{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T06:34:31Z","timestamp":1774766071158,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"19","license":[{"start":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T00:00:00Z","timestamp":1624233600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T00:00:00Z","timestamp":1624233600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62076202"],"award-info":[{"award-number":["62076202"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61976178"],"award-info":[{"award-number":["61976178"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,8]]},"DOI":"10.1007\/s11042-021-11130-5","type":"journal-article","created":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T16:04:49Z","timestamp":1624291489000},"page":"29163-29175","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Graph convolutional network-based reinforcement learning for tasks offloading in multi-access edge computing"],"prefix":"10.1007","volume":"80","author":[{"given":"Lixiong","family":"Leng","sequence":"first","affiliation":[]},{"given":"Jingchen","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2180-8941","authenticated-orcid":false,"given":"Haobin","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Yi\u2019an","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,21]]},"reference":[{"issue":"1","key":"11130_CR1","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1109\/LCOMM.2019.2948179","volume":"24","author":"AA Al-Habob","year":"2019","unstructured":"Al-Habob AA, Ibrahim A, Dobre OA, Armada AG (2019) Collision-free sequential task offloading for mobile edge computing. IEEE Commun Lett 24(1):71\u201375","journal-title":"IEEE Commun Lett"},{"issue":"3","key":"11130_CR2","doi-asserted-by":"publisher","first-page":"668","DOI":"10.1109\/JSAC.2019.2894306","volume":"37","author":"HA Alameddine","year":"2019","unstructured":"Alameddine HA, Sharafeddine S, Sebbah S, Ayoubi S, Assi C (2019) Dynamic task offloading and scheduling for low-latency IoT services in multi-access edge computing. IEEE J Sel Areas Commun 37(3):668\u2013682","journal-title":"IEEE J Sel Areas Commun"},{"issue":"2","key":"11130_CR3","first-page":"1","volume":"10","author":"M Aliyu","year":"2020","unstructured":"Aliyu M, Murali M, Gital AY, Boukari S (2020) Efficient metaheuristic population-based and deterministic algorithm for resource provisioning using ant colony optimization and spanning tree. Int J Cloud Appl Comput (IJCAC) 10 (2):1\u201321","journal-title":"Int J Cloud Appl Comput (IJCAC)"},{"key":"11130_CR4","doi-asserted-by":"crossref","unstructured":"Alweshah M, Al Khalaileh S, Gupta BB, Almomani A, Hammouri AI, Al-Betar MA (2020) The monarch butterfly optimization algorithm for solving feature selection problems. Neural Comput Appl 1\u201315","DOI":"10.1007\/s00521-020-05210-0"},{"issue":"6","key":"11130_CR5","doi-asserted-by":"publisher","first-page":"1065","DOI":"10.1109\/JSAC.2014.2328098","volume":"32","author":"JG Andrews","year":"2014","unstructured":"Andrews JG, Buzzi S, Choi W, Hanly SV, Lozano A, Soong AC, Zhang JC (2014) What will 5G be? IEEE J Sel Areas Commun 32 (6):1065\u20131082","journal-title":"IEEE J Sel Areas Commun"},{"key":"11130_CR6","unstructured":"Babaeizadeh M, Frosio I, Tyree S, Clemons J, Kautz J (2016) Reinforcement learning through asynchronous advantage actor-critic on a GPU. arXiv:161106256"},{"key":"11130_CR7","first-page":"9780470544785","volume":"10","author":"AG Barto","year":"2004","unstructured":"Barto AG, Dietterich TG (2004) Reinforcement learning and its relationship to supervised learning. Handbook Learn Approx Dyn Prog 10:9780470544785","journal-title":"Handbook Learn Approx Dyn Prog"},{"key":"11130_CR8","doi-asserted-by":"crossref","unstructured":"Cao X, Xu J, Zhang R (2018) Mobile edge computing for cellular-connected UAV: Computation offloading and trajectory optimization. In: 2018 IEEE 19Th international workshop on signal processing advances in wireless communications (SPAWC). IEEE, pp 1\u20135","DOI":"10.1109\/SPAWC.2018.8445936"},{"issue":"2","key":"11130_CR9","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MNET.2015.7064900","volume":"29","author":"M Chen","year":"2015","unstructured":"Chen M, Zhang Y, Li Y, Mao S, Leung VC (2015) EMC: emotion-aware mobile cloud computing in 5G. IEEE Netw 29(2):32\u201338","journal-title":"IEEE Netw"},{"issue":"6","key":"11130_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3243929","volume":"51","author":"AJ Ferrer","year":"2019","unstructured":"Ferrer AJ, Marqu\u00e8s JM, Jorba J (2019) Towards the decentralised cloud: Survey on approaches and challenges for mobile, ad hoc, and edge computing. ACM Comput Surv (CSUR) 51(6):1\u201336","journal-title":"ACM Comput Surv (CSUR)"},{"key":"11130_CR11","doi-asserted-by":"crossref","unstructured":"Fran\u00e7ois-Lavet V, Henderson P, Islam R, Bellemare MG, Pineau J (2018) An introduction to deep reinforcement learning. arXiv:181112560","DOI":"10.1561\/9781680835397"},{"issue":"4","key":"11130_CR12","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1016\/j.neuron.2010.04.016","volume":"66","author":"J Gl\u00e4scher","year":"2010","unstructured":"Gl\u00e4scher J, Daw N, Dayan P, O\u2019Doherty JP (2010) States versus rewards: dissociable neural prediction error signals underlying model-based and model-free reinforcement learning. Neuron 66(4):585\u2013595","journal-title":"Neuron"},{"key":"11130_CR13","doi-asserted-by":"crossref","unstructured":"H\u00e4m\u00e4l\u00e4inen P, Babadi A, Ma X, Lehtinen J (2020) PPO-CMA: Proximal policy optimization with covariance matrix adaptation. In: 2020 IEEE 30Th international workshop on machine learning for signal processing (MLSP). IEEE, pp 1\u20136","DOI":"10.1109\/MLSP49062.2020.9231618"},{"issue":"8","key":"11130_CR14","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735\u20131780","journal-title":"Neural Comput"},{"key":"11130_CR15","doi-asserted-by":"crossref","unstructured":"Hu H, Wu X, Luo B, Tao C, Xu C, Wu W, Chen Z (2018) Playing 20 question game with policy-based reinforcement learning. arXiv:180807645","DOI":"10.18653\/v1\/D18-1361"},{"key":"11130_CR16","unstructured":"Huang L, Bi S, Zhang YJA (2018) Deep reinforcement learning for online offloading in wireless powered mobile-edge computing networks. arXiv:180801977"},{"key":"11130_CR17","doi-asserted-by":"publisher","first-page":"32328","DOI":"10.1109\/ACCESS.2018.2837692","volume":"6","author":"MG Kibria","year":"2018","unstructured":"Kibria MG, Nguyen K, Villardi GP, Zhao O, Ishizu K, Kojima F (2018) Big data analytics, machine learning, and artificial intelligence in next-generation wireless networks. IEEE Access 6:32328\u201332338","journal-title":"IEEE Access"},{"key":"11130_CR18","unstructured":"Kipf TN, Welling M (2016) Semi-supervised classification with graph convolutional networks. arXiv:160902907"},{"issue":"4","key":"11130_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJSSCI.2020100101","volume":"12","author":"G Khekare","year":"2020","unstructured":"Khekare G, Verma P, Dhanre U, Raut S, Sheikh S (2020) The optimal path finding algorithm based on reinforcement learning. Int J Softw Sci Comput Intell (IJSSCI) 12(4):1\u201318","journal-title":"Int J Softw Sci Comput Intell (IJSSCI)"},{"key":"11130_CR20","unstructured":"Konda VR, Tsitsiklis JN (2000) Actor-critic algorithms. In: Advances in neural information processing systems, pp 1008\u20131014"},{"key":"11130_CR21","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1016\/j.ins.2018.02.060","volume":"479","author":"D Li","year":"2019","unstructured":"Li D, Deng L, Gupta BB, Wang H, Choi C (2019) A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. Inf Sci 479:432\u2013447","journal-title":"Inf Sci"},{"key":"11130_CR22","doi-asserted-by":"crossref","unstructured":"Li J, Gao H, Lv T, Lu Y (2018) Deep reinforcement learning based computation offloading and resource allocation for MEC. In: 2018 IEEE wireless communications and networking