{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T12:06:05Z","timestamp":1768651565096,"version":"3.49.0"},"reference-count":32,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/100020595","name":"Taiwan Ministry of Science and Technology","doi-asserted-by":"publisher","award":["MOST 111-2221-E-343-002"],"award-info":[{"award-number":["MOST 111-2221-E-343-002"]}],"id":[{"id":"10.13039\/100020595","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1016\/j.comnet.2025.111885","type":"journal-article","created":{"date-parts":[[2025,11,23]],"date-time":"2025-11-23T07:07:10Z","timestamp":1763881630000},"page":"111885","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Scalable and interference-aware spectrum access in IoT networks via decentralized proximal policy optimization"],"prefix":"10.1016","volume":"275","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4746-1125","authenticated-orcid":false,"given":"Chien-Min","family":"Wu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shin-Zt","family":"Guan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chun-Chieh","family":"Yang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kung-Te","family":"Lin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Min-Yu","family":"Kuang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"key":"10.1016\/j.comnet.2025.111885_bib0001","first-page":"1","article-title":"A survey on cognitive radio network attack mitigation using machine learning and blockchain","volume":"98","author":"Ezhilarasi","year":"2023","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"10.1016\/j.comnet.2025.111885_bib0002","series-title":"Proc. 2024 9th Int. Conf. Sci","article-title":"Cognitive radio networks: an AI-enabled approach","author":"Prema","year":"2024"},{"key":"10.1016\/j.comnet.2025.111885_bib0003","doi-asserted-by":"crossref","first-page":"71097","DOI":"10.1109\/ACCESS.2023.3294091","article-title":"Convergence of IoT and cognitive radio networks: a survey of applications, techniques, and challenges","volume":"11","author":"Khasawneh","year":"2023","journal-title":"IEEE Access"},{"issue":"Part A","key":"10.1016\/j.comnet.2025.111885_bib0004","first-page":"1","article-title":"An energy-aware link fault detection and recovery scheme for QoS enhancement in Internet of Things-enabled wireless sensor network","volume":"123","author":"Aruchamy","year":"2025","journal-title":"Comput. Electr. Eng."},{"key":"10.1016\/j.comnet.2025.111885_bib0005","series-title":"2025 3rd International Conference on Communication, Security, and Artificial Intelligence (ICCSAI)","article-title":"Design of smart system for mitigating wild animal intrusion in agricultural farms using IoT and deep learning","author":"Prasanth","year":"2025"},{"key":"10.1016\/j.comnet.2025.111885_bib0006","series-title":"Technological Advancement in Internet of Medical Things and Blockchain for Personalized Healthcare: Applications and Use Cases","author":"Prasanth","year":"2024"},{"key":"10.1016\/j.comnet.2025.111885_bib0007","doi-asserted-by":"crossref","first-page":"11208","DOI":"10.1109\/JIOT.2021.3052691","article-title":"A deep reinforcement learning framework for spectrum management in dynamic spectrum access","volume":"8","author":"Song","year":"2021","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"10.1016\/j.comnet.2025.111885_bib0008","doi-asserted-by":"crossref","first-page":"3072","DOI":"10.1109\/COMST.2019.2924243","article-title":"Application of machine learning in wireless networks: key techniques and open issues","volume":"21","author":"Sun","year":"2019","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"10.1016\/j.comnet.2025.111885_bib0009","series-title":"Proc. 2021 IEEE Int. Symp. Broadband Multimedia Syst. Broadcast. (BMSB)","article-title":"Deep reinforcement learning for spectrum sharing in future mobile communication systems","author":"Liu","year":"2021"},{"issue":"18","key":"10.1016\/j.comnet.2025.111885_bib0010","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/s22186949","article-title":"A usage-aware dynamic spectrum access scheme for interweave cognitive radio networks by exploiting deep reinforcement learning","volume":"22","author":"Wang","year":"2022","journal-title":"Sensors"},{"issue":"11","key":"10.1016\/j.comnet.2025.111885_bib0011","doi-asserted-by":"crossref","first-page":"1022","DOI":"10.5302\/J.ICROS.2022.22.0143","article-title":"PPO-based model reference tracking control for a quadrotor UAV","volume":"28","author":"Byeon","year":"2022","journal-title":"J. Inst. Control Robot. Syst."},{"key":"10.1016\/j.comnet.2025.111885_bib0012","series-title":"Proc. 36th Int. Conf. Neural Inf","first-page":"24611","article-title":"The surprising effectiveness of PPO in cooperative multi-agent games","author":"Yu","year":"2024"},{"key":"10.1016\/j.comnet.2025.111885_bib0013","first-page":"1","article-title":"Policy regularization via noisy advantage values for cooperative multi-agent actor-critic methods","author":"Hu","year":"2022","journal-title":"Mathematics"},{"key":"10.1016\/j.comnet.2025.111885_bib0014","series-title":"Multi-Agent Deep Reinforcement Learning for Multi-Echelon Inventory Management","author":"Liu","year":"2024"},{"key":"10.1016\/j.comnet.2025.111885_bib0015","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1016\/j.eng.2024.11.033","article-title":"Deep reinforcement learning-based multi-objective scheduling for distributed heterogeneous hybrid flow shops with blocking constraints","volume":"46","author":"Sun","year":"2024","journal-title":"Engineering"},{"issue":"9","key":"10.1016\/j.comnet.2025.111885_bib0016","doi-asserted-by":"crossref","first-page":"12873","DOI":"10.1109\/TNNLS.2023.3265358","article-title":"Multiagent