{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T10:45:05Z","timestamp":1748601905492,"version":"3.37.3"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T00:00:00Z","timestamp":1619481600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T00:00:00Z","timestamp":1619481600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No.61971147","61702127"],"award-info":[{"award-number":["No.61971147","61702127"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Hundred Young Talents Plan Project of Guangdong University of Technology","award":["220413618"],"award-info":[{"award-number":["220413618"]}]},{"name":"Science and Technology Program of Guangzhou","award":["201804010461"],"award-info":[{"award-number":["201804010461"]}]},{"DOI":"10.13039\/501100004543","name":"China Scholarship Council","doi-asserted-by":"publisher","award":["201908440085","201908440064"],"award-info":[{"award-number":["201908440085","201908440064"]}],"id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2022,6]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In overlapping spectrum sharing, due to the complexity of cognitive environment, it is a real challenge for a secondary user (SU) to correctly sense the usage of the spectrum in real time. To tackle this challenge, a social awareness-aided transmit power control policy for SUs is developed. First, a social network composed of a group of third-party sensing nodes that do not share the spectrum with the PU is established, which helps an SU collect the power information of the PU. Then, we design a Dueling Deep Q-Network (DQN) model to achieve efficient dynamic spectrum sharing between the PU and the SU with the power information collected in the social network. Experimental results show that the spectrum sharing success rate is higher and the comprehensive performance is improved with the sensing nodes selected by the social relationship. Moreover, compared with other deep reinforcement learning (DRL) algorithms, the performance of Dueling DQN is more stable on our targeted spectrum sharing problem.<\/jats:p>","DOI":"10.1007\/s40747-021-00382-1","type":"journal-article","created":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T22:02:54Z","timestamp":1619560974000},"page":"1975-1986","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Dueling deep Q-networks for social awareness-aided spectrum sharing"],"prefix":"10.1007","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0051-7224","authenticated-orcid":false,"given":"Yonghua","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xueyang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Pin","family":"Wan","sequence":"additional","affiliation":[]},{"given":"Le","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Xia","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,27]]},"reference":[{"issue":"2","key":"382_CR1","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1109\/JSAC.2004.839380","volume":"23","author":"S Haykin","year":"2005","unstructured":"Haykin S (2005) Cognitive radio: brain-empowered wireless communications. IEEE J Select Areas Commun 23(2):201\u2013220","journal-title":"IEEE J Select Areas Commun"},{"issue":"4","key":"382_CR2","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/98.788210","volume":"6","author":"J Mitola III","year":"1999","unstructured":"Mitola J III, Maguire G Jr (1999) Cognitive radio: making software radios more personal. IEEE Pers Commun 6(4):13\u201318","journal-title":"IEEE Pers Commun"},{"issue":"3","key":"382_CR3","first-page":"66","volume":"294","author":"JI Mitola","year":"2000","unstructured":"Mitola JI (2000) Cognitive radio: an integrated agent architecture for software defined radio dissertation. Dissert R Inst Technol Swed 294(3):66\u201373","journal-title":"Dissert R Inst Technol Swed"},{"issue":"3","key":"382_CR4","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1109\/TCSS.2020.2979531","volume":"7","author":"L Yang","year":"2020","unstructured":"Yang L, Wang X, Zhang JJ, Zhou M, Wang F (2020) Pedestrian choice modeling and simulation of staged evacuation strategies in Daya Bay Nuclear Power Plant. IEEE Trans Comput Soc Syst 7(3):686\u2013695","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"382_CR5","doi-asserted-by":"crossref","unstructured":"Li Z, Han S, Wang X (2020) Power allocation scheme for physical-layer security of two-way untrusted relay in SCMA networks. In: Proceedings of international conference on computing, networking and communications (ICNC), pp 