Strategy optimization method based on UAVs‐assisted detection of covert communication Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.4218/etrij.2024-0178
Unmanned aerial vehicles (UAVs) are highly mobile and easily deployable devices that have become an important component of wireless communication countermeasures. Covert communication, the main method used to ensure wireless communication security, has been extensively studied in recent years. However, existing research primarily uses UAVs as auxiliary tools for covert communications, to improve communication performance, ignoring situations in which the detector utilizes UAVs for interference suppression. In this study, we propose a UAV‐assisted jamming detection covert communication game model. Specifically, the UAV actively transmits noise to Alice's transmission channels to disrupt covert transmission when Willie detects a covert communication transmission. Furthermore, we analyze the adversarial process between the detector and Alice under UAV‐assisted jamming based on game theory, theoretically verify the conditions for the existence of a Nash equilibrium, and formulate optimal strategies for both sides.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.4218/etrij.2024-0178
- OA Status
- diamond
- References
- 28
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4407373753
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4407373753Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.4218/etrij.2024-0178Digital Object Identifier
- Title
-
Strategy optimization method based on UAVs‐assisted detection of covert communicationWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-02-10Full publication date if available
- Authors
-
X Wang, Wen Tian, Guangjie Liu, Yong DaiList of authors in order
- Landing page
-
https://doi.org/10.4218/etrij.2024-0178Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
diamondOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.4218/etrij.2024-0178Direct OA link when available
- Concepts
-
Covert, Computer science, Real-time computing, Linguistics, PhilosophyTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
28Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4407373753 |
|---|---|
| doi | https://doi.org/10.4218/etrij.2024-0178 |
| ids.doi | https://doi.org/10.4218/etrij.2024-0178 |
| ids.openalex | https://openalex.org/W4407373753 |
| fwci | 0.0 |
| type | article |
| title | Strategy optimization method based on UAVs‐assisted detection of covert communication |
| awards[0].id | https://openalex.org/G4899784454 |
| awards[0].funder_id | https://openalex.org/F4320321001 |
| awards[0].display_name | |
| awards[0].funder_award_id | 62072250 |
| awards[0].funder_display_name | National Natural Science Foundation of China |
| awards[1].id | https://openalex.org/G4024624778 |
| awards[1].funder_id | https://openalex.org/F4320322769 |
| awards[1].display_name | |
| awards[1].funder_award_id | BK20230415 |
| awards[1].funder_display_name | Natural Science Foundation of Jiangsu Province |
| awards[2].id | https://openalex.org/G2631150135 |
| awards[2].funder_id | https://openalex.org/F4320321001 |
| awards[2].display_name | |
| awards[2].funder_award_id | U21B2003 |
| awards[2].funder_display_name | National Natural Science Foundation of China |
| awards[3].id | https://openalex.org/G5926607211 |
| awards[3].funder_id | https://openalex.org/F4320321001 |
| awards[3].display_name | |
| awards[3].funder_award_id | 62401269 |
| awards[3].funder_display_name | National Natural Science Foundation of China |
| biblio.issue | 4 |
| biblio.volume | 47 |
| biblio.last_page | 616 |
| biblio.first_page | 603 |
| topics[0].id | https://openalex.org/T11133 |
| topics[0].field.id | https://openalex.org/fields/22 |
| topics[0].field.display_name | Engineering |
| topics[0].score | 0.9997000098228455 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/2202 |
| topics[0].subfield.display_name | Aerospace Engineering |
| topics[0].display_name | UAV Applications and Optimization |
| topics[1].id | https://openalex.org/T10964 |
| topics[1].field.id | https://openalex.org/fields/22 |
| topics[1].field.display_name | Engineering |
| topics[1].score | 0.9925000071525574 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/2208 |
| topics[1].subfield.display_name | Electrical and Electronic Engineering |
| topics[1].display_name | Wireless Communication Security Techniques |
| topics[2].id | https://openalex.org/T11498 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9919000267982483 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1705 |
| topics[2].subfield.display_name | Computer Networks and Communications |
| topics[2].display_name | Security in Wireless Sensor Networks |
| funders[0].id | https://openalex.org/F4320321001 |
| funders[0].ror | https://ror.org/01h0zpd94 |
| funders[0].display_name | National Natural Science Foundation of China |
| funders[1].id | https://openalex.org/F4320322769 |
| funders[1].ror | https://ror.org/01h0zpd94 |
| funders[1].display_name | Natural Science Foundation of Jiangsu Province |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C2779338814 |
