{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T10:40:02Z","timestamp":1750848002072,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":18,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819687305","type":"print"},{"value":"9789819687312","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-8731-2_21","type":"book-chapter","created":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T09:59:44Z","timestamp":1750845584000},"page":"215-224","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["DROIT: A Distributed Robustness Optimization Scheme with\u00a0Local Information for\u00a0IoT Topology"],"prefix":"10.1007","author":[{"given":"Yabin","family":"Peng","sequence":"first","affiliation":[]},{"given":"Chenyu","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Yuchen","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Tong","family":"Duan","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jichao","family":"Xie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,21]]},"reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Aouedi, O., et al.: A survey on intelligent internet of things: applications, security, privacy, and future directions. IEEE Commun. Surv. Tutor. (2024)","DOI":"10.1109\/COMST.2024.3430368"},{"issue":"11","key":"21_CR2","doi-asserted-by":"publisher","first-page":"19143","DOI":"10.1109\/JIOT.2024.3367692","volume":"11","author":"Y Hu","year":"2024","unstructured":"Hu, Y., et al.: Industrial internet of things intelligence empowering smart manufacturing: a literature review. IEEE Internet Things J. 11(11), 19143\u201319167 (2024). https:\/\/doi.org\/10.1109\/JIOT.2024.3367692","journal-title":"IEEE Internet Things J."},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Changazi, S.A., Bakhshi, A.D., Yousaf, M., Mohsin, S.M., Akber, S.M.A., Abazeed, M.: Optimization of network topology robustness in IoTs: a systematic review. Comput. Netw. 110568 (2024)","DOI":"10.1016\/j.comnet.2024.110568"},{"issue":"01","key":"21_CR4","doi-asserted-by":"publisher","first-page":"P01027","DOI":"10.1088\/1742-5468\/2011\/01\/P01027","volume":"2011","author":"HJ Herrmann","year":"2011","unstructured":"Herrmann, H.J., Schneider, C.M., Moreira, A.A., Andrade, J.S., Havlin, S.: Onion-like network topology enhances robustness against malicious attacks. J. Stat. Mech. Theory Exp. 2011(01), P01027 (2011)","journal-title":"J. Stat. Mech. Theory Exp."},{"issue":"5","key":"21_CR5","doi-asserted-by":"publisher","first-page":"2944","DOI":"10.1109\/TNET.2017.2713530","volume":"25","author":"T Qiu","year":"2017","unstructured":"Qiu, T., Zhao, A., Xia, F., Si, W., Wu, D.O.: Rose: robustness strategy for scale-free wireless sensor networks. IEEE\/ACM Trans. Networking 25(5), 2944\u20132959 (2017)","journal-title":"IEEE\/ACM Trans. Networking"},{"issue":"3","key":"21_CR6","doi-asserted-by":"publisher","first-page":"1028","DOI":"10.1109\/TNET.2019.2907243","volume":"27","author":"T Qiu","year":"2019","unstructured":"Qiu, T., Liu, J., Si, W., Wu, D.O.: Robustness optimization scheme with multi-population co-evolution for scale-free wireless sensor networks. IEEE\/ACM Trans. Networking 27(3), 1028\u20131042 (2019)","journal-title":"IEEE\/ACM Trans. Networking"},{"issue":"1","key":"21_CR7","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1109\/TNET.2021.3113916","volume":"30","author":"N Chen","year":"2022","unstructured":"Chen, N., Qiu, T., Lu, Z.: An adaptive robustness evolution algorithm with self-competition and its 3D deployment for IoT. IEEE\/ACM Trans. Networking 30(1), 368\u2013381 (2022)","journal-title":"IEEE\/ACM Trans. Networking"},{"key":"21_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109385","volume":"218","author":"Y Peng","year":"2022","unstructured":"Peng, Y., Liu, C., Liu, S.: Smarttro: optimizing topology robustness for internet of things via deep reinforcement learning with graph convolutional networks. Comput. Netw. 218, 109385 (2022)","journal-title":"Comput. Netw."