>
<mml:mi>v</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>l</mml:mi>
<mml:mi>o</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>d</mml:mi>
</mml:mrow>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>C</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>&#x3c;</mml:mo>
<mml:msub>
<mml:mi>L</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mi>f</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>l</mml:mi>
<mml:mi>u</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>e</mml:mi>
</mml:mrow>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:mi>b</mml:mi>
<mml:mi>e</mml:mi>
<mml:mtext>&#x2009;</mml:mtext>
<mml:mi>a</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>c</mml:mi>
<mml:mi>k</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>d</mml:mi>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(5)</label>
</disp-formula>
</p>
<p>
<xref ref-type="disp-formula" rid="e5">Equation 5</xref> gives the qualitative description of node state <inline-formula id="inf23">
<mml:math id="m28">
<mml:mrow>
<mml:msub>
<mml:mi>s</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula>. For quantitative description, let<disp-formula id="e6">
<mml:math id="m29">
<mml:mrow>
<mml:msub>
<mml:mi>l</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mi>L</mml:mi>
<mml:mi>j</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mi>C</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:math>
<label>(6)</label>
</disp-formula>
</p>
<p>So, <xref ref-type="disp-formula" rid="e5">Eq. 5</xref> can be rewritten as<disp-formula id="e7">
<mml:math id="m30">
<mml:mrow>
<mml:msub>
<mml:mi>s</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:mtable>
<mml:mtr>
<mml:mtd>
<mml:mn>1</mml:mn>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:msub>
<mml:mi>l</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mo>&#x2264;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mfrac>
<mml:mn>1</mml:mn>
<mml:mrow>
<mml:msub>
<mml:mi>l</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x3c;</mml:mo>
<mml:msub>
<mml:mi>l</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mn>0</mml:mn>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:mi>b</mml:mi>
<mml:mi>e</mml:mi>
<mml:mtext>&#x2009;</mml:mtext>
<mml:mi>a</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>a</mml:mi>
<mml:mi>c</mml:mi>
<mml:mi>k</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>d</mml:mi>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(7)</label>
</disp-formula>
</p>
<p>When the UAV swarm is attacked, the node-like in the UAV swarm circulates in the three states of normal, overload and failure. Initially, all UAV nodes are in normal working condition. When the UAV node is attacked, the UAV node will fail. When some nodes in the UAV swarm fail, load distribution will be triggered, which will cause the overload or overload failure of the neighbor nodes of the failed node. However, when the failed node of the UAV is repaired, the UAV swarm will return to its normal state. Overall, the performance of the UAV swarm presents a reciprocating resilience process. Therefore, the performance function of the UAV swarm at the moment can be defined as:<disp-formula id="e8">
<mml:math id="m31">
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mi>N</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
</mml:mrow>
</mml:munderover>
<mml:mrow>
<mml:msub>
<mml:mi>s</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:mstyle>
</mml:mrow>
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:mi>i</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mi>N</mml:mi>
</mml:munderover>
<mml:mrow>
<mml:msub>
<mml:mi>s</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mtext>0</mml:mtext>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:mstyle>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:math>
<label>(8)</label>
</disp-formula>
</p>
<p>Among them, <inline-formula id="inf24">
<mml:math id="m32">
<mml:mrow>
<mml:msub>
<mml:mi>N</mml:mi>
<mml:mi>t</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is the number of UAVs in the swarm at the moment <inline-formula id="inf25">
<mml:math id="m33">
<mml:mi>t</mml:mi>
</mml:math>
</inline-formula>, <inline-formula id="inf26">
<mml:math id="m34">
<mml:mrow>
<mml:msub>
<mml:mi>s</mml:mi>
<mml:mi>i</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mtext>0</mml:mtext>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> is the performance state of the UAV nodes at the initial&#x20;time.</p>
</sec>
<sec id="s3-2">
<title>UAV Swarm Resilience</title>
<p>In <xref ref-type="sec" rid="s3-1">Section 3.1</xref>, we show the measurement index of UAV swarm communication performance. Performance indicators measure the ability of the UAV swarm to perform tasks. In the paper, we mainly consider the node load status and swarm load status. When the UAV swarm needs to perform tasks cooperatively, it can only be completed when sufficient information exchange. Therefore, we show the research results of Trans et&#x20;al. [<xref ref-type="bibr" rid="B41">41</xref>] to establish the UAV swarm resilience index, which is calculated as follows:<disp-formula id="e9">
<mml:math id="m35">
<mml:mrow>
<mml:mi>R</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mrow>
<mml:mo>{</mml:mo>
<mml:mrow>
<mml:mtable>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mi>&#x3c3;</mml:mi>
<mml:mi>&#x3c1;</mml:mi>
<mml:mrow>
<mml:mo>[</mml:mo>
<mml:mrow>
<mml:mi>&#x3b4;</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>&#x3b6;</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>&#x2212;</mml:mo>
<mml:msup>
<mml:mi>&#x3c4;</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b4;</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:msup>
</mml:mrow>
<mml:mo>]</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:mtext>i</mml:mtext>
<mml:mi>f</mml:mi>
<mml:mtext>&#x2009;</mml:mtext>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>&#x2212;</mml:mo>
<mml:mi>&#x3b4;</mml:mi>
<mml:mo>&#x2265;</mml:mo>
<mml:mn>0</mml:mn>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mi>&#x3c3;</mml:mi>
<mml:mi>&#x3c1;</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>&#x3b4;</mml:mi>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>&#x3b6;</mml:mi>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:mtd>
<mml:mtd>
<mml:mrow>
<mml:mi>o</mml:mi>
<mml:mi>t</mml:mi>
<mml:mi>h</mml:mi>
<mml:mi>e</mml:mi>
<mml:mi>r</mml:mi>
<mml:mi>w</mml:mi>
<mml:mi>i</mml:mi>
<mml:mi>s</mml:mi>
<mml:mi>e</mml:mi>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:mrow>
</mml:mrow>
</mml:math>
<label>(9)</label>
</disp-formula>
</p>
<p>Among them, <inline-formula id="inf27">
<mml:math id="m36">
<mml:mi>&#x3c3;</mml:mi>
</mml:math>
</inline-formula> is the total performance factor (Total Performance Factor), which represents the performance that the system can maintain in the relevant time period (mainly the resilience change time period); <inline-formula id="inf28">
<mml:math id="m37">
<mml:mi>&#x3b4;</mml:mi>
</mml:math>
