Open Access
ARTICLE
An Intelligent Framework for Resilience Recovery of FANETs with Spatio-Temporal Aggregation and Multi-Head Attention Mechanism
1 Air Traffic Control and Navigation College, Air Force Engineering University, Xi’an, 710000, China
2 Institute of Systems Engineering, Academy of Military Science, Beijing, 100101, China
3 Equipment Management and UAV Engineering College, Air Force Engineering University, Xi’an, 710038, China
4 Defense Innovation Institute, Academy of Military Science, Beijing, 100071, China
* Corresponding Authors: Yun Sun. Email: ; Jilong Zhong. Email:
(This article belongs to the Special Issue: Industrial Big Data and Artificial Intelligence-Driven Intelligent Perception, Maintenance, and Decision Optimization in Industrial Systems)
Computers, Materials & Continua 2024, 79(2), 2375-2398. https://doi.org/10.32604/cmc.2024.048112
Received 28 November 2023; Accepted 22 March 2024; Issue published 15 May 2024
Abstract
Due to the time-varying topology and possible disturbances in a conflict environment, it is still challenging to maintain the mission performance of flying Ad hoc networks (FANET), which limits the application of Unmanned Aerial Vehicle (UAV) swarms in harsh environments. This paper proposes an intelligent framework to quickly recover the cooperative coverage mission by aggregating the historical spatio-temporal network with the attention mechanism. The mission resilience metric is introduced in conjunction with connectivity and coverage status information to simplify the optimization model. A spatio-temporal node pooling method is proposed to ensure all node location features can be updated after destruction by capturing the temporal network structure. Combined with the corresponding Laplacian matrix as the hyperparameter, a recovery algorithm based on the multi-head attention graph network is designed to achieve rapid recovery. Simulation results showed that the proposed framework can facilitate rapid recovery of the connectivity and coverage more effectively compared to the existing studies. The results demonstrate that the average connectivity and coverage results is improved by 17.92% and 16.96%, respectively compared with the state-of-the-art model. Furthermore, by the ablation study, the contributions of each different improvement are compared. The proposed model can be used to support resilient network design for real-time mission execution.Keywords
With its high mobility, low cost, and strong flexibility, unmanned aerial vehicle (UAV) swarm has been widely used in various applications, such as surveillance [1], agriculture [2], rescue [3], etc. In these applications, large numbers of UAVs cooperate with others as a UAV swarm relying on communicating with one another, thus the connectivity of the communication network is a vital necessity for a UAV swarm. However, the harsh working environment and complicated mission requirements make it difficult to ensure the connectivity of the networks. As a kind of flying Ad hoc network (FANET), the occurrence of communication links between UAVs depends on the communication radius and location distribution [4]. Although expanding the communication radius of each drone seems intuitive and effective, however, it is not practical due to the energy constraint and the fading effect [5]. At the same time, a certain amount of redundant drones can not ensure resilient connectivity when more drones are damaged. Thus, changing location deployment has become a common strategy to keep the network resilient after destruction.
However, there are still some challenges to quickly rebuilding network connectivity by redeploying locations. First, when drones are destroyed, it is difficult to model the network structure consisting of changing nodes and edges under continuous destruction [6]. The second challenge is how to further reduce self-recovery time with real-time communication and storage limits, which is closely related to network resilience. At last, quick network connectivity recovery and adequate coverage have contradicting focuses. It is seemingly straightforward to rebuild the connectivity by drones moving closer to each other. However, to ensure the network coverage performance each drone should cover enough non-overlapping area to avoid duplicate effort. Thus, how to balance the network coverage and network connectivity needs to be carefully considered.
To tackle the challenges above, we propose a graph attention network (GAT)-based mechanism to recover both coverage and connectivity for a resilient swarm network against random destruction in this paper. The main contributions of our work are summarized as follows:
• We build a system recovery model for a swarm network from the perspective of engineering resilience. Our model considers both the coverage and the connectivity when serious damage happens.
• We propose a temporal aggregation graph generating method to provide a persistent connected graph structure for computing the combination of the drones’ location feature vectors. Our model is based on the historical and current location information of both destroyed drones and remaining drones, which can still update the new location features on all nodes even if the node is isolated from other nodes in the current network.