497\u2013501","DOI":"10.1109\/ICNC47757.2020.9049661"},{"issue":"4","key":"382_CR6","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/BF01098870","volume":"1","author":"SA Grandhi","year":"1994","unstructured":"Grandhi SA, Zander J, Yates R (1994) Constrained power control. Wirel Pers Commun 1(4):257\u2013270","journal-title":"Wirel Pers Commun"},{"key":"382_CR7","unstructured":"Bambos N, Chen SC, Pottie GJ (1995) Radio link admission algorithms for wireless networks with power control and active link quality protection. In: Proceedings of IEEE international conference on computer communications (INFOCOM), Boston"},{"issue":"8","key":"382_CR8","doi-asserted-by":"publisher","first-page":"3106","DOI":"10.1109\/TWC.2008.070022","volume":"7","author":"AT Hoang","year":"2008","unstructured":"Hoang AT, Liang Y (2008) Downlink channel assignment and power control for cognitive radio networks. IEEE Trans Wirel Commun 7(8):3106\u20133117","journal-title":"IEEE Trans Wirel Commun"},{"key":"382_CR9","doi-asserted-by":"crossref","unstructured":"Hoang AT, Liang Y (2006) A two-phase channel and power allocation scheme for cognitive radio networks. In: Proceedings of IEEE international symposium on personal, indoor and mobile radio communications (PIMRC), pp 1\u20135","DOI":"10.1109\/PIMRC.2006.254371"},{"issue":"4","key":"382_CR10","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1109\/TMC.2004.44","volume":"3","author":"A Behzad","year":"2004","unstructured":"Behzad A, Rubin Z (2004) Multiple access protocol for power-controlled wireless access nets. IEEE Trans Mob Comput 3(4):307\u2013316","journal-title":"IEEE Trans Mob Comput"},{"key":"382_CR11","doi-asserted-by":"crossref","unstructured":"Hoang AT, Liang Y (2006) Maximizing spectrum utilization of cognitive radio networks using channel allocation and power control. In: Proceedings of IEEE vehicular technology conference (VTC), pp 1\u20135","DOI":"10.1109\/VTCF.2006.257"},{"key":"382_CR12","unstructured":"Zheng HT, Peng CY (2005) Collaboration and fairness in opportunistic spectrum access. In: Proceedings of IEEE international conference on communications (ICC), vol 5, pp 3132\u20133136"},{"issue":"7540","key":"382_CR13","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1038\/nature14236","volume":"518","author":"V Mnih","year":"2015","unstructured":"Mnih V, Kavukcuoglu K, Silver D et al (2015) Human-level control through deep reinforcement learning. Nature 518(7540):529\u2013533","journal-title":"Nature"},{"key":"382_CR14","unstructured":"Mnih V, Kavukcuoglu K, Silver D et al (2013) Playing atari with deep reinforcement learning. In: Neural information processing systems, pp 201\u2013203"},{"key":"382_CR15","doi-asserted-by":"crossref","unstructured":"Gu S, Holly E, Lillicrap T et al (2017) Deep reinforcement learning for robotic manipulation with asynchronous off-policy updates. In: Proceedings of IEEE international conference on robotics and automation (ICRA), pp 3389\u20133396","DOI":"10.1109\/ICRA.2017.7989385"},{"key":"382_CR16","unstructured":"Xiong X, Wang J, Zhang F et al (2016) Combining deep reinforcement learning and safety based control for autonomous driving. arXiv:1612.00147"},{"key":"382_CR17","doi-asserted-by":"publisher","first-page":"70","DOI":"10.2352\/ISSN.2470-1173.2017.19.AVM-023","volume":"19","author":"AE Sallab","year":"2017","unstructured":"Sallab AE, Abdou M, Perot E et al (2017) Deep reinforcement learning framework for autonomous driving. Electron Imaging 19:70\u201376","journal-title":"Electron Imaging"},{"key":"382_CR18","doi-asserted-by":"crossref","unstructured":"Thananjeyan B, Garg A, Krishnan S et al (2017) Multilateral surgical pattern cutting in 2D orthotropic gauze with deep reinforcement learning policies for tensioning. In: Proceedings of IEEE international conference on robotics and automation (ICRA), pp 2371\u20132378","DOI":"10.1109\/ICRA.2017.7989275"},{"key":"382_CR19","unstructured":"O\u2019Shea TJ, Clancy TC (2016) Deep reinforcement learning radio control and signal detection with KeRLym, A Gym RL Agent. arXiv:1605.09221"},{"issue":"3","key":"382_CR20","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1109\/TCSS.2018.2860580","volume":"5","author":"J Li","year":"2018","unstructured":"Li J, Wang S, Yuan Y, Ni X, Wang F (2018) Dynamic optimization of employees work strategies in a WeChat-based evaluation system. IEEE Trans Comput Soc Syst 5(3):687\u2013697","journal-title":"IEEE Trans Comput Soc