</inline-formula> is the absorption factor, which represents the ability of the system to resist interference. For example, when the system is designed for redundancy or anti-interference design at the beginning of the design, the system has a high interference absorption capacity; <inline-formula id="inf29">
<mml:math id="m38">
<mml:mi>&#x3c1;</mml:mi>
</mml:math>
</inline-formula> is the recovery factor, which indicates the degree to which the system can recover when it is interfered or attacked; <inline-formula id="inf30">
<mml:math id="m39">
<mml:mi>&#x3c4;</mml:mi>
</mml:math>
</inline-formula> is the recovery time factor, which represents the time factor from when the system receives interference to when it recovers to a steady state. <inline-formula id="inf31">
<mml:math id="m40">
<mml:mi>&#x3b6;</mml:mi>
</mml:math>
</inline-formula> is the fluctuation factor, which represents the fluctuation that may occur in the process of the system from the disturbance state to the stable state. Therefore, the resilience process of the UAV swarm is shown in <xref ref-type="fig" rid="F1">Figure&#x20;1</xref>.<disp-formula id="e10">
<mml:math id="m41">
<mml:mrow>
<mml:mtable>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mi>&#x3c3;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:munderover>
<mml:mo>&#x2211;</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>t</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mi>t</mml:mi>
<mml:mrow>
<mml:mtext>final</mml:mtext>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:munderover>
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:mstyle>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mi>D</mml:mi>
</mml:msub>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:msub>
<mml:mi>t</mml:mi>
<mml:mrow>
<mml:mtext>final</mml:mtext>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>t</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:mfrac>
<mml:mo>,</mml:mo>
<mml:mi>&#x3b4;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mrow>
<mml:mi>min</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mi>D</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfrac>
<mml:mo>,</mml:mo>
<mml:mi>&#x3c1;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mi>R</mml:mi>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mi>D</mml:mi>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd>
<mml:mrow>
<mml:mi>&#x3c4;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mi>t</mml:mi>
<mml:mi>s</mml:mi>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>t</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mi>t</mml:mi>
<mml:mrow>
<mml:mtext>final</mml:mtext>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:msub>
<mml:mi>t</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
</mml:mrow>
</mml:mfrac>
<mml:mo>,</mml:mo>
<mml:mtext>&#x2009;</mml:mtext>
<mml:mi>&#x3b6;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mfrac>
<mml:mn>1</mml:mn>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>&#x2b;</mml:mo>
<mml:mi>exp</mml:mi>
<mml:mrow>
<mml:mo>[</mml:mo>
<mml:mrow>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>0.25</mml:mn>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mrow>
<mml:mi>S</mml:mi>
<mml:mi>N</mml:mi>
<mml:msub>
<mml:mi>R</mml:mi>
<mml:mrow>
<mml:mi>d</mml:mi>
<mml:mi>B</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>&#x2212;</mml:mo>
<mml:mn>15</mml:mn>
</mml:mrow>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
<mml:mo>]</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:mfrac>
</mml:mrow>
</mml:mtd>
</mml:mtr>
</mml:mtable>
</mml:mrow>
</mml:math>
<label>(10)</label>
</disp-formula>
</p>
<fig id="F1" position="float">
<label>FIGURE 1</label>
<caption>
<p>Resilience change of UAV swarm.</p>
</caption>
<graphic xlink:href="fphy-10-821321-g001.tif"/>
</fig>
<p>Among them, <inline-formula id="inf32">
<mml:math id="m42">
<mml:mrow>
<mml:mi>y</mml:mi>
<mml:mrow>
<mml:mo>(</mml:mo>
<mml:mi>t</mml:mi>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:mrow>
</mml:math>
</inline-formula> is defined by <xref ref-type="disp-formula" rid="e8">Eq. 8</xref>, <inline-formula id="inf33">
<mml:math id="m43">
<mml:mrow>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mi>D</mml:mi>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> represents the initial performance of the UAV swarm. In the initial state, we believe that each UAV node can work normally, so <inline-formula id="inf34">
<mml:math id="m44">
<mml:mrow>
<mml:msub>
<mml:mi>y</mml:mi>
<mml:mi>D</mml:mi>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>. <inline-formula id="inf35">
<mml:math id="m45">
<mml:mrow>
<mml:msub>
<mml:mi>t</mml:mi>
<mml:mn>0</mml:mn>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is the initial time, <inline-formula id="inf36">
<mml:math id="m46">
<mml:mrow>
<mml:msub>
<mml:mi>t</mml:mi>
<mml:mrow>
<mml:mtext>final</mml:mtext>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:math>
</inline-formula> is the stable time or the end time of the UAV swarm performance. In the follow-up experiment, we let <inline-formula id="inf37">
<mml:math id="m47">
<mml:mrow>
<mml:msub>
<mml:mi>t</mml:mi>
<mml:mrow>
<mml:mtext>final</mml:mtext>
</mml:mrow>
</mml:msub>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>100</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>, that is, we only observe the changes in the performance of the UAV swarm under 100-time&#x20;steps.</p>
</sec>
</sec>
<sec id="s4">
<title>Case Analysis</title>
<p>We focus on studying the resilience of UAV swarms when considering load balancing. In the third section, we propose the performance measurement index of UAV swarm when load balancing is considered, combined with the resilience index given in the literature [<xref ref-type="bibr" rid="B36">36</xref>], finally we realize the resilience measurement of UAV&#x20;swarm.</p>
<p>In this section, we will discuss and analyze the resilience indicators given in the third section, focusing on the impact of&#x20;network structure, network parameters, and repair rates on&#x20;UAV swarm resilience. When designing the load balancing&#x20;model, we use the degree of nodes as an indicator to measure&#x20;the load capacity of UAVs in the UAV swarm, so we use maximum attack (delete the largest node in the current network) to simulate UAV swarms The interference received.</p>
<p>Then, the load is distributed according to the load balancing model proposed in <xref ref-type="sec" rid="s3">Section 3</xref>, and the performance of the UAV swarm after each attack is calculated. In the repair process, within each discrete time t, the failed node restores its performance with probability q, and uses the inverse load distribution in Chapter 3 to reload the network load, and finally realize the resilience change process of the UAV&#x20;swarm.</p>
<sec id="s4-1">
<title>Analysis of Swarm Topology</title>
<p>In order to analyze the impact of different topologies on the performance of UAV swarms, we used four networks, BA network, ER random network, NW small world network and RR random rule network. For comparative analysis, each network has 100 fixed points and 200 edges. At the same time, in order to eliminate the influence of random factors in the process of generating the network, we generated a total of 200 networks and used the average to measure the performance of the network. Parameters of the four networks.</p>