• We incorporate structural information from the temporal aggregation graph into GAT. Simulation results show that the proposed methods can recover coverage and connectivity. At the same time, the results show that our methods reduce recovery time.
The remainder of the paper is organized as follows: Section 2 reviews the related work. Section 3 describes the system model, the temporal aggregation graph generating method, and the graph self-attention mechanism with the aggregation graph for feature vector updating. Section 4 presents simulation results and analysis of the proposed algorithm and Section 5 concludes the work.
Most of the notations applied in this paper are standard. To ease readability, all the primary notations of the paper are listed in Table 1.
Due to complicated mission requirements, the network is required to be self-adaptive to destructive events in the harsh working environment. The attribute measuring this dynamic process is usually called resilience. Resilience commonly measures the whole process of a system from interference, damage, and recovery. Currently, the resilience of swarm networks has received increasing attention [7–9]. However, the above methods only proposed metrics for evaluation but offered little specific guidance for keeping the swarm network resilient. Despite the lack of resilience-based mechanisms, some works are aiming at recovering the coverage and connectivity of swarm networks through deployment techniques.
Some studies proposed theoretical results of network coverage and connectivity by using geometric models to find analytical solutions under certain conditions [10]. For instance, Mozaffar et al. [11] utilized circle packing theory to determine the optimal three-dimensional location that maximizes the total coverage area of the swarm. Bai et al. [12] proposed an optimal deployment pattern that achieves full coverage and 2-connectivity when the communication radius equals the perception radius of each drone. However, the strict assumptions for these analytical models make it challenging to apply for the recovery of a highly dynamic swarm network [13].
Several studies attempted to recover the network based on iterative adjustment of drones’ locations. For instance, Sharma et al. [14] introduced a scheme to recover coverage and connectivity by recursively relocating mobile nodes and enabling backup nodes. Chen et al. [15] proposed a potential field-based network approach depending upon perceiving network damage, which can recover the network connectivity in flight paths. Qi et al. [16] presented a network topology construction method based on connected dominating sets, which iteratively adjusts transmission power and position to achieve desired fault tolerance levels. However, due to multiple iterations, these works involve extensive communication and redirection during the recovery, which potentially hinders rapid recovery after massive destruction events happen.
Several studies have employed machine learning algorithms, such as graph neural networks (GNN) [17,18], deep learning techniques, and other approaches [19,20], to address the problem. For instance, Mou et al. [18] proposed a graph convolutional neural network (GCN)-based algorithm for UAV trajectory planning to rebuild the communication connectivity of the network. However, this approach relies on a lot of storage space for meta parameters to adapt to changes in the number of network nodes. Zhang et al. [20] introduced a reinforcement learning method based on an artificial potential field for a robust network design. Nevertheless, machine learning algorithms demand massive computational resources and may have poor scalability across different system models.
As shown in Table 2, the existing models through deployment techniques cannot meet all the requirements of resilient recovery.
3.1 The Resilience Optimization Model
We consider a square geographical area with a diameter of
Definition 1 (Covering and Connected Network): A covering and connected network denotes a network composed of
The above definition has generality since it can describe various air-to-ground coverage missions, including wireless communication, monitoring, lighting, or other services for ground targets. As shown in Fig. 1, Although the coverage radius will increase with the height of a UAV, increasing the height will also lead to further distance between the UAV and the target, which may lower the service level of certain missions. Thus, we assume the service level threshold is
where
where
In this paper, the FANET between UAVs at time t is modeled as a communication network
where r is the distance between drones, fc is the carrier frequency,
According to the fading effect, communication links only exist between nodes within a certain distance. Specifically, the communication range is defined as
Definition 2 (Connected Network): In a coverage area, if any two drones in the FANET can always transmit information to each other through the routing, that is, given a network
Based on spectral graph theory, in a network with only one component, there is only one eigenvector with eigenvalue zero, the vector 1 (or multiples of it). All other eigenvectors must have non-zero eigenvalues. Thus, to check whether the network is connected, we calculate the eigenvalues of the Laplace matrix of the network. Define the adjacency matrix of network
where
When serious destruction happens, the connected network may be divided into a set of connected components. However, the neighbors of the destroyed drones can sense the destruction and update their neighbor sets. Then the drones in the same connected network share real-time location information and the existing situation of all drones in the network. Based on the location information, the remaining drones attempted to recover the network by adjusting their location.