Syst"},{"issue":"5","key":"382_CR21","doi-asserted-by":"publisher","first-page":"1638","DOI":"10.1109\/TSMC.2017.2710161","volume":"50","author":"J Cao","year":"2020","unstructured":"Cao J, Wang S, Li B, Wang X, Ding Z, Wang F (2020) Integrating multisourced texts in online business intelligence systems. IEEE Trans Syst Man Cybern Syst 50(5):1638\u20131648","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"382_CR22","doi-asserted-by":"crossref","unstructured":"Xu P, Hu W, Wu J, Liu W, Du B, Yang J (2019) Social trust network embedding. In: Proceedings of IEEE international conference on data mining (ICDM), pp 678\u2013687","DOI":"10.1109\/ICDM.2019.00078"},{"key":"382_CR23","doi-asserted-by":"crossref","unstructured":"Gao W, Li Q, Zhao B, Cao G (2009) Multicasting in delay tolerant networks: a social network perspective. In: Proceedings of ACM international symposium on mobile ad hoc networking and computing (MobiHoc)","DOI":"10.1145\/1530748.1530790"},{"issue":"5","key":"382_CR24","doi-asserted-by":"publisher","first-page":"1471","DOI":"10.1109\/TNET.2014.2329956","volume":"23","author":"X Chen","year":"2015","unstructured":"Chen X, Proulx B, Gong X, Zhang J (2015) Exploiting social ties for cooperative D2D communications: a mobile social networking case. IEEE\/ACM Trans Netw 23(5):1471\u20131484","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"1","key":"382_CR25","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1109\/TCSS.2017.2777602","volume":"5","author":"P Ye","year":"2018","unstructured":"Ye P, Wang S, Wang F (2018) A general cognitive architecture for agent-based modeling in artificial societies. IEEE Trans Comput Soc Syst 5(1):176\u2013185","journal-title":"IEEE Trans Comput Soc Syst"},{"issue":"2","key":"382_CR26","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1109\/TCSS.2020.2980007","volume":"7","author":"L Li","year":"2020","unstructured":"Li L, Zhang Q, Wang X, Zhang J, Wang T, Gao TL, Duan W, Tsoi KKF, Wang FY (2020) Characterizing the propagation of situational information in social media during COVID-19 epidemic: a case study on Weibo. IEEE Trans Comput Soc Syst 7(2):556\u2013562","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"382_CR27","doi-asserted-by":"crossref","unstructured":"Islam MH, Liang Y, Hoang AT (2007) Distributed power and admission control for cognitive radio networks using antenna arrays. In: Proceedings of IEEE international symposium on new frontiers in dynamic spectrum access networks (DySPAN), pp 250\u2013253","DOI":"10.1109\/DYSPAN.2007.40"},{"key":"382_CR28","doi-asserted-by":"crossref","unstructured":"Chen X, Zhao Z, Zhang H (2013) Stochastic power adaptation with multiagent reinforcement learning for cognitive wireless mesh networks. IEEE Trans Mob Comput 12(11):2155\u20132166","DOI":"10.1109\/TMC.2012.178"},{"key":"382_CR29","doi-asserted-by":"crossref","unstructured":"Naparstek O, Cohen K (2019) Deep multi-user reinforcement learning for distributed dynamic spectrum access. IEEE Trans Wirel Commun 18(1):310\u2013323","DOI":"10.1109\/TWC.2018.2879433"},{"key":"382_CR30","doi-asserted-by":"crossref","unstructured":"Chang H, Song H, Yi Y, Zhang J, He H, Liu L (2019) Distributive dynamic spectrum access through deep reinforcement learning: a reservoir computing based approach. IEEE Internet Things J 6(2):1938\u20131948","DOI":"10.1109\/JIOT.2018.2872441"},{"key":"382_CR31","doi-asserted-by":"crossref","unstructured":"Shah-Mohammadi F, Kwasinski F (2018) Deep reinforcement learning approach to qoe-driven resource allocation for spectrum underlay in cognitive radio networks. In: IEEE international conference on communications workshops, pp 1\u20136","DOI":"10.1109\/ICCW.2018.8403658"},{"issue":"5","key":"382_CR32","doi-asserted-by":"publisher","first-page":"998","DOI":"10.1109\/LCOMM.2018.2815018","volume":"22","author":"X Liu","year":"2018","unstructured":"Liu X, Xu Y, Jia L, Wu Q, Anpalagan A (2018) Anti-jamming communications using spectrum waterfall: a deep reinforcement learning approach. IEEE Commun Lett 22(5):998\u20131001","journal-title":"IEEE Commun Lett"},{"issue":"9","key":"382_CR33","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1109\/CC.2018.8456453","volume":"15","author":"X Liu","year":"2018","unstructured":"Liu X, Xu Y, Cheng Y, Li Y, Zhao L, Zhang X (2018) A heterogeneous information fusion deep reinforcement learning for intelligent frequency selection of HF communication. China Commun 15(9):73\u201384","journal-title":"China