| concepts[0].level | 2 |
| concepts[0].score | 0.6873072385787964 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q5179285 |
| concepts[0].display_name | Covert |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.5842132568359375 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C79403827 |
| concepts[2].level | 1 |
| concepts[2].score | 0.39196720719337463 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q3988 |
| concepts[2].display_name | Real-time computing |
| concepts[3].id | https://openalex.org/C41895202 |
| concepts[3].level | 1 |
| concepts[3].score | 0.0 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q8162 |
| concepts[3].display_name | Linguistics |
| concepts[4].id | https://openalex.org/C138885662 |
| concepts[4].level | 0 |
| concepts[4].score | 0.0 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q5891 |
| concepts[4].display_name | Philosophy |
| keywords[0].id | https://openalex.org/keywords/covert |
| keywords[0].score | 0.6873072385787964 |
| keywords[0].display_name | Covert |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.5842132568359375 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/real-time-computing |
| keywords[2].score | 0.39196720719337463 |
| keywords[2].display_name | Real-time computing |
| language | en |
| locations[0].id | doi:10.4218/etrij.2024-0178 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S202469819 |
| locations[0].source.issn | 1225-6463, 2233-7326 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 1225-6463 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | True |
| locations[0].source.display_name | ETRI Journal |
| locations[0].source.host_organization | https://openalex.org/P4310319529 |
| locations[0].source.host_organization_name | Electronics and Telecommunications Research Institute |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319529 |
| locations[0].source.host_organization_lineage_names | Electronics and Telecommunications Research Institute |
| locations[0].license | |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | ETRI Journal |
| locations[0].landing_page_url | https://doi.org/10.4218/etrij.2024-0178 |
| locations[1].id | pmh:oai:doaj.org/article:91137eebb5934fef93a44f706c24298e |
| locations[1].is_oa | False |
| locations[1].source.id | https://openalex.org/S4306401280 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | False |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | DOAJ (DOAJ: Directory of Open Access Journals) |
| locations[1].source.host_organization | |
| locations[1].source.host_organization_name | |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | article |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | ETRI Journal, Vol 47, Iss 4, Pp 603-616 (2025) |
| locations[1].landing_page_url | https://doaj.org/article/91137eebb5934fef93a44f706c24298e |
| indexed_in | crossref, doaj |
| authorships[0].author.id | https://openalex.org/A5003570414 |
| authorships[0].author.orcid | https://orcid.org/0009-0003-8994-5640 |
| authorships[0].author.display_name | X Wang |
| authorships[0].countries | CN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I200845125 |
| authorships[0].affiliations[0].raw_affiliation_string | Electronic Information Nanjing University of Information Science & Technology Nanjing China |
| authorships[0].institutions[0].id | https://openalex.org/I200845125 |
| authorships[0].institutions[0].ror | https://ror.org/02y0rxk19 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I200845125 |
| authorships[0].institutions[0].country_code | CN |
| authorships[0].institutions[0].display_name | Nanjing University of Information Science and Technology |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Xiaohan Wang |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Electronic Information Nanjing University of Information Science & Technology Nanjing China |
| authorships[1].author.id | https://openalex.org/A5038007472 |
| authorships[1].author.orcid | https://orcid.org/0000-0003-1648-3863 |
| authorships[1].author.display_name | Wen Tian |
| authorships[1].countries | CN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I200845125 |
| authorships[1].affiliations[0].raw_affiliation_string | Electronic Information Nanjing University of Information Science & Technology Nanjing China |
| authorships[1].institutions[0].id | https://openalex.org/I200845125 |
| authorships[1].institutions[0].ror | https://ror.org/02y0rxk19 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I200845125 |
| authorships[1].institutions[0].country_code | CN |
| authorships[1].institutions[0].display_name | Nanjing University of Information Science and Technology |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Wen Tian |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Electronic Information Nanjing University of Information Science & Technology Nanjing China |
| authorships[2].author.id | https://openalex.org/A5110198475 |
| authorships[2].author.orcid | |
| authorships[2].author.display_name | Guangjie Liu |
| authorships[2].countries | CN |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I200845125 |
