{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T10:49:48Z","timestamp":1761130188981,"version":"3.41.0"},"reference-count":67,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T00:00:00Z","timestamp":1749081600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T00:00:00Z","timestamp":1749081600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"DOI":"10.1007\/s11227-025-07431-3","type":"journal-article","created":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T13:35:20Z","timestamp":1749130520000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Efficient network defense policies via GNN-enhanced reinforcement learning"],"prefix":"10.1007","volume":"81","author":[{"given":"Shoukun","family":"Xu","sequence":"first","affiliation":[]},{"given":"Yihang","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Huajun","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,5]]},"reference":[{"key":"7431_CR1","unstructured":"Riley M, Elgin B, Lawrence D, Matlack C (2014) Target missed warnings in epic hack of credit card data. Bloomberg, Last modified March, p 13"},{"issue":"1","key":"7431_CR2","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TDSC.2015.2509994","volume":"15","author":"A Nourian","year":"2018","unstructured":"Nourian A, Madnick S (2018) A systems theoretic approach to the security threats in cyber physical systems applied to stuxnet. IEEE Trans Dependable Secure Comput 15(1):2\u201313. https:\/\/doi.org\/10.1109\/TDSC.2015.2509994","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"6","key":"7431_CR3","doi-asserted-by":"publisher","first-page":"5247","DOI":"10.1109\/TDSC.2023.3243667","volume":"20","author":"T Zhu","year":"2023","unstructured":"Zhu T, Yu J, Xiong C, Cheng W, Yuan Q, Ying J, Chen T, Zhang J, Lv M, Chen Y, Wang T, Fan Y (2023) Aptshield: a stable, efficient and real-time apt detection system for linux hosts. IEEE Trans Dependable Secure Comput 20(6):5247\u20135264. https:\/\/doi.org\/10.1109\/TDSC.2023.3243667","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"7431_CR4","doi-asserted-by":"crossref","unstructured":"Dong F, Li S, Jiang P, Li D, Wang H, Huang L, Xiao X, Chen J, Luo X, Guo Y (2023) Are we there yet? an industrial viewpoint on provenance-based endpoint detection and response tools. In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, pp. 2396\u20132410","DOI":"10.1145\/3576915.3616580"},{"key":"7431_CR5","doi-asserted-by":"crossref","unstructured":"Inam MA, Chen Y, Goyal A, Liu J, Mink J, Michael N, Gaur S, Bates A, Hassan WU (2023) Sok: History is a vast early warning system: Auditing the provenance of system intrusions. In: 2023 IEEE Symposium on Security and Privacy (SP), pp. 2620\u20132638. IEEE","DOI":"10.1109\/SP46215.2023.10179405"},{"key":"7431_CR6","doi-asserted-by":"publisher","unstructured":"Hassan WU, Bates A, Marino D (2020) Tactical provenance analysis for endpoint detection and response systems. In: 2020 IEEE Symposium on Security and Privacy (SP), pp. 1172\u20131189. https:\/\/doi.org\/10.1109\/SP40000.2020.00096","DOI":"10.1109\/SP40000.2020.00096"},{"issue":"12","key":"7431_CR7","doi-asserted-by":"publisher","first-page":"14039","DOI":"10.1007\/s11227-021-03856-8","volume":"77","author":"AS Alqahtani","year":"2021","unstructured":"Alqahtani AS, Abuhasel KA, Alquraish M (2021) On implementing a powerful intrusion prevention system focused on big data. J Supercomput 77(12):14039\u201314052","journal-title":"J Supercomput"},{"key":"7431_CR8","unstructured":"Rehman, MU, Ahmadi H, Hassan WU (2024) Flash: A comprehensive approach to intrusion detection via provenance graph representation learning. In: 2024 IEEE Symposium on Security and Privacy (SP), pp. 139\u2013139. IEEE Computer Society"},{"issue":"1","key":"7431_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11227-024-06737-y","volume":"81","author":"H Yang","year":"2025","unstructured":"Yang H, Yu J, Zhai R (2025) High-precision intrusion detection for cybersecurity communications based on multi-scale convolutional neural networks. J Supercomput 81(1):1\u201334","journal-title":"J Supercomput"},{"key":"7431_CR10","doi-asserted-by":"publisher","unstructured":"Pang Q, Zhu J, M\u00f6llering H, Zheng W, Schneider T (2024) Bolt: Privacy-preserving, accurate and efficient inference for transformers. In: 2024 IEEE Symposium on Security and Privacy (SP), pp. 4753\u20134771. https:\/\/doi.org\/10.1109\/SP54263.2024.00130","DOI":"10.1109\/SP54263.2024.00130"},{"issue":"6","key":"7431_CR11","doi-asserted-by":"publisher","first-page":"4052","DOI":"10.1109\/TDSC.2021.3118081","volume":"19","author":"A Rezapour","year":"2022","unstructured":"Rezapour A, Tzeng W-G (2022) Rl-shield: Mitigating target link-flooding attacks using sdn and deep reinforcement learning routing algorithm. IEEE Trans Dependable Secure Comput 19(6):4052\u20134067. https:\/\/doi.org\/10.1109\/TDSC.2021.3118081","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"7431_CR12","doi-asserted-by":"publisher","first-page":"2583","DOI":"10.1109\/TIFS.2023.3268532","volume":"18","author":"Y Yu","year":"2023","unstructured":"Yu Y, Yang W, Ding W, Zhou J (2023) Reinforcement learning solution for cyber-physical systems security against replay attacks. IEEE Trans Inf Forensics Secur 18:2583\u20132595. https:\/\/doi.org\/10.1109\/TIFS.2023.3268532","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"7431_CR13","unstructured":"Standen M, Lucas M, Bowman D, Richer TJ, Kim J, Marriott D (2021) Cyborg: A gym for the development of autonomous cyber agents. CoRR abs\/2108.09118 2108.09118"},{"issue":"2","key":"7431_CR14","doi-asserted-by":"publisher","first-page":"1851","DOI":"10.1109\/COMST.2019.2891891","volume":"21","author":"A Alshamrani","year":"2019","unstructured":"Alshamrani A, Myneni S, Chowdhary A, Huang D (2019) A survey on advanced persistent threats: techniques, solutions, challenges, and research opportunities. IEEE Commun Surv & Tutor 21(2):1851\u20131877. https:\/\/doi.org\/10.1109\/COMST.2019.2891891","journal-title":"IEEE Commun Surv & Tutor"},{"issue":"2","key":"7431_CR15","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1109\/TDSC.2021.3130944","volume":"19","author":"H Li","year":"2022","unstructured":"Li H, Wu J, Xu H, Li G, Guizani M (2022) Explainable intelligence-driven defense mechanism against advanced persistent threats: a joint edge game and ai approach. IEEE Trans Dependable Secure Comput 19(2):757\u2013775. https:\/\/doi.org\/10.1109\/TDSC.2021.3130944","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"10","key":"7431_CR16","doi-asserted-by":"publisher","first-page":"14143","DOI":"10.1007\/s11227-024-06010-2","volume":"80","author":"D-D Dau","year":"2024","unstructured":"Dau D-D, Lee S, Kim H (2024) A comprehensive comparison study of ml models for multistage apt detection: focus on data preprocessing and resampling. J Supercomput 80(10):14143\u201314179","journal-title":"J Supercomput"},{"key":"7431_CR17","doi-asserted-by":"crossref","unstructured":"Mirkovic J, Benzel TV, Faber T, Braden R, Wroclawski JT, Schwab S (2010) The deter project: Advancing the science of cyber security experimentation and test. In: 2010 IEEE International Conference on Technologies for Homeland Security (HST), pp. 1\u20137. IEEE","DOI":"10.1109\/THS.2010.5655108"},{"key":"7431_CR18","doi-asserted-by":"crossref","unstructured":"Eskridge TC, Carvalho MM, Stoner E, Toggweiler T, Granados A (2015) Vine: a cyber emulation environment for mtd experimentation. In: Proceedings of the Second ACM Workshop on Moving Target Defense, pp. 43\u201347","DOI":"10.1145\/2808475.2808486"},{"key":"7431_CR19","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1016\/j.future.2018.07.025","volume":"89","author":"A Furfaro","year":"2018","unstructured":"Furfaro A, Piccolo A, Parise A, Argento L, Sacc\u00e0 D (2018) A cloud-based platform for the emulation of complex cybersecurity scenarios. Future Genera Comput Syst 89:791\u2013803","journal-title":"Future Genera Comput Syst"},{"key":"7431_CR20","unstructured":"WALKER DE (1962) The mitre corporation. Current Research and Development in Scientific Documentation (10), 301"},{"key":"7431_CR21","unstructured":"Schoonover K, Michalak E, Harris S, Gausmann A, Reinbolt H, Tauritz DR, Rawlings C, Pope AS (2018) Galaxy: a network emulation framework for cybersecurity. In: 11th USENIX Workshop on Cyber Security Experimentation and Test (CSET 18)"},{"key":"7431_CR22","doi-asserted-by":"crossref","unstructured":"Futoransky A, Miranda F, Orlicki J, Sarraute C (2010) Simulating cyber-attacks for fun and profit. arXiv preprint arXiv:1006.1919","DOI":"10.4108\/ICST.SIMUTOOLS2009.5773"},{"key":"7431_CR23","doi-asserted-by":"crossref","unstructured":"Rush G, Tauritz DR, Kent AD (2015) Coevolutionary agent-based network defense lightweight event system (candles). In: Proceedings of the Companion Publication of the 2015 Annual Conference on Genetic and Evolutionary Computation, pp. 859\u2013866","DOI":"10.1145\/2739482.2768429"},{"key":"7431_CR24","doi-asserted-by":"crossref","unstructured":"Niculae S (2022) Reinforcement learning vs genetic algorithms in game-Theoretic Cyber-Security (2018), Retrieved Mar. 28","DOI":"10.31237\/osf.io\/nxzep"},{"key":"7431_CR25","doi-asserted-by":"crossref","unstructured":"Brown S, Brown H, Russell M, Henz B, Edwards M, Turner F, Bertoli G (2016) Validation of network simulation model and scalability tests using example malware. In: MILCOM 2016-2016 IEEE Military Communications Conference, pp. 491\u2013496. IEEE","DOI":"10.1109\/MILCOM.2016.7795375"},{"key":"7431_CR26","unstructured":"Microsoft Defender Research Team: CyberBattleSim: An experimental platform for research in autonomous cyber defense. GitHub (2021)"},{"key":"7431_CR27","unstructured":"Molina-Markham A, Miniter C, Powell B, Ridley A (2021) Network environment design for autonomous cyberdefense. arXiv preprint arXiv:2103.07583"},{"key":"7431_CR28","volume-title":"Gamifying Machine Learning for Stronger Security and ai Models","author":"W Blum","year":"2021","unstructured":"Blum W (2021) Gamifying Machine Learning for Stronger Security and ai Models. Microsoft Res, Redmond, WA, USA"},{"key":"7431_CR29","unstructured":"Andrew A, Spillard S, Collyer J, Dhir N (2022) Developing optimal causal cyber-defence agents via cyber security simulation. arXiv preprint arXiv:2207.12355"},{"key":"7431_CR30","unstructured":"Standen M, Lucas M, Bowman D, Richer TJ, Kim J, Marriott D (2021) Cyborg: A gym for the development of autonomous cyber agents. arXiv preprint arXiv:2108.09118"},{"key":"7431_CR31","unstructured":"Vyas S, Hannay J, Bolton A, Burnap PP (2023) Automated cyber defence: A review. arXiv preprint arXiv:2303.04926"},{"key":"7431_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103578","volume":"136","author":"Z Zhu","year":"2024","unstructured":"Zhu Z, Chen M, Zhu C, Zhu Y (2024) Effective defense strategies in network security using improved double dueling deep q-network. Comput & Secur 136:103578","journal-title":"Comput & Secur"},{"key":"7431_CR33","doi-asserted-by":"publisher","first-page":"5735","DOI":"10.1109\/TIFS.2023.3314219","volume":"18","author":"T Zhang","year":"2023","unstructured":"Zhang T, Xu C, Shen J, Kuang X, Grieco LA (2023) How to disturb network reconnaissance: a moving target defense approach based on deep reinforcement learning. IEEE Trans Inf Forensics Secur 18:5735\u20135748. https:\/\/doi.org\/10.1109\/TIFS.2023.3314219","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"10","key":"7431_CR34","doi-asserted-by":"publisher","first-page":"14295","DOI":"10.1007\/s11227-024-05963-8","volume":"80","author":"A Sarihi","year":"2024","unstructured":"Sarihi A, Patooghy A, Jamieson P, Badawy A-HA (2024) Trojan playground: a reinforcement learning framework for hardware trojan insertion and detection. J Supercomput 80(10):14295\u201314329","journal-title":"J Supercomput"},{"issue":"18","key":"7431_CR35","doi-asserted-by":"publisher","first-page":"26088","DOI":"10.1007\/s11227-024-06417-x","volume":"80","author":"S Najafli","year":"2024","unstructured":"Najafli S, Toroghi Haghighat A, Karasfi B (2024) A novel reinforcement learning-based hybrid intrusion detection system on fog-to-cloud computing. J Supercomput 80(18):26088\u201326110","journal-title":"J Supercomput"},{"issue":"18","key":"7431_CR36","doi-asserted-by":"publisher","first-page":"26088","DOI":"10.1007\/s11227-024-06417-x","volume":"80","author":"S Najafli","year":"2024","unstructured":"Najafli S, Toroghi Haghighat A, Karasfi B (2024) A novel reinforcement learning-based hybrid intrusion detection system on fog-to-cloud computing. J Supercomput 80(18):26088\u201326110","journal-title":"J Supercomput"},{"key":"7431_CR37","unstructured":"Yang F, Xu J, Xiong C, Li Z, Zhang K (2023) PROGRAPHER: An anomaly detection system based on provenance graph embedding. In: 32nd USENIX Security Symposium (USENIX Security 23), pp. 4355\u20134372. USENIX Association, Anaheim, CA. https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/yang-fan"},{"key":"7431_CR38","doi-asserted-by":"crossref","unstructured":"Qin Y, Xiao Y, Liao X (2023) Vulnerability intelligence alignment via masked graph attention networks. In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, pp. 2202\u20132216","DOI":"10.1145\/3576915.3616686"},{"issue":"1","key":"7431_CR39","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/s11227-024-06471-5","volume":"81","author":"L Lin","year":"2025","unstructured":"Lin L, Zhong Q, Qiu J, Liang Z (2025) E-gracl: an iot intrusion detection system based on graph neural networks. J Supercomput 81(1):42","journal-title":"J Supercomput"},{"key":"7431_CR40","doi-asserted-by":"crossref","unstructured":"Wang S, Wang X, Sun K, Jajodia S, Wang H, Li Q (2023) Graphspd: Graph-based security patch detection with enriched code semantics. In: 2023 IEEE Symposium on Security and Privacy (SP), pp. 2409\u20132426. IEEE","DOI":"10.1109\/SP46215.2023.10179479"},{"key":"7431_CR41","unstructured":"Quan VLA, Phat CT, Van Nguyen K, Duy PT, Pham VH (2023) Xgv-bert: Leveraging contextualized language model and graph neural network for efficient software vulnerability detection. arXiv preprint arXiv:2309.14677"},{"key":"7431_CR42","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1016\/j.comcom.2022.09.029","volume":"196","author":"P Almasan","year":"2022","unstructured":"Almasan P, Su\u00e1rez-Varela J, Rusek K, Barlet-Ros P, Cabellos-Aparicio A (2022) Deep reinforcement learning meets graph neural networks: Exploring a routing optimization use case. Comput Commun 196:184\u2013194","journal-title":"Comput Commun"},{"issue":"16","key":"7431_CR43","doi-asserted-by":"publisher","first-page":"24138","DOI":"10.1007\/s11227-024-06383-4","volume":"80","author":"Z Zhang","year":"2024","unstructured":"Zhang Z, Xu C, Liu K, Xu S, Huang L (2024) A resource optimization scheduling model and algorithm for heterogeneous computing clusters based on gnn and rl. J Supercomput 80(16):24138\u201324172","journal-title":"J Supercomput"},{"issue":"1","key":"7431_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11227-024-06741-2","volume":"81","author":"Y Li","year":"2025","unstructured":"Li Y, Zhong W, Wu Y (2025) Multi-objective flexible job-shop scheduling via graph attention network and reinforcement learning. J Supercomput 81(1):1\u201325","journal-title":"J Supercomput"},{"key":"7431_CR45","unstructured":"Rummery GA, Niranjan M (1994) On-line Q-learning Using Connectionist Systems vol. 37. University of Cambridge, Department of Engineering Cambridge, UK"},{"key":"7431_CR46","unstructured":"Sutton RS, McAllester D, Singh S, Mansour Y (1999) Policy gradient methods for reinforcement learning with function approximation. Advances in neural information processing systems 12"},{"issue":"7540","key":"7431_CR47","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1038\/nature14236","volume":"518","author":"V Mnih","year":"2015","unstructured":"Mnih V, Kavukcuoglu K, Silver D, Rusu AA, Veness J, Bellemare MG, Graves A, Riedmiller M, Fidjeland AK, Ostrovski G (2015) Human-level control through deep reinforcement learning. Nature 518(7540):529\u2013533","journal-title":"Nature"},{"issue":"6","key":"7431_CR48","doi-asserted-by":"publisher","first-page":"4913","DOI":"10.1109\/TDSC.2023.3237604","volume":"20","author":"T Zhang","year":"2023","unstructured":"Zhang T, Xu C, Zhang B, Li X, Kuang X, Grieco LA (2023) Towards attack-resistant service function chain migration: a model-based adaptive proximal policy optimization approach. IEEE Trans Dependable Secure Comput 20(6):4913\u20134927","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"7431_CR49","doi-asserted-by":"crossref","unstructured":"Yao Y, He J, Li T, Wang Y, Lan X, Li Y (2023) An automatic xss attack vector generation method based on the improved dueling ddqn algorithm. IEEE Transactions on Dependable and Secure Computing","DOI":"10.1109\/TDSC.2023.3319352"},{"key":"7431_CR50","doi-asserted-by":"crossref","unstructured":"Li Q, Wang R, Li D, Shi F, Zhang M, Chattopadhyay A (2024) Dynpen: Automated penetration testing in dynamic network scenarios using deep reinforcement learning. IEEE Transactions on Information Forensics and Security","DOI":"10.1109\/TIFS.2024.3461950"},{"key":"7431_CR51","doi-asserted-by":"crossref","unstructured":"Zhou L, Qin K, Cully A, Livshits B, Gervais A (2021) On the just-in-time discovery of profit-generating transactions in defi protocols. In: 2021 IEEE Symposium on Security and Privacy (SP), pp. 919\u2013936. IEEE","DOI":"10.1109\/SP40001.2021.00113"},{"key":"7431_CR52","unstructured":"Yang T, Wang D (2024) Rankguess: Password guessing using adversarial ranking. In: 2025 IEEE Symposium on Security and Privacy (SP), pp. 40\u201340. IEEE Computer Society"},{"key":"7431_CR53","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3417853","author":"X Pei","year":"2024","unstructured":"Pei X, Deng X, Tian S, Jiang P, Zhao Y, Xue K (2024) A privacy-preserving graph neural network for network intrusion detection. IEEE Trans Dependable Secure Comput. https:\/\/doi.org\/10.1109\/TDSC.2024.3417853","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"7431_CR54","doi-asserted-by":"crossref","unstructured":"Xie X, Li Y, Zhang W, Wang T, Xu S, Zhu J, Song Y (2024) Gauv: A graph-based automated verification framework for perfect semi-honest security of multiparty computation protocols. In: 2024 IEEE Symposium on Security and Privacy (SP), pp. 131\u2013131. IEEE Computer Society","DOI":"10.1109\/SP54263.2024.00131"},{"key":"7431_CR55","doi-asserted-by":"crossref","unstructured":"She D, Shah A, Jana S (2022) Effective seed scheduling for fuzzing with graph centrality analysis. In: 2022 IEEE Symposium on Security and Privacy (SP), pp. 2194\u20132211. IEEE","DOI":"10.1109\/SP46214.2022.9833761"},{"key":"7431_CR56","unstructured":"Hamilton W, Ying Z, Leskovec J (2017) Inductive representation learning on large graphs. Advances in neural information processing systems 30"},{"key":"7431_CR57","doi-asserted-by":"publisher","first-page":"3972","DOI":"10.1109\/TIFS.2022.3208815","volume":"17","author":"S Wang","year":"2022","unstructured":"Wang S, Wang Z, Zhou T, Sun H, Yin X, Han D, Zhang H, Shi X, Yang J (2022) Threatrace: Detecting and tracing host-based threats in node level through provenance graph learning. IEEE Trans Inf Forensics Secur 17:3972\u20133987","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"7431_CR58","doi-asserted-by":"publisher","unstructured":"Waheed A, Duddu V, Asokan N (2024) Grove: Ownership verification of graph neural networks using embeddings. In: 2024 IEEE Symposium on Security and Privacy (SP), pp. 2460\u20132477. https:\/\/doi.org\/10.1109\/SP54263.2024.00050","DOI":"10.1109\/SP54263.2024.00050"},{"key":"7431_CR59","unstructured":"Schulman J, Wolski F, Dhariwal P, Radford A, Klimov O (2017) Proximal policy optimization algorithms. arXiv preprint arXiv:1707.06347"},{"key":"7431_CR60","unstructured":"Haarnoja T, Zhou A, Abbeel P, Levine S (2018) Soft actor-critic: Off-policy maximum entropy deep reinforcement learning with a stochastic actor. In: International Conference on Machine Learning, pp. 1861\u20131870. Pmlr"},{"key":"7431_CR61","unstructured":"Silver D, Lever G, Heess N, Degris T, Wierstra D, Riedmiller M (2014) Deterministic policy gradient algorithms. In: International Conference on Machine Learning, pp. 387\u2013395. Pmlr"},{"key":"7431_CR62","unstructured":"Konda V, Tsitsiklis J (1999) Actor-critic algorithms. Advances in neural information processing systems 12"},{"key":"7431_CR63","unstructured":"Schulman J, Levine S, Abbeel P, Jordan M, Moritz P (2015) Trust region policy optimization. In: International Conference on Machine Learning, pp. 1889\u20131897. PMLR"},{"key":"7431_CR64","unstructured":"Brockman G, Cheung V, Pettersson L, Schneider J, Schulman J, Tang J, Zaremba W (2016) Openai gym. arXiv preprint arXiv:1606.01540"},{"key":"7431_CR65","unstructured":"CUABv2: Recurrent neural networks double DQN. https:\/\/github.com\/mprhode\/cyborg-submission-CUABv2 (2023)"},{"key":"7431_CR66","doi-asserted-by":"publisher","unstructured":"Zhao Z, Li Z, Jiang J, Yu F, Zhang F, Xu C, Zhao X, Zhang R, Guo S (2023) Ernn: Error-resilient rnn for encrypted traffic detection towards network-induced phenomena. IEEE Transactions on Dependable and Secure Computing 1\u201318. https:\/\/doi.org\/10.1109\/TDSC.2023.3242134","DOI":"10.1109\/TDSC.2023.3242134"},{"key":"7431_CR67","doi-asserted-by":"publisher","first-page":"2553","DOI":"10.1109\/TIFS.2023.3265884","volume":"18","author":"X Xia","year":"2023","unstructured":"Xia X, Lin J, Jia Q, Wang X, Ma C, Cui J, Liang W (2023) Etd-convlstm: a deep learning approach for electricity theft detection in smart grids. IEEE Trans Inf Forensics Secur 18:2553\u20132568. https:\/\/doi.org\/10.1109\/TIFS.2023.3265884","journal-title":"IEEE Trans Inf Forensics Secur"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-07431-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-025-07431-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-07431-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T13:35:35Z","timestamp":1749130535000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-025-07431-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,5]]},"references-count":67,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2025,6]]}},"alternative-id":["7431"],"URL":"https:\/\/doi.org\/10.1007\/s11227-025-07431-3","relation":{},"ISSN":["1573-0484"],"issn-type":[{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,5]]},"assertion":[{"value":"11 May 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 June 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"968"}}