{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:18:24Z","timestamp":1758845904194,"version":"3.44.0"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T00:00:00Z","timestamp":1757462400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T00:00:00Z","timestamp":1757462400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s40747-025-02079-1","type":"journal-article","created":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T07:34:55Z","timestamp":1757489695000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Collaborative multi-agent XRL for threat detection in mobile edge network traffic"],"prefix":"10.1007","volume":"11","author":[{"given":"Muhammad Yousaf","family":"Saeed","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8122-8052","authenticated-orcid":false,"given":"Jingsha","family":"He","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4036-0724","authenticated-orcid":false,"given":"Nafei","family":"Zhu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3649-5717","authenticated-orcid":false,"given":"Muhammad","family":"Farhan","sequence":"additional","affiliation":[]},{"given":"Ahmad","family":"Almadhor","sequence":"additional","affiliation":[]},{"given":"Thippa Reddy","family":"Gadekallu","sequence":"additional","affiliation":[]},{"given":"Saira","family":"Iqbal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,10]]},"reference":[{"key":"2079_CR1","doi-asserted-by":"publisher","unstructured":"Thockchom N, Singh MM, Nandi U A novel ensemble learning-based model for network intrusion detection. Complex Intell Syst, 9, 5, pp. 5693\u20135714, 2023\/10\/01 2023, https:\/\/doi.org\/10.1007\/s40747-023-01013-7","DOI":"10.1007\/s40747-023-01013-7"},{"issue":"24","key":"2079_CR2","doi-asserted-by":"publisher","first-page":"22008","DOI":"10.1109\/JIOT.2023.3304318","volume":"10","author":"C Wang","year":"2023","unstructured":"Wang C, Yuan Z, Zhou P, Xu Z, Li R, Wu DO (2023) The security and privacy of mobile-edge computing: an artificial intelligence perspective. IEEE Internet Things J 10(24):22008\u201322032","journal-title":"IEEE Internet Things J"},{"key":"2079_CR3","unstructured":"Far AZ, Far MZ, Gharibzadeh S, Zangeneh S, Amini L, Rahimi M (2024) Artificial intelligence for secured information systems in smart cities: Collaborative iot computing with deep reinforcement learning and blockchain, arXiv preprint arXiv:2409.16444,"},{"issue":"1","key":"2079_CR4","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/s40747-024-01661-3","volume":"11","author":"B Chen","year":"2024","unstructured":"Chen B, Li H, Zhao D, Yang Y, Pan C (2024) Quality assessment of cyber threat intelligence knowledge graph based on adaptive joining of embedding model. Complex Intell Syst 11(1):54. https:\/\/doi.org\/10.1007\/s40747-024-01661-3","journal-title":"Complex Intell Syst"},{"issue":"5","key":"2079_CR5","doi-asserted-by":"publisher","first-page":"156201","DOI":"10.1007\/s11432-024-4001-6","volume":"67","author":"B Yan","year":"2024","unstructured":"Yan B, Shi P, Chambers J (2024) Cooperative control for heterogeneous multi-agent systems: progress, applications, and challenges. Sci China Inform Sci 67(5):156201","journal-title":"Sci China Inform Sci"},{"key":"2079_CR6","doi-asserted-by":"publisher","unstructured":"Zhang Z, Zhu Z, Xu C, Zhang J, Xu S (2024) Towards accurate anomaly detection for cloud system via graph-enhanced contrastive learning. Complex & Intelligent Systems 11(1):23. https:\/\/doi.org\/10.1007\/s40747-024-01659-x","DOI":"10.1007\/s40747-024-01659-x"},{"key":"2079_CR7","unstructured":"Du H, Thudumu S, Vasa R, Mouzakis K (2024) A survey on context-aware multi-agent systems: techniques, challenges and future directions, arXiv preprint arXiv:2402.01968,"},{"issue":"3","key":"2079_CR8","first-page":"1","volume":"56","author":"D Bringhenti","year":"2023","unstructured":"Bringhenti D, Marchetto G, Sisto R, Valenza F (2023) Automation for network security configuration: state of the Art and research trends. ACM-CSUR 56(3):1\u201337","journal-title":"ACM-CSUR"},{"key":"2079_CR9","doi-asserted-by":"crossref","unstructured":"Li Y, Tong S (2023) Bumpless transfer distributed adaptive backstepping control of nonlinear multi-agent systems with circular filtering under DoS attacks. Automatica 157:111250","DOI":"10.1016\/j.automatica.2023.111250"},{"key":"2079_CR10","first-page":"15497","volume":"37","author":"H Ma","year":"2024","unstructured":"Ma H et al (2024) Coevolving with the other you: Fine-tuning Llm with sequential cooperative multi-agent reinforcement learning. Adv Neural Inf Process Syst 37:15497\u201315525","journal-title":"Adv Neural Inf Process Syst"},{"key":"2079_CR11","doi-asserted-by":"crossref","unstructured":"Nadeem A et al (2023) Sok: Explainable machine learning for computer security applications, in 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), IEEE, pp. 