| authorships[2].affiliations[0].raw_affiliation_string | Electronic Information Nanjing University of Information Science & Technology Nanjing China |
| authorships[2].institutions[0].id | https://openalex.org/I200845125 |
| authorships[2].institutions[0].ror | https://ror.org/02y0rxk19 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I200845125 |
| authorships[2].institutions[0].country_code | CN |
| authorships[2].institutions[0].display_name | Nanjing University of Information Science and Technology |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Guangjie Liu |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Electronic Information Nanjing University of Information Science & Technology Nanjing China |
| authorships[3].author.id | https://openalex.org/A5032341066 |
| authorships[3].author.orcid | https://orcid.org/0000-0002-6840-9158 |
| authorships[3].author.display_name | Yong Dai |
| authorships[3].countries | CN |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I200845125 |
| authorships[3].affiliations[0].raw_affiliation_string | Electronic Information Nanjing University of Information Science & Technology Nanjing China |
| authorships[3].institutions[0].id | https://openalex.org/I200845125 |
| authorships[3].institutions[0].ror | https://ror.org/02y0rxk19 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I200845125 |
| authorships[3].institutions[0].country_code | CN |
| authorships[3].institutions[0].display_name | Nanjing University of Information Science and Technology |
| authorships[3].author_position | last |
| authorships[3].raw_author_name | Yuwei Dai |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | Electronic Information Nanjing University of Information Science & Technology Nanjing China |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.4218/etrij.2024-0178 |
| open_access.oa_status | diamond |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Strategy optimization method based on UAVs‐assisted detection of covert communication |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11133 |
| primary_topic.field.id | https://openalex.org/fields/22 |
| primary_topic.field.display_name | Engineering |
| primary_topic.score | 0.9997000098228455 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/2202 |
| primary_topic.subfield.display_name | Aerospace Engineering |
| primary_topic.display_name | UAV Applications and Optimization |
| related_works | https://openalex.org/W4391375266, https://openalex.org/W2899084033, https://openalex.org/W2748952813, https://openalex.org/W2523525694, https://openalex.org/W2998642566, https://openalex.org/W2392682561, https://openalex.org/W57793151, https://openalex.org/W2804882289, https://openalex.org/W2727423897, https://openalex.org/W2497612952 |
| cited_by_count | 0 |
| locations_count | 2 |
| best_oa_location.id | doi:10.4218/etrij.2024-0178 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S202469819 |
| best_oa_location.source.issn | 1225-6463, 2233-7326 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 1225-6463 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | True |
| best_oa_location.source.display_name | ETRI Journal |
| best_oa_location.source.host_organization | https://openalex.org/P4310319529 |
| best_oa_location.source.host_organization_name | Electronics and Telecommunications Research Institute |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310319529 |
| best_oa_location.source.host_organization_lineage_names | Electronics and Telecommunications Research Institute |
| best_oa_location.license | |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | ETRI Journal |
| best_oa_location.landing_page_url | https://doi.org/10.4218/etrij.2024-0178 |
| primary_location.id | doi:10.4218/etrij.2024-0178 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S202469819 |
| primary_location.source.issn | 1225-6463, 2233-7326 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 1225-6463 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | True |
| primary_location.source.display_name | ETRI Journal |
| primary_location.source.host_organization | https://openalex.org/P4310319529 |
| primary_location.source.host_organization_name | Electronics and Telecommunications Research Institute |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319529 |
| primary_location.source.host_organization_lineage_names | Electronics and Telecommunications Research Institute |
| primary_location.license | |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | ETRI Journal |
| primary_location.landing_page_url | https://doi.org/10.4218/etrij.2024-0178 |
| publication_date | 2025-02-10 |
| publication_year | 2025 |