},{"issue":"7","key":"21_CR9","doi-asserted-by":"publisher","first-page":"6191","DOI":"10.1109\/JIOT.2019.2963499","volume":"7","author":"N Chen","year":"2020","unstructured":"Chen, N., Qiu, T., Mu, C., Han, M., Zhou, P.: Deep actor-critic learning-based robustness enhancement of internet of things. IEEE Internet Things J. 7(7), 6191\u20136200 (2020)","journal-title":"IEEE Internet Things J."},{"issue":"6","key":"21_CR10","doi-asserted-by":"publisher","first-page":"1683","DOI":"10.3233\/IDA-216222","volume":"26","author":"Y Peng","year":"2022","unstructured":"Peng, Y., Liu, C., Wu, Y., Liu, S., Wang, K.: Graph convolutional networks-based robustness optimization for scale-free internet of things. Intell. Data Anal. 26(6), 1683\u20131701 (2022)","journal-title":"Intell. Data Anal."},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Li, R.H., Yu, J.X., Huang, X., Cheng, H., Shang, Z.: Measuring robustness of complex networks under MVC attack. In: Proceedings of the 21st ACM International Conference on Information and Knowledge Management, pp. 1512\u20131516 (2012)","DOI":"10.1145\/2396761.2398463"},{"issue":"10","key":"21_CR12","doi-asserted-by":"publisher","first-page":"3838","DOI":"10.1073\/pnas.1009440108","volume":"108","author":"CM Schneider","year":"2011","unstructured":"Schneider, C.M., Moreira, A.A., Andrade, J.S., Jr.: Havlin: mitigation of malicious attacks on networks. Proc. Natl. Acad. Sci. 108(10), 3838\u20133841 (2011)","journal-title":"Proc. Natl. Acad. Sci."},{"key":"21_CR13","unstructured":"Doshi, F.: The infinite partially observable Markov decision process. In: Advances in Neural Information Processing Systems, vol. 22 (2009)"},{"issue":"4","key":"21_CR14","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.85.046109","volume":"85","author":"T Tanizawa","year":"2012","unstructured":"Tanizawa, T., Havlin, S.: Robustness of onionlike correlated networks against targeted attacks. Physi. Rev. E-Stat. Nonlinear Soft Matter Phys. 85(4), 046109 (2012)","journal-title":"Physi. Rev. E-Stat. Nonlinear Soft Matter Phys."},{"key":"21_CR15","unstructured":"Zeng, H., Zhou, H., Srivastava, A., Kannan, R., Prasanna, V.: Graphsaint: graph sampling based inductive learning method. In: International Conference on Learning Representations (ICLR) (2020)"},{"key":"21_CR16","unstructured":"Veli\u010dkovi\u0107, P., Cucurull, G., Casanova, A., Romero, A., Li\u00f2, P., Bengio, Y.: Graph attention networks. In: International Conference on Learning Representations (ICLR) (2018)"},{"key":"21_CR17","unstructured":"Wang, Z., Schaul, T., Hessel, M., Hasselt, H., Lanctot, M.: Dueling network architectures for deep reinforcement learning. In: International Conference on Machine Learning, pp. 1995\u20132003. PMLR (2016)"},{"key":"21_CR18","doi-asserted-by":"crossref","unstructured":"Van\u00a0Hasselt, H., Guez, A., Silver, D.: Deep reinforcement learning with double q-learning. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a030 (2016)","DOI":"10.1609\/aaai.v30i1.10295"}],"container-title":["Lecture Notes in Computer Science","Wireless Artificial Intelligent Computing Systems and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-8731-2_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T09:59:50Z","timestamp":1750845590000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-8731-2_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819687305","9789819687312"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-8731-2_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"21 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WASA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Wireless Artificial Intelligent Computing Systems and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tokyo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wasa2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wasa-conference.org\/WASA2025\/index.html#","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}