<p>It can be seen from <xref ref-type="fig" rid="F2">Figure&#x20;2</xref> that when the network has the same number of edges and nodes, the network topology has a significant impact on network performance. In general, when the four networks are attacked by the same intensity, the performance of the BA network has the fastest decline, the other three networks have a slower decline, and the RR network has the best performance. In terms of attack methods, we give priority to deleting the nodes with the largest degree in the current network, and networks with uneven degree distribution will collapse first. That is to say, there are Hub nodes in this type of network. When these nodes are deleted, they will directly affect the network structure, until the network collapses [<xref ref-type="bibr" rid="B42">42</xref>]. From the node capacity model given in Chapter 3, we can see that nodes with higher degrees are given more capacity by us, which intensifies the heterogeneity between nodes. Therefore, under the research framework of this article, the RR network has high robustness to the maximum node degree attack.</p>
<fig id="F2" position="float">
<label>FIGURE 2</label>
<caption>
<p>Performance of UAV swarm under different attack intensities and topological structures. The vertical axis represents the performance of the UAV swarm, and the horizontal axis represents the logarithm of attack intensity.</p>
</caption>
<graphic xlink:href="fphy-10-821321-g002.tif"/>
</fig>
<p>In <xref ref-type="fig" rid="F3">Figure&#x20;3</xref>, the performance change of the UAV swarm when the load sharing reverse process is used for repair is given. The figure shows that although the UAV nodes are all repaired, the swarm performance has not been restored to the initial state. Through research, it is found that the swarm deletes the largest nodes in the network in turn, but the order of repairing nodes is random. As a result, the UAV swarm load has non-uniformity, which ultimately leads to the worst performance with BA network characteristics.</p>
<fig id="F3" position="float">
<label>FIGURE 3</label>
<caption>
<p>Recovery process of UAV swarm performance under different topological structures. The ordinate is the performance of the UAV swarm, and the abscissa is discrete time T. The repair probability is 0.1, that is, at every discrete time t, the probability of damaged nodes being repaired follows a uniform distribution in the interval of (0, 1).</p>
</caption>
<graphic xlink:href="fphy-10-821321-g003.tif"/>
</fig>
</sec>
<sec id="s4-2">
<title>UAV Swarm Resilience</title>
<p>In <xref ref-type="sec" rid="s4-1">Section 4.1</xref>, when the maximum probability of attack and repair is reached, we find that the graph topology has a certain impact on the performance of the UAV swarm. In this section, we will study the resilience of UAV swarms. When studying the resilience of UAV swarms, we will use discrete time as the benchmark and proceed in the order of normal operation-attacked-state maintenance-repair-stability, where normal operation time and state maintenance time are. As can be seen from <xref ref-type="fig" rid="F3">Figure&#x20;3</xref>, the four types of networks all show better resilience. When the network is attacked, the load capacity of the network continues to decline due to the priority deletion of nodes with greater degrees. Through the load balancing algorithm to redistribute the load of the failed node, the performance of the four networks is not degraded very quickly. However, as the number of failed nodes increases, the load of nodes that can work normally increases, causing some nodes to exceed their own load capacity and become overloaded, eventually reducing the performance of normal nodes, or even failing.</p>
<p>Among the four networks, the BA network exhibits stronger resilience than other networks. This shows that under malicious attacks, BA networks are susceptible to interference, that is, small disturbances will cause large fluctuations in the UAV swarm. For each network, the attack intensity will also affect the changes in network performance. That is, as the attack intensity continues to increase, the performance fluctuations of the UAV swarm will also increase.</p>
<p>The effect of different topologies on UAV swarm resilience is shown in <xref ref-type="fig" rid="F4">Figure&#x20;4</xref>, and for comparison purposes only the average of 100 experiments is given. In <xref ref-type="fig" rid="F5">Figure&#x20;5</xref> the error of the UAV swarm resilience variation for different topologies is given. Overall, the resilience of the UAV swarm under each topology shows a large fluctuation. Among them, the fluctuation of the UAV swarm resilience is the smallest under the RR network topology (as shown in <xref ref-type="fig" rid="F5">Figure&#x20;5D</xref>), i.e.,&#x20;it presents a stronger rigidity. In contrast, the NW network shows greater fluctuations, especially in increasing with the intensity of the attack (manifested in <xref ref-type="fig" rid="F5">Figure&#x20;5C</xref> by the unevenness of the ribbon width). It is found that the reason for this phenomenon is related to the generation methods of the four networks. The RR network has the strongest regularity of degree distribution, so each generated network is highly similar and shows high similarity under the same attack strategy. NW network first generates ring network and then connects randomly. When the attack intensity is low, the network fluctuation is small. However, when the attack intensity exceeds a limit (as shown in <xref ref-type="fig" rid="F5">Figure&#x20;5C</xref>, 8 nodes are deleted), the network changes dramatically, resulting in dramatic differences in UAV swarm performance. By comparison, the regularity of BA network is weaker than RR network and stronger than NW network. Therefore, the error fluctuation of the BA network is between the two, i.e.,&#x20;the error exists but the fluctuation is not obvious (shown in <xref ref-type="fig" rid="F5">Figure&#x20;5C</xref> as a more uniform color band). ER networks are more like a combination of BA and RR networks, i.e.,&#x20;like BA networks with large errors, and like NW networks with insignificant thresholds.</p>
<fig id="F4" position="float">
<label>FIGURE 4</label>
<caption>
<p>Performance of UAV swarm under four topological structures. <bold>(A)</bold> BA network, <bold>(B)</bold> ER network, <bold>(C)</bold> NW network and <bold>(D)</bold> RR network. Each network was attacked five times with varying intensity and repaired continuously. The attack mode and repair procedure are described in <xref ref-type="sec" rid="s4-1">section 4.1</xref>.</p>
</caption>
<graphic xlink:href="fphy-10-821321-g004.tif"/>
</fig>
<fig id="F5" position="float">
<label>FIGURE 5</label>
<caption>
<p>Errors of UAV swarm resilience under different topologies. In the figure, the red pentagon is the mean of 100 experiments. The pink ribbon is the standard deviation of 100 experiments. The data for each experiment are the blue hollow tilted squares.</p>
</caption>
<graphic xlink:href="fphy-10-821321-g005.tif"/>
</fig>
</sec>
<sec id="s4-3">
<title>Parameter Influence</title>
<p>In <xref ref-type="sec" rid="s4-1">Section 4.1</xref>, we analyzed the impact of topology on the swarm performance, and in <xref ref-type="sec" rid="s4-2">Section 4.2</xref>, we analyze the impact of attack intensity on the resilience of the swarm. In this section, we will analyze the influence of four parameters on the resilience of the swarm. The experimental results are shown in <xref ref-type="fig" rid="F6">Figures 6</xref>&#x2013;<xref ref-type="fig" rid="F8">8</xref>. During the experiment, for comparative analysis, we set the attack intensity constant to&#x20;0.25.</p>
<fig id="F6" position="float">
<label>FIGURE 6</label>
<caption>
<p>Influence of parameter <inline-formula id="inf38">
<mml:math id="m48">
<mml:mi>&#x3b2;</mml:mi>
</mml:math>
</inline-formula> on the resilience of the four networks. To reflect the difference, <inline-formula id="inf39">
<mml:math id="m49">
<mml:mi>&#x3b2;</mml:mi>
</mml:math>
</inline-formula> is set to 0.1, 0.35, and 0.60, respectively. In addition, the remaining parameters <inline-formula id="inf40">
<mml:math id="m50">
<mml:mi>&#x3b7;</mml:mi>
</mml:math>
</inline-formula>, and <inline-formula id="inf41">
<mml:math id="m51">
<mml:mi>p</mml:mi>
</mml:math>
</inline-formula> are set to 0.1.</p>
</caption>
<graphic xlink:href="fphy-10-821321-g006.tif"/>
</fig>
<p>The influence of the parameters on the performance of the four types of networks is shown in <xref ref-type="fig" rid="F6">Figure&#x20;6</xref>. We can find that the parameters <inline-formula id="inf50">
<mml:math id="m60">
<mml:mi>&#x3b2;</mml:mi>
</mml:math>
</inline-formula> affect more on the performance of the BA network, and less on the other three networks. Especially, in <xref ref-type="fig" rid="F6">Figure&#x20;6A</xref>, when <inline-formula id="inf51">
<mml:math id="m61">
<mml:mi>&#x3b2;</mml:mi>
</mml:math>
</inline-formula> is 0.1, 0.35, and 0.60, the performance of the network is 0.93321, 0.97831, and 0.99412, respectively, and the corresponding network resilience is 0.359169, 0.42269, and 0.44504. Through analysis, it is found that as <inline-formula id="inf52">
<mml:math id="m62">
<mml:mi>&#x3b2;</mml:mi>
</mml:math>
</inline-formula> increases, the difference in node capacity also increases significantly. After load balancing, more nodes will be overloaded, which will affect the performance of the swarm and cause the resilience of the swarm to fluctuate.</p>
<p>
<xref ref-type="fig" rid="F7">Figure&#x20;7</xref> shows the impact of tolerance coefficient on network resilience. In <xref ref-type="disp-formula" rid="e1">Eq. 1</xref>, we define the tolerance factor, which characterizes the ability of an unmanned aerial vehicle to be overloaded. Larger tolerance factor means that the node can withstand more work without crashing, and vice versa. It can be seen in <xref ref-type="fig" rid="F7">Figure&#x20;7</xref> that the tolerance factor can affect the performance of the four networks, but there are significant differences in the degree of impact. The tolerance factor has a small impact on the performance of the BA network and a greater impact on the RR network. Through the topology analysis of the network, it is found that the degree distribution of the BA network presents a power-law distribution, with greater differences, while the degree distributions of the other three networks are less different, especially the RR network.</p>
<fig id="F7" position="float">
<label>FIGURE 7</label>
<caption>
<p>Influence of parameter <inline-formula id="inf42">
<mml:math id="m52">
<mml:mi>&#x3b7;</mml:mi>
</mml:math>
</inline-formula> on the resilience of the four networks. To reflect the difference, <inline-formula id="inf43">
<mml:math id="m53">
<mml:mi>&#x3b7;</mml:mi>
</mml:math>
</inline-formula> is set to 0.1, 0.6, and 1.1, respectively. In addition, the remaining parameters <inline-formula id="inf44">
<mml:math id="m54">
<mml:mi>&#x3b2;</mml:mi>
</mml:math>
</inline-formula>, and <inline-formula id="inf45">
<mml:math id="m55">
<mml:mi>p</mml:mi>
</mml:math>
</inline-formula> are set to 0.1.</p>
</caption>
<graphic xlink:href="fphy-10-821321-g007.tif"/>
</fig>
<p>The parameter <inline-formula id="inf53">
<mml:math id="m63">
<mml:mi>&#x3b7;</mml:mi>
</mml:math>
</inline-formula> can affect much on the performance of the BA network, and little on the other three networks. Especially, in <xref ref-type="fig" rid="F8">Figure&#x20;8A</xref>, when <inline-formula id="inf54">
<mml:math id="m64">
<mml:mrow>
<mml:mi>&#x3b2;</mml:mi>
<mml:mo>&#x3d;</mml:mo>
<mml:mn>0.1</mml:mn>
</mml:mrow>
</mml:math>
</inline-formula>, 0.35, and 0.60, the performance of the network is 0.93321, 0.97831, and 0.99412, respectively, and the corresponding network resilience is 0.359169, 0.42269, and 0.44504. So, we find that when it increases, the difference in node capacity also increases significantly. After load balancing, more nodes will be overloaded, which will affect the performance of the swarm and cause the resilience of the swarm to fluctuate.</p>
<fig id="F8" position="float">
<label>FIGURE 8</label>
<caption>
<p>Influence of parameter <inline-formula id="inf46">
<mml:math id="m56">
<mml:mi>q</mml:mi>
</mml:math>
</inline-formula> on the resilience of the four networks. To reflect the difference, <inline-formula id="inf47">
<mml:math id="m57">
<mml:mi>q</mml:mi>
</mml:math>
</inline-formula> is set to 0.1, 0.6, and 1.1, respectively. In addition, the remaining parameters <inline-formula id="inf48">
<mml:math id="m58">
<mml:mi>&#x3b2;</mml:mi>
</mml:math>
</inline-formula>, and <inline-formula id="inf49">
<mml:math id="m59">
<mml:mi>q</mml:mi>
</mml:math>
</inline-formula> are set to 0.1.</p>
</caption>
<graphic xlink:href="fphy-10-821321-g008.tif"/>
</fig>
</sec>
</sec>
<sec sec-type="conclusion" id="s5">
<title>Conclusion</title>
<p>UAV swarm have attracted more and more attention. In the missions, the UAV itself or its communication is often subjected to random interference or malicious attacks, which causes the UAV to fail or to interrupt the communication. When the UAV swarm is out of interference or the repair command is executed, the performance of the UAV swarm will be restored to a certain extent. However, how to measure the changes in UAV swarm&#x2019;s performance during this process is important, and it is also the key to determining whether the UAV can continue to perform its mission. Based on this motivation and considering the load balancing process of the UAV swarm after interference, we propose a UAV swarm resilience evaluation model that considers load balancing. In this process, the UAV node capacity model, load balancing model, overload failure model and performance resilience model are established. Finally, the resilience change process of the UAV swarm under different topological structures and parameters is analyzed. In the test process, following the characteristics of the model, we use degree attacks to test the resilience of the network. We find that attack intensity is the most important indicator that affects the performance of UAVs. With the increase of attack intensity, the performance of UAV swarm decreases rapidly, especially the performance of UAV swarm with BA network structure. Under different parameters, the performance of UAV swarm with a scale-free characteristic topology also decreases rapidly, but different parameters have different degrees of influence. Therefore, when the UAV swarm is configured with the capacity of the node degree and is attacked by the degree, the performance of the UAV degrades the fastest and the resilience changes the&#x20;most.</p>