The goal of our work is to provide a mechanism for keeping the network covering and connected resiliently. Denote the coverage area of node i within the connected component k as
Then the network performance of coverage and connectivity can be defined as the average coverage of each connected component as follows:
where M is the number of connected components and
where
As shown in Fig. 2, when
when the flying velocity vf is fixed, and the recovery time
where
In the next parts, we will describe the specific procedures of the optimization algorithm. The objective is to maximize the resilience measure defined in formula (11). We describe the two primary parts of our algorithm: Spatial-temporal connected graph generation and the multi-head graph neural network. The whole framework of the algorithm is summarized in Fig. 3.
3.2 Spatial-Temporal Connected Graph Generation
Noticing that the graph neural network is good at representing graph data features, we developed an idea using a graph neural network to learn the mapping from the initial locations of drones to optimized locations. However, if the network
We denote the set of connected network structures during running stored by the drone i as
Due to the decrease in the number of nodes after each disruption, the number of connected graph nodes at different time steps in
The steps of this method are as follows: As shown in Fig. 4, we perform the pooling operation on the graph in the set
Specifically, for the j-th graph
where
By preserving all edges on remaining nodes during deletion, connectivity within newly formed graphs is ensured. Denote the new connected graph set generated by node pooling as
We assume the impact of a historical graph in
where
Step 1: We calculate the Euclidean distance from the destroyed node to other nodes in the network, then update the nearest node. We record and determine central nodes for the spatial aggregation based on the minimum Euclidean distance between nodes.
Step 2: We transfer the edges on the damaged node to the corresponding aggregation node. It should be noted that when operating on the whole adjacency matrix to avoid the potential interference of operations on the subsequent nodes. Finally, delete the edges on the damaged nodes as a whole.
Step 3: For each spatial-temporal network, we repeat steps 1 to 2 and record the connected network structure formed for each spatial-temporal network until there is no spatial-temporal network in the temporal graph set.
Step 4: We aggregate the connected spatial-temporal network according to the formula (15).
Based on the above mechanism, we can generate a spatial-temporal connected graph according to Algorithm 1.
3.3 The Multi-Head Graph Network with Structure Importance Hyperparameter for Target Location Generation
To generate the target location for the recovery of the swarm, We propose the temporal aggregation graph attention network (TAGAT) to map the location after destruction to the new location for quick recovery. GCN or Graphsage was employed by some existing methods [26]. However, both GCN and Graphsage are based on the assumption that the effect of each dimension of each neighboring node’s features on the central node features is homogeneous, for instance, the effect of the distance in each direction on the Euclidean distance between nodes is the same in three-dimensional space for connectivity recovery. However, this assumption may not be suitable for coverage recovery. When considering coverage performance, the effect of height features and horizontal position features on the radius of ground horizontal projection is different, so it is necessary to consider using attention mechanisms to learn the difference between these features. The self-attention mechanism allows models to adaptively select key information based on task requirements when processing data, thereby focusing on important features and ignoring relatively unimportant ones. Therefore, using attention mechanisms can enhance the modeling ability of models for complex equipment system state changes. For example, Transformer models and their variants based on attention mechanisms have been widely used in fault diagnosis of mechanical systems [27,28]. Both Transformer and GAT utilize self-attention mechanisms to capture the correlation between inputs, while GAT is more suitable for graph-structured data. However, GAT lacks direct utilization of graph structure information of data, which makes GATs prone to underfitting in learning tasks related to structural features [29,30]. Thus, it is necessary to consider combining the temporal aggregation graph with GAT to improve the learning ability of the network.
We provide the definition of the graph attention operator. The input is graph data
The self-attention mechanism is calculated point by point, assuming the central node is v, the edge weights from neighboring node u to node v are calculated as follows:
where
When
Then, using a multi-head attention mechanism with K independent heads for calculating features, the new feature vector of the central node v can be obtained by averaging the weighted sum of the feature vectors of itself and neighboring nodes.
where the activation function
where
where
We use randomly generated pairs of the connected and non-connected graph to pretrain the network, then use pretraining parameters to accelerate the training speed of the algorithm in on-line execution as Fig. 6 shows. Specifically, a connected graph is randomly generated and a certain number of nodes are destroyed, if the generated graph is not connected, the damaged node number is recorded. The above connected graph and the non-connected graph are input into the network for training. Since the weights need to be retrained only when the number of network layers and dimension of features vary, and the weights
In the simulation, the initial swarm consists of 200 drones, with drones distributed in 1000 × 1000 × 100 patches space, thus the size of the target ground area to cover is 1000 × 1000 patches, as shown in Fig. 7. Due to the large number of drones, there is some redundancy in the network’s coverage of the ground area. However, under destruction, the coverage will be split with the components of the network. We apply standard parameter values as shown in Table 3 unless otherwise specified. In addition, all the results of simulations are averages obtained over 30 simulations.
To study the performance of our method, we simulate the process of network connectivity recovery under single and continuous destructions, and compared the performance with SIDR [15], CM-MGCM [18], and CEN [18]. To conduct the experiments, the AMD Ryzen 7 5800H processor with Radeon Graphics is exploited. For connectivity verification, our main concern is to keep the entire network connected. Thus, we use the connected time step ratio as the evaluation measure for connectivity recovery. For coverage recovery verification, the resilience can be represented by the average network coverage performance R in a certain time slot based on (6) and (7), which can be represented as follows:
where Ts is the time slot length, t0 is the beginning time, M is the number of connected components, and
Fig. 8 shows the different trajectories and coverage areas of the drones during a certain recovery process with TAGAT and CEN. It can be seen that the flight trajectory with TAGAT is not only simply moving toward the center of the group but also can achieve coverage recovery.
4.1 Effect of the Proposed Framework on Network Connectivity Recovery
As shown in Fig. 9, we randomly destroy several nodes in the network from 15 to 135. In Figs. 9a–9c, we show the number of network clusters changes when the number of destructed drones is 15, 60, and 105, respectively. Figs. 9a–9c show the number of network clusters that changes with time under different numbers of destructed drones. When the number of damages is equal to 15, the performance of the TAGAT is similar to that of the CR-MGCM. Although the CR-MGCM has the best performance in the above cases, with the number of destructed drones increasing, the performance of the CR-MGCM obviously decreases. In contrast, when the number of damages is greater than 15, the TAGAT shows significantly better performance than the existing algorithms.
In Fig. 9d, we calculate the ratio of time T required for full recovery to the total time interval T*, and here set the T* = 300. Fig. 9d specifies the average of the connected time step ratio under different numbers of destructed drones with different algorithms. When the number of destructed drones varies from 15 to 135, the average results of the TAGAT are greater than those of the other three algorithms, i.e., the TAGAT algorithm can recover network connectivity faster. As shown in Fig. 9d, the connected time step ratio of TAGAT when the number of damages is greater than 15 is the highest, and the average result is improved by 17.92% compared with CR-MGCM.
As shown in Fig. 10, we simulate multiple destructions using a fixed case to ensure the same effect on the network, with a total time duration set to 150. In Fig. 10a, the destructions happen at times t = 10, t = 30, t = 100, and the number of destructions was 50, 10, and 10, respectively. It can be seen that after each destruction, the TAGAT can quickly recover network connectivity. Although with the CR-MGCM and the CEN, the network was not segmented after the third destruction, the recovery time of the above two algorithms was still too long after the first and second destruction. Thus, in terms of total connected time, the TAGAT maintains the network connected for the longest time. In Fig. 10b, the average and median connected time step ratios are higher than other algorithms regardless of the length of the time slot. Furthermore, with more destructions happening, the more TAGAT outperforms other algorithms.
4.2 Effect of the Proposed Framework on Network Coverage Recovery
To validate the effectiveness of the proposed method in coverage recovery, we also simulate the process of network connectivity recovery under single and continuous destructions and calculate the network resilience with different algorithms. As shown in Figs. 11a–11c, with the same experiment settings, the distribution of the network resilience under different numbers of destructed drones with different algorithms is similar to the results on connectivity. When the number of damages is more than 15, the coverage performance of the TAGAT is better than that of the CR-MGCM. With the number of destructed drones increasing, the gap between the coverage performances of TAGAT and CR-MGCM obviously increases. In Fig. 11d, the network resilience of TAGAT when the number of damages is greater than 15 is also the highest, and the average result is improved by 16.96% compared with CR-MGCM.
Fig. 12 presents the changes in coverage performance during the process of recovering network coverage. In Fig. 12a, it can be seen that the TAGAT, the CM-MGCM, and the CEN can all recover network coverage, but the SIDR is difficult to achieve. The TAGAT can recover network coverage faster compared to the CM-MGCM and the CEN, thereby achieving resilient network coverage. In Fig. 12b, the average and median resilience of the network with the TAGAT are stronger than other algorithms. With the length of time slot increases, TAGAT has better performance than other algorithms.
Furthermore, to explicitly illustrate the contributions of the above improvements in performance enhancement, we perform the ablation study by creating different TAGAT variants, replacing one model component each time while keeping the rest unchanged, i.e., No-LossCoefficient, No-SructureImportance, and No-TemporalAggregationGraph.
In Fig. 13, the ablation study on network connectivity and network coverage is shown. We note that TAGAT is superior to all TAGAT variants without the above improvements, for both the network connectivity and network coverage, which shows that the above improvements help improve the ability to recover connectivity and coverage. The results indicate that all our improvement points help to improve the performances after various numbers of destructions, among which the temporal aggregation graph contributes the most, and the loss coefficient contributes the least, as the results demonstrate the worst ability to recover connectivity and coverage when TAGAT without the temporal aggregation graph unit.
In this paper, we studied the connectivity and coverage recovery problem of FANET with changing nodes and edges under destructions. Specifically, we proposed a recovery model considering both the coverage and the connectivity based on engineering resilience. Then, we incorporated a temporal aggregation graph generating method into GAT. Simulation results showed that the proposed algorithms can facilitate rapid recovery of the connectivity and coverage more effectively compared to the existing algorithms. In addition, by the ablation study, we quantify the contributions of each different improvement, indicating the temporal aggregation graph contributes the most to the performance of the rapid recovery.
In this study, the network we focused on is homogeneous, i.e., each drone plays the same role and shares the same power limit in the network. However, the scenarios of heterogeneous units jointly executing various missions began to appear in reality recently. In the future, we may extend our work to the heterogeneous FANET.
Acknowledgement: The authors would like to thank Jie Li and Chuhan Zhou for their assistances during writing.
Funding Statement: This research was funded by the National Natural Science Foundation of China (NNSFC) (Grant Nos. 72001213 and 72301292), the National Social Science Fund of China (Grant No. 19BGL297), and the Basic Research Program of Natural Science in Shaanxi Province (Grant No. 2021JQ-369).
Author Contributions: The authors confirm contribution to the paper as follows: Conceptualization, Zhijun Guo and Yun Sun; methodology, Ying Wang; software, Zhijun Guo and Chaoqi Fu; validation, Ying Wang and Jilong Zhong; formal analysis, Zhijun Guo and Yun Sun; writing—original draft preparation, Zhijun Guo; writing—review and editing, Jilong Zhong and Yun Sun. All authors have read and agreed to the published version of the manuscript.
Availability of Data and Materials: Due to the nature of this research, participants of this study did not agree for their data to be shared publicly, so supporting data is not available.