| referenced_works | https://openalex.org/W4362500847, https://openalex.org/W4360995216, https://openalex.org/W4313476493, https://openalex.org/W4389576010, https://openalex.org/W4389544282, https://openalex.org/W4313315546, https://openalex.org/W4396910868, https://openalex.org/W4312687534, https://openalex.org/W4390590880, https://openalex.org/W4226054955, https://openalex.org/W3093597927, https://openalex.org/W3046067483, https://openalex.org/W4300928029, https://openalex.org/W4376851436, https://openalex.org/W4392406164, https://openalex.org/W4387247698, https://openalex.org/W4389318000, https://openalex.org/W4320008886, https://openalex.org/W3091892940, https://openalex.org/W4392209055, https://openalex.org/W3159216526, https://openalex.org/W4324137302, https://openalex.org/W2962804513, https://openalex.org/W2996056603, https://openalex.org/W7014171268, https://openalex.org/W3194412331, https://openalex.org/W3166879908, https://openalex.org/W3189632354 |
| referenced_works_count | 28 |
| abstract_inverted_index.a | 72, 97, 127 |
| abstract_inverted_index.In | 67 |
| abstract_inverted_index.an | 15 |
| abstract_inverted_index.as | 46 |
| abstract_inverted_index.in | 37, 58 |
| abstract_inverted_index.of | 18, 126 |
| abstract_inverted_index.on | 116 |
| abstract_inverted_index.to | 28, 52, 86, 90 |
| abstract_inverted_index.we | 70, 102 |
| abstract_inverted_index.UAV | 82 |
| abstract_inverted_index.and | 8, 110, 130 |
| abstract_inverted_index.are | 5 |
| abstract_inverted_index.for | 49, 64, 123, 134 |
| abstract_inverted_index.has | 33 |
| abstract_inverted_index.the | 24, 60, 81, 104, 108, 121, 124 |
| abstract_inverted_index.Nash | 128 |
| abstract_inverted_index.UAVs | 45, 63 |
| abstract_inverted_index.been | 34 |
| abstract_inverted_index.both | 135 |
| abstract_inverted_index.game | 78, 117 |
| abstract_inverted_index.have | 13 |
| abstract_inverted_index.main | 25 |
| abstract_inverted_index.that | 12 |
| abstract_inverted_index.this | 68 |
| abstract_inverted_index.used | 27 |
| abstract_inverted_index.uses | 44 |
| abstract_inverted_index.when | 94 |
| abstract_inverted_index.Alice | 111 |
| abstract_inverted_index.based | 115 |
| abstract_inverted_index.noise | 85 |
| abstract_inverted_index.tools | 48 |
| abstract_inverted_index.under | 112 |
| abstract_inverted_index.which | 59 |
| abstract_inverted_index.(UAVs) | 4 |
| abstract_inverted_index.Covert | 22 |
| abstract_inverted_index.Willie | 95 |
| abstract_inverted_index.aerial | 2 |
| abstract_inverted_index.become | 14 |
| abstract_inverted_index.covert | 50, 76, 92, 98 |
| abstract_inverted_index.easily | 9 |
| abstract_inverted_index.ensure | 29 |
| abstract_inverted_index.highly | 6 |
| abstract_inverted_index.method | 26 |
| abstract_inverted_index.mobile | 7 |
| abstract_inverted_index.model. | 79 |
| abstract_inverted_index.recent | 38 |
| abstract_inverted_index.sides. | 136 |
| abstract_inverted_index.study, | 69 |
| abstract_inverted_index.verify | 120 |
| abstract_inverted_index.years. | 39 |
| abstract_inverted_index.Alice's | 87 |
| abstract_inverted_index.analyze | 103 |
| abstract_inverted_index.between | 107 |
| abstract_inverted_index.detects | 96 |
| abstract_inverted_index.devices | 11 |
| abstract_inverted_index.disrupt | 91 |
| abstract_inverted_index.improve | 53 |
| abstract_inverted_index.jamming | 74, 114 |
| abstract_inverted_index.optimal | 132 |
| abstract_inverted_index.process | 106 |
| abstract_inverted_index.propose | 71 |
| abstract_inverted_index.studied | 36 |
| abstract_inverted_index.theory, | 118 |
| abstract_inverted_index.Abstract | 0 |
| abstract_inverted_index.However, | 40 |
| abstract_inverted_index.Unmanned | 1 |
| abstract_inverted_index.actively | 83 |
| abstract_inverted_index.channels | 89 |
| abstract_inverted_index.detector | 61, 109 |
| abstract_inverted_index.existing | 41 |
| abstract_inverted_index.ignoring | 56 |
| abstract_inverted_index.research | 42 |
| abstract_inverted_index.utilizes | 62 |
| abstract_inverted_index.vehicles | 3 |
| abstract_inverted_index.wireless | 19, 30 |
| abstract_inverted_index.auxiliary | 47 |
| abstract_inverted_index.component | 17 |
| abstract_inverted_index.detection | 75 |
| abstract_inverted_index.existence | 125 |
| abstract_inverted_index.formulate | 131 |
| abstract_inverted_index.important | 16 |
| abstract_inverted_index.primarily | 43 |
| abstract_inverted_index.security, | 32 |
| abstract_inverted_index.transmits | 84 |
| abstract_inverted_index.conditions | 122 |
| abstract_inverted_index.deployable | 10 |
| abstract_inverted_index.situations | 57 |
| abstract_inverted_index.strategies | 133 |
| abstract_inverted_index.adversarial | 105 |
| abstract_inverted_index.extensively | 35 |
| abstract_inverted_index.Furthermore, | 101 |
| abstract_inverted_index.equilibrium, | 129 |
| abstract_inverted_index.interference | 65 |
| abstract_inverted_index.performance, | 55 |
| abstract_inverted_index.suppression. | 66 |
| abstract_inverted_index.transmission | 88, 93 |
| abstract_inverted_index.Specifically, | 80 |
| abstract_inverted_index.communication | 20, 31, 54, 77, 99 |
| abstract_inverted_index.theoretically | 119 |
| abstract_inverted_index.transmission. | 100 |
| abstract_inverted_index.UAV‐assisted | 73, 113 |
| abstract_inverted_index.communication, | 23 |
| abstract_inverted_index.communications, | 51 |
| abstract_inverted_index.countermeasures. | 21 |
| cited_by_percentile_year | |
| countries_distinct_count | 1 |
| institutions_distinct_count | 4 |
| citation_normalized_percentile.value | 0.01804747 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |