{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T08:04:36Z","timestamp":1776153876978,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T00:00:00Z","timestamp":1619308800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T00:00:00Z","timestamp":1619308800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s11432-020-3125-y","type":"journal-article","created":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T17:02:26Z","timestamp":1619715746000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":93,"title":["Intelligent resource allocation in mobile blockchain for privacy and security transactions: a deep reinforcement learning based approach"],"prefix":"10.1007","volume":"64","author":[{"given":"Zhaolong","family":"Ning","sequence":"first","affiliation":[]},{"given":"Shouming","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Xiaojie","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Guoyin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xinbo","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Ricky Y. K.","family":"Kwok","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,25]]},"reference":[{"key":"3125_CR1","doi-asserted-by":"publisher","unstructured":"Ning Z, Dong P, Wang X, et al. Partial computation offloading and adaptive task scheduling for 5G-enabled vehicular networks. IEEE Trans Mobile Comput, 2020. doi: https:\/\/doi.org\/10.1109\/TMC.2020.3025116","DOI":"10.1109\/TMC.2020.3025116"},{"key":"3125_CR2","doi-asserted-by":"publisher","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","volume":"10","author":"L D Xu","year":"2014","unstructured":"Xu L D, He W, Li S. Internet of Things in industries: a survey. IEEE Trans Ind Inf, 2014, 10: 2233\u20132243","journal-title":"IEEE Trans Ind Inf"},{"key":"3125_CR3","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1109\/JSAC.2020.3020645","volume":"39","author":"Z Ning","year":"2021","unstructured":"Ning Z, Dong P, Wang X, et al. Mobile edge computing enabled 5G health monitoring for Internet of Medical Things: a decentralized game theoretic approach. IEEE J Sel Areas Commun, 2021, 39: 463\u2013478","journal-title":"IEEE J Sel Areas Commun"},{"key":"3125_CR4","doi-asserted-by":"publisher","first-page":"3527","DOI":"10.1109\/TII.2019.2898900","volume":"15","author":"D Liu","year":"2019","unstructured":"Liu D, Alahmadi A, Ni J, et al. Anonymous reputation system for IIoT-enabled retail marketing atop PoS blockchain. IEEE Trans Ind Inf, 2019, 15: 3527\u20133537","journal-title":"IEEE Trans Ind Inf"},{"key":"3125_CR5","doi-asserted-by":"publisher","first-page":"1314","DOI":"10.1109\/COMST.2018.2882064","volume":"21","author":"X Wang","year":"2019","unstructured":"Wang X, Ning Z, Zhou M C, et al. Privacy-preserving content dissemination for vehicular social networks: challenges and solutions. IEEE Commun Surv Tut, 2019, 21: 1314\u20131345","journal-title":"IEEE Commun Surv Tut"},{"key":"3125_CR6","doi-asserted-by":"publisher","first-page":"122310","DOI":"10.1007\/s11432-015-5467-7","volume":"59","author":"Y Yu","year":"2016","unstructured":"Yu Y, Ning Z L, Guo L. A secure routing scheme based on social network analysis in wireless mesh networks. Sci China Inf Sci, 2016, 59: 122310","journal-title":"Sci China Inf Sci"},{"key":"3125_CR7","doi-asserted-by":"publisher","first-page":"1495","DOI":"10.1109\/JIOT.2018.2836144","volume":"6","author":"Z Yang","year":"2019","unstructured":"Yang Z, Yang K, Lei L, et al. Blockchain-based decentralized trust management in vehicular networks. IEEE Internet Things J, 2019, 6: 1495\u20131505","journal-title":"IEEE Internet Things J"},{"key":"3125_CR8","doi-asserted-by":"publisher","first-page":"1676","DOI":"10.1109\/COMST.2018.2886932","volume":"21","author":"M S Ali","year":"2019","unstructured":"Ali M S, Vecchio M, Pincheira M, et al. Applications of blockchains in the Internet of Things: a comprehensive survey. IEEE Commun Surv Tut, 2019, 21: 1676\u20131717","journal-title":"IEEE Commun Surv Tut"},{"key":"3125_CR9","doi-asserted-by":"publisher","unstructured":"Ning Z, Zhang K, Wang X, et al. Intelligent edge computing in Internet