Conflicts of Interest: The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
References
1. H. Wang, H. Zhao, J. Zhang, D. Ma, J. Li and J. Wei, “Survey on unmanned aerial vehicle networks: A cyber physical system perspective,” IEEE Commun. Surv. Tutorials, vol. 22, no. 2, pp. 1027–1070, 2020. doi: 10.1109/COMST.2019.2962207. [Google Scholar] [CrossRef]
2. L. Gupta, R. Jain, and G. Vaszkun, “Survey of important issues in UAV communication networks,” IEEE Commun. Surv. Tutorials, vol. 18, no. 2, pp. 1123–1152, 2016. doi: 10.1109/COMST.2015.2495297. [Google Scholar] [CrossRef]
3. S. Hayat, E. Yanmaz, and R. Muzaffar, “Survey on unmanned aerial vehicle networks for civil applications: A communications viewpoint,” IEEE Commun. Surv. Tutorials, vol. 18, no. 4, pp. 2624–2661, 2016. doi: 10.1109/COMST.2016.2560343. [Google Scholar] [CrossRef]
4. A. Chriki, H. Touati, H. Snoussi, and F. Kamoun, “FANET: Communication, mobility models and security issues,” Comput. Netw., vol. 12, no. 9, pp. 163, 2019. doi: 10.1016/j.comnet.2019.106877. [Google Scholar] [CrossRef]
5. A. I. Hentati and L. C. Fourati, “Comprehensive survey of UAVs communication networks,” Comput. Stand. Interf., vol. 3, no. 3, pp. 72, 2020. doi: 10.1016/j.csi.2020.103451. [Google Scholar] [CrossRef]
6. P. Holme and J. Saramäki, “Temporal networks,” Phy. Rep., vol. 519, no. 3, pp. 97–125, 2012. doi: 10.1016/j.physrep.2012.03.001. [Google Scholar] [CrossRef]
7. S. Scellato, I. Leontiadis, C. Mascolo, P. Basu, and M. Zafer, “Evaluating temporal robustness of mobile networks,” IEEE Trans. Mob. Comput., vol. 12, no. 1, pp. 105–117, 2013. doi: 10.1109/TMC.2011.248. [Google Scholar] [CrossRef]
8. G. Bai, Y. Li, Y. Fang, Y. A. Zhang, and J. Tao, “Network approach for resilience evaluation of a UAV swarm by considering communication limits,” Reliab. Eng. Syst. Safety, vol. 11, no. 4, pp. 193, 2020. doi: 10.1016/j.ress.2019.106602. [Google Scholar] [CrossRef]
9. K. Liu, J. Zhong, G. Bai, and Y. Yang, “A complex networks approach for reliability evaluation of swarm systems under malicious attacks,” IEEE Access, vol. 8, pp. 81209–81219, 2020. doi: 10.1109/ACCESS.2020.2991211. [Google Scholar] [CrossRef]
10. A. Pananjady, V. K. Bagaria, and R. Vaze, “Optimally approximating the coverage lifetime of wireless sensor networks,” IEEE/ACM Trans. Netw., vol. 25, no. 1, pp. 98–111, 2017. doi: 10.1109/TNET.2016.2574563. [Google Scholar] [CrossRef]
11. M. Mozaffari, W. Saad, M. Bennis, and M. Debbah, “Efficient deployment of multiple unmanned aerial vehicles for optimal wireless coverage,” IEEE Commun. Lett., vol. 20, no. 8, pp. 1647–1650, 2016. doi: 10.1109/LCOMM.2016.2578312. [Google Scholar] [CrossRef]
12. X. Bai, Z. Yun, D. Xuan, W. Jia, and W. Zhao, “Pattern mutation in wireless sensor deployment,” presented at the IEEE INFOCOM 2010, San Diego, CA, USA, 2010, pp. 1–9. [Google Scholar]
13. M. Li, Z. Li, and A. V. Vasilakos, “A survey on topology control in wireless sensor networks: Taxonomy comparative study, and open issues,” in Proc. IEEE, vol. 101, pp. 2538–2557, 2013. [Google Scholar]
14. K. P. Sharma and T. P. Sharma, “ZBFR: Zone based failure recovery in WSNs by utilizing mobility and coverage overlapping,” Wirel. Netw., vol. 23, no. 7, pp. 2263–2280, 2016. doi: 10.1007/s11276-016-1291-2. [Google Scholar] [CrossRef]
15. M. Chen, H. Wang, C. Y. Chang, and X. Wei, “SIDR: A swarm intelligence-based damage-resilient mechanism for UAV swarm networks,” IEEE Access, vol. 8, pp. 77089–77105, 2020. doi: 10.1109/ACCESS.2020.2989614. [Google Scholar] [CrossRef]