Commun"},{"key":"382_CR34","doi-asserted-by":"publisher","first-page":"25463","DOI":"10.1109\/ACCESS.2018.2831240","volume":"6","author":"X Li","year":"2018","unstructured":"Li X, Fang J, Cheng W, Duan H, Chen Z, Li H (2018) Intelligent power control for spectrum sharing in cognitive radios: a deep reinforcement learning approach. IEEE Access 6:25463\u201325473","journal-title":"IEEE Access"},{"issue":"6","key":"382_CR35","first-page":"25463","volume":"19","author":"H Zhang","year":"2020","unstructured":"Zhang H, Yang N, Huangfu W, Long K, Leung VC (2020) Power control based on deep reinforcement learning for spectrum sharing. IEEE Trans Wirel Commun 19(6):25463\u201325473","journal-title":"IEEE Trans Wirel Commun"},{"issue":"5","key":"382_CR36","doi-asserted-by":"publisher","first-page":"3124","DOI":"10.1109\/TCOMM.2019.2894138","volume":"67","author":"Y Gao","year":"2019","unstructured":"Gao Y, Xiao Y, Wu M, Xiao M, Shao J (2019) Dynamic social-aware peer selection for cooperative relay management with D2D communications. IEEE Trans Commun 67(5):3124\u20133139","journal-title":"IEEE Trans Commun"},{"key":"382_CR37","doi-asserted-by":"crossref","unstructured":"Chen X, Gong X, Yang L, Zhang J (2014) A social group utility maximization framework with applications in database assisted spectrum access. In: Proceedings of IEEE conference on computer communications (INFOCOM), pp 1959\u20131967","DOI":"10.1109\/INFOCOM.2014.6848136"},{"key":"382_CR38","doi-asserted-by":"crossref","unstructured":"Padalkar S, Korlekar A, Pacharaney U (2016) Data gathering in wireless sensor network for energy efficiency with and without compressive sensing at sensor node. In: Proceedings of IEEE international conference on communication and signal processing (ICCSP), pp 1356\u20131359","DOI":"10.1109\/ICCSP.2016.7754374"},{"issue":"4","key":"382_CR39","doi-asserted-by":"publisher","first-page":"554","DOI":"10.1109\/TCSS.2019.2914264","volume":"6","author":"R Das","year":"2019","unstructured":"Das R, Kamruzzaman J, Karmakar G (2019) Opinion formation in online social networks: exploiting predisposition. Interaction, and credibility. IEEE Trans Comput Soc Syst 6(4):554\u2013566","journal-title":"IEEE Trans Comput Soc Syst"},{"issue":"4","key":"382_CR40","doi-asserted-by":"crossref","first-page":"e3901","DOI":"10.1002\/ett.3901","volume":"31","author":"O Simpson","year":"2020","unstructured":"Simpson O, Sun Y (2020) Efficient evidence-based decision fusion scheme for cooperative spectrum sensing in cognitive radio networks. Trans Emerg Telecommun Technol 31(4):e3901","journal-title":"Trans Emerg Telecommun Technol"},{"key":"382_CR41","unstructured":"Chen HB, Zhao F, Deng XF (2011) Cognitive radio spectrum sharing model based on social networks. Appl Res Comput 28(8)"},{"issue":"1","key":"382_CR42","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1109\/TWC.2018.2879433","volume":"18","author":"O Naparstek","year":"2018","unstructured":"Naparstek O, Kobi C (2018) Deep multi-user reinforcement learning for distributed dynamic spectrum access. IEEE Trans Wirel Commun 18(1):310\u2013323","journal-title":"IEEE Trans Wirel Commun"},{"key":"382_CR43","doi-asserted-by":"crossref","unstructured":"HWatkins CJC, Dayan P (1992) Technical note: Q-learning. Mach Learn 8(3):279\u2013292","DOI":"10.1007\/BF00992698"},{"key":"382_CR44","doi-asserted-by":"crossref","unstructured":"Auer P et al (1995) Gambling in a rigged casino: the adversarial multi-armed bandit problem. In: Proceedings of IEEE annual foundations of computer science, pp 322\u2013331","DOI":"10.1109\/SFCS.1995.492488"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-021-00382-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-021-00382-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-021-00382-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,2]],"date-time":"2023-11-02T21:18:23Z","timestamp":1698959903000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-021-00382-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,27]]},"references-count":44,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["382"],"URL":"https:\/\/doi.org\/10.1007\/s40747-021-00382-1","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"type":"print","value":"2199-4536"},{"type":"electronic","value":"2198-6053"}],"subject":[],"published":{"date-parts":[[2021,4,27]]},"assertion":[{"value":"5 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 April 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 April 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}