of vehicles: a joint computation offloading and caching solution. IEEE Trans Intell Transp Syst, 2020. doi: https:\/\/doi.org\/10.1109\/TITS.2020.2997832","DOI":"10.1109\/TITS.2020.2997832"},{"key":"3125_CR10","doi-asserted-by":"publisher","unstructured":"Wang X, Ning Z, Guo S, et al. Imitation learning enabled task scheduling for online vehicular edge computing. IEEE Trans Mobile Comput, 2020. doi: https:\/\/doi.org\/10.1109\/TMC.2020.3012509","DOI":"10.1109\/TMC.2020.3012509"},{"key":"3125_CR11","doi-asserted-by":"publisher","unstructured":"Ning Z L, Zhang K Y, Wang X J, et al. Joint computing and caching in 5G-envisioned internet of vehicles: a deep reinforcement learning-based traffic control system. IEEE Trans Intell Transp Syst, 2020. doi: https:\/\/doi.org\/10.1109\/TITS.2020.2970276","DOI":"10.1109\/TITS.2020.2970276"},{"key":"3125_CR12","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1109\/TPDS.2020.3023936","volume":"32","author":"X Wang","year":"2020","unstructured":"Wang X, Ning Z, Guo S. Multi-agent imitation learning for pervasive edge computing: a decentralized computation offloading algorithm. IEEE Trans Parall Distrib Syst, 2020, 32: 411\u2013425","journal-title":"IEEE Trans Parall Distrib Syst"},{"key":"3125_CR13","doi-asserted-by":"publisher","first-page":"2375","DOI":"10.1109\/JIOT.2017.2759728","volume":"5","author":"J Zhu","year":"2018","unstructured":"Zhu J, Song Y, Jiang D, et al. A new deep-Q-learning-based transmission scheduling mechanism for the cognitive Internet of Things. IEEE Internet Things J, 2018, 5: 2375\u20132385","journal-title":"IEEE Internet Things J"},{"key":"3125_CR14","doi-asserted-by":"publisher","first-page":"3133","DOI":"10.1109\/COMST.2019.2916583","volume":"21","author":"N C Luong","year":"2019","unstructured":"Luong N C, Hoang D T, Gong S, et al. Applications of deep reinforcement learning in communications and networking: a survey. IEEE Commun Surv Tut, 2019, 21: 3133\u20133174","journal-title":"IEEE Commun Surv Tut"},{"key":"3125_CR15","doi-asserted-by":"publisher","first-page":"10119","DOI":"10.1109\/JIOT.2019.2935543","volume":"6","author":"L Lei","year":"2019","unstructured":"Lei L, Xu H, Xiong X, et al. Multiuser resource control with deep reinforcement learning in IoT edge computing. IEEE Internet Things J, 2019, 6: 10119\u201310133","journal-title":"IEEE Internet Things J"},{"key":"3125_CR16","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1109\/JSAC.2018.2815360","volume":"36","author":"M Chen","year":"2018","unstructured":"Chen M, Hao Y. Task offloading for mobile edge computing in software defined ultra-dense network. IEEE J Sel Areas Commun, 2018, 36: 587\u2013597","journal-title":"IEEE J Sel Areas Commun"},{"key":"3125_CR17","unstructured":"Nguyen D, Pathirana P, Ding M, et al. Privacy-preserved task offloading in mobile blockchain with deep reinforcement learning. 2019. ArXiv:1908.07467"},{"key":"3125_CR18","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MNET.2019.1800376","volume":"33","author":"Y Dai","year":"2019","unstructured":"Dai Y, Xu D, Maharjan S, et al. Blockchain and deep reinforcement learning empowered intelligent 5G beyond. IEEE Network, 2019, 33: 10\u201317","journal-title":"IEEE Network"},{"key":"3125_CR19","doi-asserted-by":"publisher","first-page":"6214","DOI":"10.1109\/JIOT.2019.2961707","volume":"7","author":"J Feng","year":"2020","unstructured":"Feng J, Yu F R, Pei Q, et al. Cooperative computation offloading and resource allocation for blockchain-enabled mobile-edge computing: a deep reinforcement learning approach. IEEE Internet Things J, 2020, 7: 6214\u20136228","journal-title":"IEEE Internet Things J"},{"key":"3125_CR20","doi-asserted-by":"publisher","first-page":"8050","DOI":"10.1109\/TVT.2019.2924015","volume":"68","author":"X Qiu","year":"2019","unstructured":"Qiu X, Liu L, Chen W, et al. Online deep reinforcement learning for computation offloading in blockchain-empowered mobile edge computing. IEEE Trans Veh Technol, 2019, 68: 8050\u20138062","journal-title":"IEEE Trans Veh Technol"},{"key":"3125_CR21","doi-asserted-by":"crossref","unstructured":"Xiong Z, Feng S, Niyato D, et al. Edge computing resource management and pricing for mobile blockchain. 