16. X. Qi, P. Yuan, Q. Zhang, and Z. Yang, “CDS-based topology control in FANETs via power and position optimization,” IEEE Wirel. Commun. Lett., vol. 9, no. 12, pp. 2015–2019, 2020. doi: 10.1109/LWC.2020.3009666. [Google Scholar] [CrossRef]
17. J. Guo and C. Yang, “Learning power allocation for multi-cell-multi-user systems with heterogeneous graph neural networks,” IEEE Trans. Wirel. Commun., vol. 21, no. 2, pp. 884–897, 2022. doi: 10.1109/TWC.2021.3100133. [Google Scholar] [CrossRef]
18. Z. Mou, F. Gao, J. Liu, and Q. Wu, “Resilient UAV swarm communications with graph convolutional neural network,” IEEE J. Selected Areas Commun., vol. 40, pp. 393–411, 2022. [Google Scholar]
19. Z. Mou, Y. Zhang, F. Gao, H. Wang, T. Zhang and Z. Han, “Deep reinforcement learning based three-dimensional area coverage with UAV swarm,” IEEE J. Sel. Areas Commun., vol. 39, no. 10, pp. 3160–3176, 2021. doi: 10.1109/JSAC.2021.3088718. [Google Scholar] [CrossRef]
20. C. Zhang, W. Yao, Y. Zuo, H. Wang, and C. Zhang, “Robust multiple unmanned aerial vehicle network design in a dense obstacle environment,” Drones, vol. 7, no. 8, pp. 508–526, 2023. doi: 10.3390/drones7080506. [Google Scholar] [CrossRef]
21. J. Lyu and R. Zhang, “Network-connected UAV: 3-D system modeling and coverage performance analysis,” IEEE Internet Things J., vol. 6, no. 4, pp. 7048–7060, 2019. doi: 10.1109/JIOT.2019.2913887. [Google Scholar] [CrossRef]
22. F. Chung, “The laplacian and eigenvalues,” in Spectral Graph Theory (CBMS Regional Conference Series in Mathematics), 1st ed. Providence, Rhode Island, USA, 1996, vol. 1, pp. 2–6. [Google Scholar]
23. S. Hosseini, K. Barker, and J. E. Ramirez-Marquez, “A review of definitions and measures of system resilience,” Reliab. Eng. Syst. Safety, vol. 145, no. 12, pp. 47–61, 2016. doi: 10.1016/j.ress.2015.08.006. [Google Scholar] [CrossRef]
24. C. Cangea, P. Veličković, N. Jovanović, T. Kipf, and P. Liò, “Towards sparse hierarchical graph classifiers,” arXiv:1811.01287, 2018. [Google Scholar]
25. S. Ruder, “An overview of gradient descent optimization algorithms,” arXiv:1609.04747, 2016. [Google Scholar]
26. W. L. Hamilton, R. Ying, and J. Leskovec, “Inductive representation learning on large graphs,” in Proc. 31st Int. Conf. Neur. Inf. Process. Syst., Long Beach, California, USA, 2017, pp. 1025–1035. [Google Scholar]
27. Y. Xiao, H. Shao, M. Feng, T. Han, J. Wan and B. Liu, “Towards trustworthy rotating machinery fault diagnosis via attention uncertainty in transformer,” J. Manuf. Syst., vol. 70, no. 9, pp. 186–201, 2023. doi: 10.1016/j.jmsy.2023.07.012. [Google Scholar] [CrossRef]
28. S. Yan, H. Shao, J. Wang, X. Zheng, and B. Liu, “LiConvFormer: A lightweight fault diagnosis framework using separable multiscale convolution and broadcast self-attention,” Expert. Syst. App., vol. 237, no. 1, pp. 1213–1238, 2024. doi: 10.1016/j.eswa.2023.121338. [Google Scholar] [CrossRef]
29. Z. Liu and J. Zhou, “Graph attention networks, Introduction to graph neural networks,” Synth. Lect. Artif. Intell. Mach. Learn., vol. 14, pp. 1–127, 2020. [Google Scholar]
30. S. Brody, U. Alon, and E. Yahav, “How attentive are graph attention networks?,” arXiv:2105.14491, 2021. [Google Scholar]
31. A. Barabási, “Network robustness,” in Network Science, 1st ed. UK: Cambridge University Press, 2016, pp. 5–8. [Google Scholar]
32. D. D. Woods, “Four concepts for resilience and the implications for the future of resilience engineering,” Reliab. Eng. Syst. Safety, vol. 141, no. 1, pp. 5–9, 2015. doi: 10.1016/j.ress.2015.03.018. [Google Scholar] [CrossRef]
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.