</sec>
</body>
<back>
<sec id="s6">
<title>Data Availability Statement</title>
<p>The original contributions presented in the study are included in the article/Supplementary Material, further inquiries can be directed to the corresponding author.</p>
</sec>
<sec id="s7">
<title>Author Contributions</title>
<p>PZ, JX, and TW contributed to conception and design of the study. ZL organized the database. JX and RC performed the statistical analysis. PZ wrote the first draft of the manuscript. All authors contributed to manuscript revision, read, and approved the submitted version.</p>
</sec>
<sec sec-type="COI-statement" id="s8">
<title>Conflict of Interest</title>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec sec-type="disclaimer" id="s9">
<title>Publisher&#x2019;s Note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<ref-list>
<title>References</title>
<ref id="B1">
<label>1.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhou</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Gao</surname>
<given-names>F</given-names>
</name>
<name>
<surname>Fang</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Lan</surname>
<given-names>Z</given-names>
</name>
</person-group>. <article-title>Improved Bat Algorithm for UAV Path Planning in Three-Dimensional Space</article-title>. <source>IEEE Access</source> (<year>2021</year>) <volume>9</volume>:<fpage>20100</fpage>&#x2013;<lpage>16</lpage>. <pub-id pub-id-type="doi">10.1109/access.2021.3054179</pub-id> </citation>
</ref>
<ref id="B2">
<label>2.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Liu</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Xu</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Yao</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Wu</surname>
<given-names>Q</given-names>
</name>
<etal/>
</person-group> <article-title>Opportunistic UAV Utilization in Wireless Networks: Motivations, Applications, and Challenges</article-title>. <source>IEEE Commun Mag</source> (<year>2020</year>) <volume>58</volume>(<issue>5</issue>):<fpage>62</fpage>&#x2013;<lpage>8</lpage>. <pub-id pub-id-type="doi">10.1109/mcom.001.1900687</pub-id> </citation>
</ref>
<ref id="B3">
<label>3.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kouhdaragh</surname>
<given-names>V</given-names>
</name>
<name>
<surname>Verde</surname>
<given-names>F</given-names>
</name>
<name>
<surname>Gelli</surname>
<given-names>G</given-names>
</name>
<name>
<surname>Abouei</surname>
<given-names>J</given-names>
</name>
</person-group>. <article-title>On the Application of Machine Learning to the Design of UAV-Based 5G Radio Access Networks</article-title>. <source>Electronics</source> (<year>2020</year>) <volume>9</volume>(<issue>4</issue>):<fpage>689</fpage>. <pub-id pub-id-type="doi">10.3390/electronics9040689</pub-id> </citation>
</ref>
<ref id="B4">
<label>4.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Yu</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Zhou</surname>
<given-names>J</given-names>
</name>
</person-group>. <article-title>A Constrained Differential Evolution Algorithm to Solve UAV Path Planning in Disaster Scenarios</article-title>. <source>Knowledge-Based Syst</source> (<year>2020</year>) <volume>204</volume>:<fpage>106209</fpage>. <pub-id pub-id-type="doi">10.1016/j.knosys.2020.106209</pub-id> </citation>
</ref>
<ref id="B5">
<label>5.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname>
<given-names>Q</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Ji</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Feng</surname>
<given-names>Z</given-names>
</name>
<name>
<surname>Han</surname>
<given-names>Z</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>Z</given-names>
</name>
</person-group>. <article-title>Response Delay Optimization in Mobile Edge Computing Enabled UAV Swarm</article-title>. <source>IEEE Trans Veh Technol</source> (<year>2020</year>) <volume>69</volume>(<issue>3</issue>):<fpage>3280</fpage>&#x2013;<lpage>95</lpage>. <pub-id pub-id-type="doi">10.1109/tvt.2020.2964821</pub-id> </citation>
</ref>
<ref id="B6">
<label>6.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Fu</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Pan</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>H</given-names>
</name>
<name>
<surname>Gao</surname>
<given-names>X</given-names>
</name>
</person-group>. <article-title>A Formation Maintenance and Reconstruction Method of UAV Swarm Based on Distributed Control</article-title>. <source>Aerospace Sci Tech</source> (<year>2020</year>) <volume>104</volume>:<fpage>105981</fpage>. <pub-id pub-id-type="doi">10.1016/j.ast.2020.105981</pub-id> </citation>
</ref>
<ref id="B7">
<label>7.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Xu</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Deng</surname>
<given-names>Z</given-names>
</name>
<name>
<surname>Ren</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Xu</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>D</given-names>
</name>
</person-group>. <article-title>Invulnerability Optimization of UAV Formation Based on Super Wires Adding Strategy</article-title>. <source>Chaos, Solitons &#x26; Fractals</source> (<year>2020</year>) <volume>140</volume>:<fpage>110185</fpage>. <pub-id pub-id-type="doi">10.1016/j.chaos.2020.110185</pub-id> </citation>
</ref>
<ref id="B8">
<label>8.</label>
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Masten</surname>
<given-names>AS</given-names>
</name>
<name>
<surname>Reed</surname>
<given-names>MGJ</given-names>
</name>
</person-group>. <article-title>Resilience in Development[J]</article-title>. In: <source>Handbook of Positive Psychology</source>. <publisher-name>Oxford University Press</publisher-name> (<year>2002</year>). p. <fpage>74</fpage>&#x2013;<lpage>88</lpage>. </citation>
</ref>
<ref id="B9">
<label>9.</label>
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Huang</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Wen</surname>
<given-names>H</given-names>
</name>
<name>
<surname>Yang</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Gui</surname>
<given-names>W</given-names>
</name>
<name>
<surname>Hu</surname>
<given-names>S</given-names>
</name>
</person-group>. <article-title>Outlier Detection for Process Monitoring in Industrial Cyber-Physical Systems</article-title>, <conf-name>Proceeding of the IEEE Transactions on Automation Science and Engineering</conf-name>, <conf-date>June 2021</conf-date> <publisher-name>IEEE</publisher-name> (<year>2021</year>). p. <fpage>1</fpage>&#x2013;<lpage>12</lpage>. <pub-id pub-id-type="doi">10.1109/TASE.2021.3087599</pub-id> </citation>
</ref>
<ref id="B10">
<label>10.</label>
<citation citation-type="confproc">
<person-group person-group-type="author">
<name>
<surname>Huang</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Wu</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Li</surname>
<given-names>F</given-names>
</name>
<name>
<surname>Yang</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Gui</surname>
<given-names>W</given-names>
</name>
</person-group> <article-title>Fault Diagnosis of Hydraulic Systems Based on Deep Learning Model with Multirate Data Samples</article-title>, <conf-name>Proceeding of the IEEE Transactions on Neural Networks and Learning Systems</conf-name>, <conf-date>June 2021</conf-date>. <publisher-name>IEEE</publisher-name> (<year>2021</year>) p. <fpage>1</fpage>&#x2013;<lpage>13</lpage>. <pub-id pub-id-type="doi">10.1109/TNNLS.2021.3083401</pub-id> </citation>
</ref>
<ref id="B11">
<label>11.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhu</surname>
<given-names>P</given-names>
</name>
<name>
<surname>Han</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Lombardi</surname>
<given-names>F</given-names>
</name>
</person-group>. <article-title>Reliability Evaluation of Phased-Mission Systems Using Stochastic Computation</article-title>. <source>IEEE Trans Rel</source> (<year>2016</year>) <volume>65</volume>(<issue>3</issue>):<fpage>1612</fpage>&#x2013;<lpage>23</lpage>. <pub-id pub-id-type="doi">10.1109/tr.2016.2570565</pub-id> </citation>
</ref>
<ref id="B12">
<label>12.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhu</surname>
<given-names>P</given-names>
</name>
<name>
<surname>Han</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Guo</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Lombardi</surname>
<given-names>F</given-names>
</name>
</person-group>. <article-title>Reliability and Criticality Analysis of Communication Networks by Stochastic Computation</article-title>. <source>IEEE Netw</source> (<year>2016</year>) <volume>30</volume>(<issue>6</issue>):<fpage>70</fpage>&#x2013;<lpage>6</lpage>. <pub-id pub-id-type="doi">10.1109/mnet.2016.1500221nm</pub-id> </citation>
</ref>
<ref id="B13">
<label>13.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Keating</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Hanger-Kopp</surname>
<given-names>S</given-names>
</name>
</person-group>. <article-title>Practitioner Perspectives of Disaster Resilience in International Development</article-title>. <source>Int J&#x20;Disaster Risk Reduction</source> (<year>2020</year>) <volume>42</volume>:<fpage>101355</fpage>. <pub-id pub-id-type="doi">10.1016/j.ijdrr.2019.101355</pub-id> </citation>
</ref>
<ref id="B14">
<label>14.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Harahap</surname>
<given-names>GY</given-names>
</name>
</person-group>. <article-title>Instilling Participatory Planning in Disaster Resilience Measures: Recovery of Tsunami-Affected Communities in Banda Aceh, Indonesia</article-title>. <source>Birex Budapest Internation Research Exact Science</source> (<year>2020</year>) <volume>2</volume>(<issue>3</issue>):<fpage>394</fpage>&#x2013;<lpage>404</lpage>. <pub-id pub-id-type="doi">10.33258/birex.v2i3.1085</pub-id> </citation>
</ref>
<ref id="B15">
<label>15.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Song</surname>
<given-names>Z</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>H</given-names>
</name>
<name>
<surname>Dolan</surname>
<given-names>C</given-names>
</name>
</person-group>. <article-title>Promoting Disaster Resilience: Operation Mechanisms and Self-Organizing Processes of Crowdsourcing</article-title>. <source>Sustainability</source> (<year>2020</year>) <volume>12</volume>(<issue>5</issue>):<fpage>1862</fpage>. <pub-id pub-id-type="doi">10.3390/su12051862</pub-id> </citation>
</ref>
<ref id="B16">
<label>16.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Dube</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Nhamo</surname>
<given-names>G</given-names>
</name>
<name>
<surname>Chikodzi</surname>
<given-names>D</given-names>
</name>
</person-group>. <article-title>COVID-19 Cripples Global Restaurant and Hospitality Industry[J]</article-title>. <source>Curr Issues Tourism</source> (<year>2020</year>) <volume>24</volume>:<fpage>1</fpage>&#x2013;<lpage>4</lpage>. <pub-id pub-id-type="doi">10.1080/13683500.2020.1773416</pub-id> </citation>
</ref>
<ref id="B17">
<label>17.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kurihara</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Takahata</surname>
<given-names>N</given-names>
</name>
<name>
<surname>Yokoyama</surname>
<given-names>TD</given-names>
</name>
<name>
<surname>Miura</surname>
<given-names>H</given-names>
</name>
<name>
<surname>Kon</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Takagi</surname>
<given-names>T</given-names>
</name>
<etal/>
</person-group> <article-title>Isotopic Ratios of Uranium and Caesium in Spherical Radioactive Caesium-Bearing Microparticles Derived from the Fukushima Dai-Ichi Nuclear Power Plant</article-title>. <source>Sci Rep</source> (<year>2020</year>) <volume>10</volume>(<issue>1</issue>):<fpage>3281</fpage>&#x2013;<lpage>10</lpage>. <pub-id pub-id-type="doi">10.1038/s41598-020-59933-0</pub-id> </citation>
</ref>
<ref id="B18">
<label>18.</label>
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Karsai</surname>
<given-names>I</given-names>
</name>
<name>
<surname>Schmickl</surname>
<given-names>T</given-names>
</name>
<name>
<surname>Kampis</surname>
<given-names>G</given-names>
</name>
</person-group>. <source>Resilience and Stability of Ecological and Social Systems[M]</source>. <publisher-name>Springer International Publishing</publisher-name> (<year>2020</year>). </citation>
</ref>
<ref id="B19">
<label>19.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Essuman</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Boso</surname>
<given-names>N</given-names>
</name>
<name>
<surname>Annan</surname>
<given-names>J</given-names>
</name>
</person-group>. <article-title>Operational Resilience, Disruption, and Efficiency: Conceptual and Empirical Analyses</article-title>. <source>Int J&#x20;Prod Econ</source> (<year>2020</year>) <volume>229</volume>:<fpage>107762</fpage>. <pub-id pub-id-type="doi">10.1016/j.ijpe.2020.107762</pub-id> </citation>
</ref>
<ref id="B20">
<label>20.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wan</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Yang</surname>
<given-names>Z</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Yan</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Fan</surname>
<given-names>S</given-names>
</name>
</person-group>. <article-title>Resilience in Transportation Systems: A Systematic Review and Future Directions</article-title>. <source>Transport Rev</source> (<year>2018</year>) <volume>38</volume>(<issue>4</issue>):<fpage>479</fpage>&#x2013;<lpage>98</lpage>. <pub-id pub-id-type="doi">10.1080/01441647.2017.1383532</pub-id> </citation>
</ref>
<ref id="B21">
<label>21.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Liao</surname>
<given-names>T-Y</given-names>
</name>
<name>
<surname>Hu</surname>
<given-names>T-Y</given-names>
</name>
<name>
<surname>Ko</surname>
<given-names>Y-N</given-names>
</name>
</person-group>. <article-title>A Resilience Optimization Model for Transportation Networks Under Disasters</article-title>. <source>Nat Hazards</source> (<year>2018</year>) <volume>93</volume>(<issue>1</issue>):<fpage>469</fpage>&#x2013;<lpage>89</lpage>. <pub-id pub-id-type="doi">10.1007/s11069-018-3310-3</pub-id> </citation>
</ref>
<ref id="B22">
<label>22.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ganin</surname>
<given-names>AA</given-names>
</name>
<name>
<surname>Kitsak</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Marchese</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Keisler</surname>
<given-names>JM</given-names>
</name>
<name>
<surname>Seager</surname>
<given-names>T</given-names>
</name>
<name>
<surname>Linkov</surname>
<given-names>I</given-names>
</name>
</person-group>. <article-title>Resilience and Efficiency in Transportation Networks</article-title>. <source>Sci Adv</source> (<year>2017</year>) <volume>3</volume>(<issue>12</issue>):<fpage>e1701079</fpage>. <pub-id pub-id-type="doi">10.1126/sciadv.1701079</pub-id> </citation>
</ref>
<ref id="B23">
<label>23.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Tachaudomdach</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Upayokin</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Kronprasert</surname>
<given-names>N</given-names>
</name>
<name>
<surname>Arunotayanun</surname>
<given-names>K</given-names>
</name>
</person-group>. <article-title>Quantifying Road-Network Robustness Toward Flood-Resilient Transportation Systems</article-title>. <source>Sustainability</source> (<year>2021</year>) <volume>13</volume>(<issue>6</issue>):<fpage>3172</fpage>. <pub-id pub-id-type="doi">10.3390/su13063172</pub-id> </citation>
</ref>
<ref id="B24">
<label>24.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Xu</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Jansuwan</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Yang</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Ryu</surname>
<given-names>S</given-names>
</name>
</person-group>. <article-title>Transportation Network Redundancy: Complementary Measures and Computational Methods</article-title>. <source>Transportation Res B: Methodological</source> (<year>2018</year>) <volume>114</volume>:<fpage>68</fpage>&#x2013;<lpage>85</lpage>. <pub-id pub-id-type="doi">10.1016/j.trb.2018.05.014</pub-id> </citation>
</ref>
<ref id="B25">
<label>25.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Gu</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Fu</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>Z</given-names>
</name>
<name>
<surname>Xu</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>A</given-names>
</name>
</person-group>. <article-title>Performance of Transportation Network Under Perturbations: Reliability, Vulnerability, and Resilience</article-title>. <source>Transportation Res E: Logistics Transportation Rev</source> (<year>2020</year>) <volume>133</volume>:<fpage>101809</fpage>. <pub-id pub-id-type="doi">10.1016/j.tre.2019.11.003</pub-id> </citation>
</ref>
<ref id="B26">
<label>26.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Sun</surname>
<given-names>W</given-names>
</name>
<name>
<surname>Bocchini</surname>
<given-names>P</given-names>
</name>
<name>
<surname>Davison</surname>
<given-names>BD</given-names>
</name>
</person-group>. <article-title>Resilience Metrics and Measurement Methods for Transportation Infrastructure: The State of the Art</article-title>. <source>Sustainable Resilient Infrastructure</source> (<year>2020</year>) <volume>5</volume>(<issue>3</issue>):<fpage>168</fpage>&#x2013;<lpage>99</lpage>. <pub-id pub-id-type="doi">10.1080/23789689.2018.1448663</pub-id> </citation>
</ref>
<ref id="B27">
<label>27.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Creaco</surname>
<given-names>E</given-names>
</name>
<name>
<surname>Franchini</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Todini</surname>
<given-names>E</given-names>
</name>
</person-group>. <article-title>The Combined Use of Resilience and Loop Diameter Uniformity as a Good Indirect Measure of Network Reliability</article-title>. <source>Urban Water J</source> (<year>2014</year>) <volume>13</volume>(<issue>2</issue>):<fpage>167</fpage>&#x2013;<lpage>81</lpage>. <pub-id pub-id-type="doi">10.1080/1573062x.2014.949799</pub-id> </citation>
</ref>
<ref id="B28">
<label>28.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Singh</surname>
<given-names>VP</given-names>
</name>
<name>
<surname>Oh</surname>
<given-names>J</given-names>
</name>
</person-group>. <article-title>A Tsallis Entropy-Based Redundancy Measure for Water Distribution Networks</article-title>. <source>Physica A: Stat Mech its Appl</source> (<year>2015</year>) <volume>421</volume>:<fpage>360</fpage>&#x2013;<lpage>76</lpage>. <pub-id pub-id-type="doi">10.1016/j.physa.2014.11.044</pub-id> </citation>
</ref>
<ref id="B29">
<label>29.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Greco</surname>
<given-names>R</given-names>
</name>
<name>
<surname>Di Nardo</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Santonastaso</surname>
<given-names>G</given-names>
</name>
</person-group>. <article-title>Resilience and Entropy as Indices of Robustness of Water Distribution Networks</article-title>. <source>J&#x20;Hydroinformatics</source> (<year>2012</year>) <volume>14</volume>(<issue>3</issue>):<fpage>761</fpage>&#x2013;<lpage>71</lpage>. <pub-id pub-id-type="doi">10.2166/hydro.2012.037</pub-id> </citation>
</ref>
<ref id="B30">
<label>30.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Shang</surname>
<given-names>Y</given-names>
</name>
</person-group>. <article-title>Resilient Group Consensus in Heterogeneously Robust Networks with Hybrid Dynamics</article-title>. <source>Math Meth Appl Sci</source> (<year>2021</year>) <volume>44</volume>(<issue>2</issue>):<fpage>1456</fpage>&#x2013;<lpage>69</lpage>. <pub-id pub-id-type="doi">10.1002/mma.6844</pub-id> </citation>
</ref>
<ref id="B31">
<label>31.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Yazdani</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Otoo</surname>
<given-names>RA</given-names>
</name>
<name>
<surname>Jeffrey</surname>
<given-names>P</given-names>
</name>
</person-group>. <article-title>Resilience Enhancing Expansion Strategies for Water Distribution Systems: A Network Theory Approach</article-title>. <source>Environ Model Softw</source> (<year>2011</year>) <volume>26</volume>(<issue>12</issue>):<fpage>1574</fpage>&#x2013;<lpage>82</lpage>. <pub-id pub-id-type="doi">10.1016/j.envsoft.2011.07.016</pub-id> </citation>
</ref>
<ref id="B32">
<label>32.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Porse</surname>
<given-names>E</given-names>
</name>
<name>
<surname>Lund</surname>
<given-names>J</given-names>
</name>
</person-group>. <article-title>Network Analysis and Visualizations of Water Resources Infrastructure in California: Linking Connectivity and Resilience</article-title>. <source>J&#x20;Water Resour Plann Manage</source> (<year>2016</year>) <volume>142</volume>(<issue>1</issue>):<fpage>04015041</fpage>. <pub-id pub-id-type="doi">10.1061/(asce)wr.1943-5452.0000556</pub-id> </citation>
</ref>
<ref id="B33">
<label>33.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Pettit</surname>
<given-names>TJ</given-names>
</name>
<name>
<surname>Fiksel</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Croxton</surname>
<given-names>KL</given-names>
</name>
</person-group>. <article-title>Ensuring Supply Chain Resilience: Development of a Conceptual Framework</article-title>. <source>J&#x20;business logistics</source> (<year>2010</year>) <volume>31</volume>(<issue>1</issue>):<fpage>1</fpage>&#x2013;<lpage>21</lpage>. <pub-id pub-id-type="doi">10.1002/j.2158-1592.2010.tb00125.x</pub-id> </citation>
</ref>
<ref id="B34">
<label>34.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Pettit</surname>
<given-names>TJ</given-names>
</name>
<name>
<surname>Croxton</surname>
<given-names>KL</given-names>
</name>
<name>
<surname>Fiksel</surname>
<given-names>J</given-names>
</name>
</person-group>. <article-title>Ensuring Supply Chain Resilience: Development and Implementation of an Assessment Tool</article-title>. <source>J&#x20;Bus Logist</source> (<year>2013</year>) <volume>34</volume>(<issue>1</issue>):<fpage>46</fpage>&#x2013;<lpage>76</lpage>. <pub-id pub-id-type="doi">10.1111/jbl.12009</pub-id> </citation>
</ref>
<ref id="B35">
<label>35.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hosseini</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Ivanov</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Dolgui</surname>
<given-names>A</given-names>
</name>
</person-group>. <article-title>Review of Quantitative Methods for Supply Chain Resilience Analysis</article-title>. <source>Transportation Res Part E: Logistics Transportation Rev</source> (<year>2019</year>) <volume>125</volume>:<fpage>285</fpage>&#x2013;<lpage>307</lpage>. <pub-id pub-id-type="doi">10.1016/j.tre.2019.03.001</pub-id> </citation>
</ref>
<ref id="B36">
<label>36.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Dubey</surname>
<given-names>R</given-names>
</name>
<name>
<surname>Gunasekaran</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Childe</surname>
<given-names>SJ</given-names>
</name>
<name>
<surname>Fosso Wamba</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Roubaud</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Foropon</surname>
<given-names>C</given-names>
</name>
</person-group>. <article-title>Empirical Investigation of Data Analytics Capability and Organizational Flexibility as Complements to Supply Chain Resilience</article-title>. <source>Int J&#x20;Prod Res</source> (<year>2021</year>) <volume>59</volume>(<issue>1</issue>):<fpage>110</fpage>&#x2013;<lpage>28</lpage>. <pub-id pub-id-type="doi">10.1080/00207543.2019.1582820</pub-id> </citation>
</ref>
<ref id="B37">
<label>37.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Finke</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Passino</surname>
<given-names>KM</given-names>
</name>
<name>
<surname>Sparks</surname>
<given-names>AG</given-names>
</name>
</person-group>. <article-title>Stable Task Load Balancing Strategies for Cooperative Control of Networked Autonomous Air Vehicles</article-title>. <source>IEEE Trans Contr Syst Technol</source> (<year>2006</year>) <volume>14</volume>(<issue>5</issue>):<fpage>789</fpage>&#x2013;<lpage>803</lpage>. <pub-id pub-id-type="doi">10.1109/tcst.2006.876902</pub-id> </citation>
</ref>
<ref id="B38">
<label>38.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Yang</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Yao</surname>
<given-names>H</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Jiang</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Benslimane</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Liu</surname>
<given-names>Y</given-names>
</name>
</person-group>. <article-title>Multi-UAV-Enabled Load-Balance Mobile-Edge Computing for IoT Networks</article-title>. <source>IEEE Internet Things J</source> (<year>2020</year>) <volume>7</volume>(<issue>8</issue>):<fpage>6898</fpage>&#x2013;<lpage>908</lpage>. <pub-id pub-id-type="doi">10.1109/jiot.2020.2971645</pub-id> </citation>
</ref>
<ref id="B39">
<label>39.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wu</surname>
<given-names>P</given-names>
</name>
<name>
<surname>Xiao</surname>
<given-names>F</given-names>
</name>
<name>
<surname>Huang</surname>
<given-names>H</given-names>
</name>
<name>
<surname>Wang</surname>
<given-names>R</given-names>
</name>
</person-group>. <article-title>Load Balance and Trajectory Design in Multi-UAV Aided Large-Scale Wireless Rechargeable Networks</article-title>. <source>IEEE Trans Veh Technol</source> (<year>2020</year>) <volume>69</volume>(<issue>11</issue>):<fpage>13756</fpage>&#x2013;<lpage>67</lpage>. <pub-id pub-id-type="doi">10.1109/tvt.2020.3026788</pub-id> </citation>
</ref>
<ref id="B40">
<label>40.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Luo</surname>
<given-names>XS</given-names>
</name>
<name>
<surname>Zhang</surname>
<given-names>B</given-names>
</name>
</person-group>. <article-title>Analysis of Cascading Failure in Complex Power Networks Under the Load Local Preferential Redistribution Rule[J]</article-title>. <source>Physica A: Stat Mech its Appl</source> (<year>2012</year>) <volume>391</volume>(<issue>8</issue>):<fpage>2771</fpage>&#x2013;<lpage>7</lpage>. </citation>
</ref>
<ref id="B41">
<label>41.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Tran</surname>
<given-names>HT</given-names>
</name>
<name>
<surname>Domer&#xe7;ant</surname>
<given-names>JC</given-names>
</name>
<name>
<surname>Mavris</surname>
<given-names>DN</given-names>
</name>
</person-group>. <article-title>A Network-Based Cost Comparison of Resilient and Robust System-Of-Systems</article-title>. <source>Proced Comp Sci</source> (<year>2016</year>) <volume>95</volume>:<fpage>126</fpage>&#x2013;<lpage>33</lpage>. <pub-id pub-id-type="doi">10.1016/j.procs.2016.09.302</pub-id> </citation>
</ref>
<ref id="B42">
<label>42.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wen</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Tu</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Wu</surname>
<given-names>M</given-names>
</name>
</person-group>. <article-title>Node Importance Evaluation in Aviation Network Based on "No Return" Node Deletion Method</article-title>. <source>Physica A: Stat Mech its Appl</source> (<year>2018</year>) <volume>503</volume>:<fpage>546</fpage>&#x2013;<lpage>59</lpage>. <pub-id pub-id-type="doi">10.1016/j.physa.2018.02.109</pub-id> </citation>
</ref>
</ref-list>
</back>
</article>