trust region policy optimization","volume":"35","author":"Li","year":"2024","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"10.1016\/j.comnet.2025.111885_bib0017","series-title":"IEEE INFOCOM Workshops (INFOCOM WKSHPS)","article-title":"A3C-based computation offloading and service caching in cloud-edge computing networks","author":"Wang","year":"2022"},{"key":"10.1016\/j.comnet.2025.111885_bib0018","series-title":"Proc. 2025 8th Int. Conf. Adv. Algorithms Control Eng. (ICAACE)","article-title":"Dynamic operating system scheduling using double DQN: a reinforcement learning approach to task optimization","author":"Sun","year":"2025"},{"key":"10.1016\/j.comnet.2025.111885_bib0019","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jenvman.2024.123308","article-title":"Deep recurrent Q-network algorithm for carbon emission allowance trading strategy","volume":"372","author":"Wu","year":"2024","journal-title":"J. Environ. Manage."},{"issue":"1","key":"10.1016\/j.comnet.2025.111885_bib0020","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1049\/ell2.70342","article-title":"Multi-agent reinforcement learning with deep networks for diverse-vectors","volume":"61","author":"Luo","year":"2025","journal-title":"Electron. Lett."},{"issue":"23","key":"10.1016\/j.comnet.2025.111885_bib0021","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/app132312642","article-title":"A novel intelligent anti-jamming algorithm based on deep reinforcement learning assisted by meta-learning for wireless communication systems","volume":"13","author":"Chen","year":"2023","journal-title":"Appl. Sci."},{"key":"10.1016\/j.comnet.2025.111885_bib0022","doi-asserted-by":"crossref","first-page":"2510","DOI":"10.1109\/OJCOMS.2025.3554537","article-title":"Survey of multimodal federated learning: exploring data integration, challenges, and future directions","volume":"6","author":"Adam","year":"2025","journal-title":"IEEE Open J. Commun. Soc."},{"issue":"12","key":"10.1016\/j.comnet.2025.111885_bib0023","first-page":"730","article-title":"Enhanced the accuracy of idle time in cognitive radio network","volume":"19","author":"Mohamad","year":"2021","journal-title":"Telecommun. Comput. Electron. Control"},{"key":"10.1016\/j.comnet.2025.111885_bib0024","series-title":"Proc. International Workshop on Quality of Service","article-title":"SGSM: a foundation-model-like semi-generalist sensing model","author":"Yang","year":"2024"},{"issue":"8","key":"10.1016\/j.comnet.2025.111885_bib0025","doi-asserted-by":"crossref","first-page":"3915","DOI":"10.1109\/TAI.2024.3354694","article-title":"Proximal policy optimization with advantage reuse competition","volume":"5","author":"Cheng","year":"2024","journal-title":"IEEE Trans. Artif. Intell."},{"key":"10.1016\/j.comnet.2025.111885_bib0026","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1016\/j.neucom.2023.02.008","article-title":"Improving proximal policy optimization with alpha divergence","volume":"534","author":"Xu","year":"2023","journal-title":"Neurocomputing"},{"issue":"7","key":"10.1016\/j.comnet.2025.111885_bib0027","doi-asserted-by":"crossref","first-page":"4600","DOI":"10.1109\/TSMC.2021.3098451","article-title":"Proximal policy optimization with policy feedback","volume":"52","author":"Gu","year":"2022","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"issue":"18","key":"10.1016\/j.comnet.2025.111885_bib0028","doi-asserted-by":"crossref","first-page":"30341","DOI":"10.1109\/JIOT.2024.3411653","article-title":"Mutual-interference-aware throughput enhancement in massive IoT: a graph reinforcement learning framework","volume":"11","author":"Yang","year":"2024","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"10.1016\/j.comnet.2025.111885_bib0029","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/electronics12040868","article-title":"An interference-aware resource allocation scheme for non-cooperative multi-cell environments","volume":"12","author":"Wang","year":"2023","journal-title":"Electronics"},{"key":"10.1016\/j.comnet.2025.111885_bib0030","series-title":"Proc. 2020 IEEE Int. Symp. Circuits Syst","article-title":"Greedy channel selection for dynamic spectrum access radios","author":"Lackpour","year":"2020"},{"issue":"1","key":"10.1016\/j.comnet.2025.111885_bib0031","doi-asserted-by":"crossref","first-page":"592","DOI":"10.1109\/TNSM.2019.2956843","article-title":"A Markov decision process-based solution for improved quality-prioritized video delivery","volume":"7","author":"Anedda","year":"2020","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"10.1016\/j.comnet.2025.111885_bib0032","first-page":"7","article-title":"Game-theoretic frameworks for epidemic spreading and human decision-making: a review","volume":"12","author":"Huang","year":"2022","journal-title":"J. Inf. Technol. Cryptogr."}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128625008515?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128625008515?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T23:37:08Z","timestamp":1768606628000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128625008515"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2]]},"references-count":32,"alternative-id":["S1389128625008515"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2025.111885","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2026,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Scalable and interference-aware spectrum access in IoT networks via decentralized proximal policy optimization","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comnet.2025.111885","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"111885"}}