2017. ArXiv:1710.01567","DOI":"10.1109\/ICC.2018.8422517"},{"key":"3125_CR22","doi-asserted-by":"publisher","first-page":"4585","DOI":"10.1109\/JIOT.2018.2871706","volume":"6","author":"Z Xiong","year":"2019","unstructured":"Xiong Z, Feng S, Wang W, et al. Cloud\/fog computing resource management and pricing for blockchain networks. IEEE Internet Things J, 2019, 6: 4585\u20134600","journal-title":"IEEE Internet Things J"},{"key":"3125_CR23","doi-asserted-by":"publisher","first-page":"2906","DOI":"10.1109\/TVT.2019.2894944","volume":"68","author":"J Kang","year":"2019","unstructured":"Kang J, Xiong Z, Niyato D, et al. Toward secure blockchain-enabled internet of vehicles: optimizing consensus management using reputation and contract theory. IEEE Trans Veh Technol, 2019, 68: 2906\u20132920","journal-title":"IEEE Trans Veh Technol"},{"key":"3125_CR24","doi-asserted-by":"publisher","first-page":"8577","DOI":"10.1109\/JIOT.2019.2921159","volume":"6","author":"C Qiu","year":"2019","unstructured":"Qiu C, Hu Y, Chen Y, et al. Deep deterministic policy gradient (DDPG)-based energy harvesting wireless communications. IEEE Internet Things J, 2019, 6: 8577\u20138588","journal-title":"IEEE Internet Things J"},{"key":"3125_CR25","unstructured":"Lillicrap T, Hunt J, Pritzel A, et al. Continuous control with deep reinforcement learning. 2015. ArXiv:1509.02971"},{"key":"3125_CR26","doi-asserted-by":"publisher","first-page":"2187","DOI":"10.1109\/ACCESS.2017.2654378","volume":"5","author":"C Mao","year":"2017","unstructured":"Mao C, Lin R, Xu C, et al. Towards a trust prediction framework for cloud services based on PSO-driven neural network. IEEE Access, 2017, 5: 2187\u20132199","journal-title":"IEEE Access"},{"key":"3125_CR27","doi-asserted-by":"publisher","unstructured":"Asheralieva A, Niyato D. Learning-based mobile edge computing resource management to support public blockchain networks. IEEE Trans Mobile Comput, 2020. doi: https:\/\/doi.org\/10.1109\/TMC.2019.2959772","DOI":"10.1109\/TMC.2019.2959772"},{"key":"3125_CR28","doi-asserted-by":"publisher","first-page":"1225","DOI":"10.1109\/TC.2019.2900648","volume":"68","author":"J Yu","year":"2019","unstructured":"Yu J, Kozhaya D, Decouchant J, et al. RepuCoin: your reputation is your power. IEEE Trans Comput, 2019, 68: 1225\u20131237","journal-title":"IEEE Trans Comput"},{"key":"3125_CR29","doi-asserted-by":"publisher","first-page":"11169","DOI":"10.1109\/TVT.2019.2937351","volume":"68","author":"Y Liu","year":"2019","unstructured":"Liu Y, Yu F R, Li X, et al. Decentralized resource allocation for video transcoding and delivery in blockchain-based system with mobile edge computing. IEEE Trans Veh Technol, 2019, 68: 11169\u201311185","journal-title":"IEEE Trans Veh Technol"},{"key":"3125_CR30","doi-asserted-by":"publisher","first-page":"11008","DOI":"10.1109\/TVT.2018.2866365","volume":"67","author":"M Liu","year":"2018","unstructured":"Liu M, Yu F R, Teng Y, et al. Computation offloading and content caching in wireless blockchain networks with mobile edge computing. IEEE Trans Veh Technol, 2018, 67: 11008\u201311021","journal-title":"IEEE Trans Veh Technol"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-020-3125-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-020-3125-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-020-3125-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T20:09:32Z","timestamp":1658347772000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-020-3125-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,25]]},"references-count":30,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["3125"],"URL":"https:\/\/doi.org\/10.1007\/s11432-020-3125-y","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,25]]},"assertion":[{"value":"1 May 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 July 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 November 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 April 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"162303"}}