conference (WCNC). IEEE, pp 1\u20136","DOI":"10.1109\/WCNC.2018.8377343"},{"key":"11130_CR23","unstructured":"Liu L, Chang Z, Guo X, Ristaniemi T (2017) Multi-objective optimization for computation offloading in mobile-edge computing. In: 2017 IEEE symposium on computers and communications (ISCC). IEEE, pp 832\u2013837"},{"key":"11130_CR24","doi-asserted-by":"crossref","unstructured":"Lv Z (2020) Security of internet of things edge devices. Softw Pract Exp","DOI":"10.1002\/spe.2806"},{"key":"11130_CR25","doi-asserted-by":"crossref","unstructured":"Lv Z, Chen D, Wang Q (2020) Diversified technologies in internet of vehicles under intelligent edge computing. IEEE Trans Intell Trans Sys","DOI":"10.1109\/TITS.2020.3019756"},{"key":"11130_CR26","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.future.2020.08.037","volume":"115","author":"Z Lv","year":"2020","unstructured":"Lv Z, Chen D, Lou R, Wang Q (2020) Intelligent edge computing based on machine learning for smart city. Futur Gener Comput Syst 115:90\u201399","journal-title":"Futur Gener Comput Syst"},{"key":"11130_CR27","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.comcom.2020.07.022","volume":"161","author":"Z Lv","year":"2020","unstructured":"Lv Z, Qiao L (2020) Optimization of collaborative resource allocation for mobile edge computing. Comput Commun 161:19\u201327","journal-title":"Comput Commun"},{"issue":"7","key":"11130_CR28","doi-asserted-by":"publisher","first-page":"5706","DOI":"10.1109\/JIOT.2019.2942719","volume":"7","author":"Z Lv","year":"2020","unstructured":"Lv Z, Xiu W (2020) Interaction of edge-cloud computing based on SDN and NFV for next generation IoT. IEEE Internet Things J 7(7):5706\u20135712","journal-title":"IEEE Internet Things J"},{"key":"11130_CR29","doi-asserted-by":"publisher","first-page":"166079","DOI":"10.1109\/ACCESS.2019.2953172","volume":"7","author":"M Mehrabi","year":"2019","unstructured":"Mehrabi M, You D, Latzko V, Salah H, Reisslein M, Fitzek FH (2019) Device-enhanced MEC: Multi-access edge computing (MEC) aided by end device computation and caching: A survey. IEEE Access 7:166079\u2013166108","journal-title":"IEEE Access"},{"key":"11130_CR30","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1016\/j.future.2017.04.039","volume":"83","author":"VA Memos","year":"2018","unstructured":"Memos VA, Psannis KE, Ishibashi Y, Kim BG, Gupta BB (2018) An efficient algorithm for media-based surveillance system (EAMSus) in IoT smart city framework. Futur Gener Comput Syst 83:619\u2013628","journal-title":"Futur Gener Comput Syst"},{"issue":"3","key":"11130_CR31","doi-asserted-by":"publisher","first-page":"74","DOI":"10.3390\/computation8030074","volume":"8","author":"S Mirri","year":"2020","unstructured":"Mirri S, Delnevo G, Roccetti M (2020) Is a COVID-19 second wave possible in Emilia-Romagna (Italy)? Forecasting a future outbreak with particulate pollution and machine learning. Computation 8(3):74","journal-title":"Computation"},{"key":"11130_CR32","unstructured":"Munos R, Stepleton T, Harutyunyan A, Bellemare M (2016) Safe and efficient off-policy reinforcement learning. In: Advances in neural information processing systems, pp 1054\u20131062"},{"key":"11130_CR33","unstructured":"Nachum O, Norouzi M, Xu K, Schuurmans D (2017) Bridging the Gap between value and policy based reinforcement learning. In: Guyon I, Luxburg UV, Bengio S, Wallach H, Fergus R, Vishwanathan S, Garnett R (eds) Advances in neural information processing systems, vol 30. Curran Associates, Inc., pp 2775\u20132785"},{"issue":"1","key":"11130_CR34","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/TNN.2008.2005605","volume":"20","author":"F Scarselli","year":"2008","unstructured":"Scarselli F, Gori M, Tsoi AC, Hagenbuchner M, Monfardini G (2008) The graph neural network model. IEEE Trans Neural Netw 20(1):61\u201380","journal-title":"IEEE Trans Neural Netw"},{"key":"11130_CR35","doi-asserted-by":"crossref","unstructured":"Tian Y, Fan B, Wu F (2017) L2-net: Deep learning of discriminative patch descriptor in euclidean space. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 661\u2013669","DOI":"10.1109\/CVPR.2017.649"},{"issue":"1","key":"11130_CR36","doi-asserted-by":"publisher","first-page":"856","DOI":"10.1109\/TVT.2018.2881191","volume":"68","author":"TX Tran","year":"2018","unstructured":"Tran TX, Pompili D (2018) Joint task offloading and resource allocation for multi-server mobile-edge computing networks. IEEE Trans Veh Technol 68(1):856\u2013868","journal-title":"IEEE Trans Veh Technol"},{"key":"11130_CR37","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.measurement.2018.08.014","volume":"131","author":"G Uva","year":"2019","unstructured":"Uva G, Sangiorgio V, Ruggieri S, Fatiguso F (2019) Structural vulnerability assessment of masonry churches supported by user-reported data and modern Internet of Things (IoT). Measurement 131:183\u2013192","journal-title":"Measurement"},{"key":"11130_CR38","doi-asserted-by":"crossref","unstructured":"Van Brummelen J, O\u2019Brien M, Gruyer D, Najjaran H (2018) Autonomous vehicle perception: The technology of today and tomorrow. Trans Res Part C Emerg Technol S0968090X18302134","DOI":"10.1016\/j.trc.2018.02.012"},{"issue":"5","key":"11130_CR39","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MCOM.2019.1800971","volume":"57","author":"J Wang","year":"2019","unstructured":"Wang J, Hu J, Min G, Zhan W, Ni Q, Georgalas N (2019) Computation offloading in multi-access edge computing using a deep sequential model based on reinforcement learning. IEEE Commun Mag 57(5):64\u201369","journal-title":"IEEE Commun Mag"},{"key":"11130_CR40","doi-asserted-by":"crossref","unstructured":"Yao L, Mao C, Luo Y (2019) Graph convolutional networks for text classification. In: Proceedings of the AAAI conference on artificial intelligence, vol 33, pp 7370\u20137377","DOI":"10.1609\/aaai.v33i01.33017370"},{"issue":"5","key":"11130_CR41","doi-asserted-by":"publisher","first-page":"7635","DOI":"10.1109\/JIOT.2019.2903191","volume":"6","author":"K Zhang","year":"2019","unstructured":"Zhang K, Zhu Y, Leng S, He Y, Maharjan S, Zhang Y (2019) Deep learning empowered task offloading for mobile edge computing in urban informatics. IEEE Internet Things J 6(5):7635\u20137647","journal-title":"IEEE Internet Things J"},{"key":"11130_CR42","doi-asserted-by":"crossref","unstructured":"Zhang Y, Zhao Z, Shu C, Min G, Wang Z (2018) Embedding virtual network functions with backup for reliable large-scale edge computing. In: 2018 5Th IEEE international conference on cyber security and cloud computing (CSCloud)\/2018 4th IEEE international conference on edge computing and scalable cloud (EdgeCom). IEEE, pp 190\u2013195","DOI":"10.1109\/CSCloud\/EdgeCom.2018.00041"},{"key":"11130_CR43","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1016\/j.future.2019.04.039","volume":"99","author":"X Zhao","year":"2019","unstructured":"Zhao X, Yang K, Chen Q, Peng D, Jiang H, Xu X, Shuang X (2019) Deep learning based mobile data offloading in mobile edge computing systems. Futur Gener Comput Syst 99:346\u2013355","journal-title":"Futur Gener Comput Syst"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11130-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-11130-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-11130-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,19]],"date-time":"2021-08-19T18:09:24Z","timestamp":1629396564000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-11130-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,21]]},"references-count":43,"journal-issue":{"issue":"19","published-print":{"date-parts":[[2021,8]]}},"alternative-id":["11130"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-11130-5","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,21]]},"assertion":[{"value":"21 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 January 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 June 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}