221\u2013240","DOI":"10.1109\/EuroSP57164.2023.00022"},{"key":"2079_CR12","doi-asserted-by":"publisher","first-page":"119000","DOI":"10.1016\/j.ins.2023.119000","volume":"639","author":"M Keshk","year":"2023","unstructured":"Keshk M, Koroniotis N, Pham N, Moustafa N, Turnbull B, Zomaya AY (2023) An explainable deep learning-enabled intrusion detection framework in IoT networks. Inf Sci 639:119000","journal-title":"Inf Sci"},{"key":"2079_CR13","doi-asserted-by":"publisher","unstructured":"Mathews S, Trivedi S, House A, Povolny S, Fralick C An explainable deepfake detection framework on a novel unconstrained dataset. Complex Intell Syst, 9, 4, pp. 4425\u20134437, 2023\/08\/01 2023, https:\/\/doi.org\/10.1007\/s40747-022-00956-7","DOI":"10.1007\/s40747-022-00956-7"},{"key":"2079_CR14","doi-asserted-by":"publisher","first-page":"23954","DOI":"10.1109\/ACCESS.2024.3365140","volume":"12","author":"O Arreche","year":"2024","unstructured":"Arreche O, Guntur TR, Roberts JW, Abdallah M (2024) E-XAI: evaluating black-box explainable AI frameworks for network intrusion detection. IEEE Access 12:23954\u201323988","journal-title":"IEEE Access"},{"issue":"3","key":"2079_CR15","doi-asserted-by":"publisher","first-page":"1252","DOI":"10.3390\/app13031252","volume":"13","author":"CI Nwakanma","year":"2023","unstructured":"Nwakanma CI et al (2023) Explainable artificial intelligence (XAI) for intrusion detection and mitigation in intelligent connected vehicles: A review. Appl Sci 13(3):1252","journal-title":"Appl Sci"},{"issue":"4","key":"2079_CR16","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MCOM.001.2300172","volume":"62","author":"N Khan","year":"2023","unstructured":"Khan N, Coleri S, Abdallah A, Celik A, Eltawil AM (2023) Explainable and robust artificial intelligence for trustworthy resource management in 6G networks. IEEE Commun Mag 62(4):50\u201356","journal-title":"IEEE Commun Mag"},{"key":"2079_CR17","doi-asserted-by":"publisher","unstructured":"Dong X, Wan G, Zeng P (2025) A heuristic-assisted deep reinforcement learning algorithm for flexible job shop scheduling with transport constraints. Complex & Intelligent Systems 11(5):210. https:\/\/doi.org\/10.1007\/s40747-025-01828-6","DOI":"10.1007\/s40747-025-01828-6"},{"key":"2079_CR18","doi-asserted-by":"publisher","unstructured":"Zhang H, Fang Z, Chen Y, Dai H, Jiang Q, Zeng X (2025) Traffic signal optimization control method based on attention mechanism updated weights double deep Q network. Complex & Intelligent Systems 11(5):217. https:\/\/doi.org\/10.1007\/s40747-025-01841-9","DOI":"10.1007\/s40747-025-01841-9"},{"key":"2079_CR19","unstructured":"Prokopova H (2023) Explainable AI for Multi-agent Control Problem"},{"key":"2079_CR20","doi-asserted-by":"crossref","unstructured":"Iturria-Rivera PE, Gaigalas R, Elsayed M, Bavand M, Ozcan Y, Erol-Kantarci M Extended Reality (XR) Codec Adaptation in 5G using Multi-Agent Reinforcement Learning with Attention Action Selection, in (2024) IEEE 35th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), 2024: IEEE, pp. 1\u20136","DOI":"10.1109\/PIMRC59610.2024.10817188"},{"key":"2079_CR21","unstructured":"Wen X et al (2024) Defending Against Network Attacks for Secure AI Agent Migration in Vehicular Metaverses, arXiv preprint arXiv:2412.20154,"},{"key":"2079_CR22","unstructured":"Adeniyi O (2024) Deep learning for DDoS attack detection in mobile edge computing"},{"issue":"2","key":"2079_CR23","doi-asserted-by":"publisher","first-page":"1226","DOI":"10.1109\/COMST.2021.3063822","volume":"23","author":"A Feriani","year":"2021","unstructured":"Feriani A, Hossain E (2021) Single and multi-agent deep reinforcement learning for AI-enabled wireless networks: A tutorial. IEEE Commun Surv Tutorials 23(2):1226\u20131252","journal-title":"IEEE Commun Surv Tutorials"},{"key":"2079_CR24","unstructured":"Wang W et al (2024) Optimizing age of information in vehicular edge computing with federated graph neural network multi-agent reinforcement learning, arXiv preprint arXiv:2407.02342,"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-025-02079-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-025-02079-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-025-02079-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T13:34:11Z","timestamp":1758807251000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-025-02079-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,10]]},"references-count":24,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["2079"],"URL":"https:\/\/doi.org\/10.1007\/s40747-025-02079-1","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"type":"print","value":"2199-4536"},{"type":"electronic","value":"2198-6053"}],"subject":[],"published":{"date-parts":[[2025,9,10]]},"assertion":[{"value":"10 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"446"}}