{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T19:14:30Z","timestamp":1774034070821,"version":"3.50.1"},"reference-count":27,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T00:00:00Z","timestamp":1775001600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100007942","name":"Tianjin Normal University","doi-asserted-by":"publisher","award":["52WT2328"],"award-info":[{"award-number":["52WT2328"]}],"id":[{"id":"10.13039\/501100007942","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100019065","name":"Tianjin Science and Technology Program","doi-asserted-by":"publisher","award":["24YDTPJC00630"],"award-info":[{"award-number":["24YDTPJC00630"]}],"id":[{"id":"10.13039\/501100019065","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010882","name":"Tianjin Municipal Education Commission","doi-asserted-by":"publisher","award":["2022KJ012"],"award-info":[{"award-number":["2022KJ012"]}],"id":[{"id":"10.13039\/501100010882","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002263"],"award-info":[{"award-number":["62002263"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2026,4]]},"DOI":"10.1016\/j.comnet.2026.112101","type":"journal-article","created":{"date-parts":[[2026,2,15]],"date-time":"2026-02-15T23:40:07Z","timestamp":1771198807000},"page":"112101","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Resource allocation in device-to-device (D2D) communication based on semantic communication"],"prefix":"10.1016","volume":"279","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5205-6167","authenticated-orcid":false,"given":"Jia","family":"Guo","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6595-6378","authenticated-orcid":false,"given":"Fan","family":"Shen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-2442-7066","authenticated-orcid":false,"given":"Xiang","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6018-9998","authenticated-orcid":false,"given":"Yang","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4546-3917","authenticated-orcid":false,"given":"Jinqi","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"6","key":"10.1016\/j.comnet.2026.112101_bib0001","doi-asserted-by":"crossref","first-page":"3014","DOI":"10.3390\/s23063014","article-title":"Machine learning-based methods for enhancement of uav-noma and d2d cooperative networks","volume":"23","author":"Tsipi","year":"2023","journal-title":"Sensors"},{"issue":"7","key":"10.1016\/j.comnet.2026.112101_bib0002","doi-asserted-by":"crossref","first-page":"7519","DOI":"10.1109\/TVT.2022.3168277","article-title":"Energy-efficient resource allocation for secure D2D communications underlaying UAV-enabled networks","volume":"71","author":"Chen","year":"2022","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.comnet.2026.112101_bib0003","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2022.102973","article-title":"Resource allocation for UAV-aided energy harvesting-powered D2D communications: a reinforcement learning-based scheme","volume":"136","author":"Xu","year":"2022","journal-title":"Ad. Hoc Netw."},{"issue":"1","key":"10.1016\/j.comnet.2026.112101_bib0004","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1109\/MWC.101.2100269","article-title":"Semantic communications: overview, open issues, and future research directions","volume":"29","author":"Luo","year":"2022","journal-title":"IEEE Wireless Commun."},{"issue":"1","key":"10.1016\/j.comnet.2026.112101_bib0005","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/JSAC.2022.3223408","article-title":"Beyond transmitting bits: context, semantics, and task-oriented communications","volume":"41","author":"G\u00fcnd\u00fcz","year":"2022","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"10.1016\/j.comnet.2026.112101_bib0006","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1109\/OJCOMS.2023.3344882","article-title":"Cooperative semantic communication with on-demand semantic forwarding","volume":"5","author":"Tang","year":"2024","journal-title":"IEEE Open J. Commun. Soc."},{"key":"10.1016\/j.comnet.2026.112101_bib0007","series-title":"2024 IEEE 6th International Conference on AI Circuits and Systems (AICAS)","first-page":"139","article-title":"Is semantic communication for autonomous driving secured against adversarial attacks?","author":"Ribouh","year":"2024"},{"issue":"3","key":"10.1016\/j.comnet.2026.112101_bib0008","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1109\/LCOMM.2024.3352559","article-title":"Emotion-aided semantic communication system for reliable semantic recovery under low SNR","volume":"28","author":"Luo","year":"2024","journal-title":"IEEE Commun. Lett."},{"key":"10.1016\/j.comnet.2026.112101_bib0009","doi-asserted-by":"crossref","first-page":"117227","DOI":"10.1109\/ACCESS.2019.2933002","article-title":"UAV autonomous target search based on deep reinforcement learning in complex disaster scene","volume":"7","author":"Wu","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2026.112101_bib0010","series-title":"2025 34th International Conference on Computer Communications and Networks (ICCCN)","first-page":"1","article-title":"Efficient resource allocation and power control for D2D communication with RAN sharing","author":"Wang","year":"2025"},{"key":"10.1016\/j.comnet.2026.112101_bib0011","doi-asserted-by":"crossref","DOI":"10.1109\/TNSM.2025.3591644","article-title":"FL-ORA: optimized and decentralized resource allocation scheme for D2D communication","author":"Jadav","year":"2025","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"issue":"2","key":"10.1016\/j.comnet.2026.112101_bib0012","doi-asserted-by":"crossref","first-page":"622","DOI":"10.1109\/TCCN.2023.3333351","article-title":"Jointly optimal RIS placement and power allocation for underlay D2D communications: An outage probability minimization approach","volume":"10","author":"Ghose","year":"2024","journal-title":"IEEE Trans. Cognit. Commun. Netw."},{"key":"10.1016\/j.comnet.2026.112101_bib0013","first-page":"1","article-title":"Power control for D2D communication underlaying cellular networks based on deep Q-learning and fractional frequency reuse","author":"Yang","year":"2025","journal-title":"J. Commun. Netw."},{"key":"10.1016\/j.comnet.2026.112101_bib0014","doi-asserted-by":"crossref","first-page":"196609","DOI":"10.1109\/ACCESS.2024.3521590","article-title":"Hybrid centralized-distributed resource allocation based on deep reinforcement learning for cooperative D2D communications","volume":"12","author":"Yu","year":"2024","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2026.112101_bib0015","series-title":"2024 IEEE 7th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC)","first-page":"1447","article-title":"Deep learning based resource allocation for full-duplex device-to-device communication","volume":"7","author":"Zhang","year":"2024"},{"issue":"2","key":"10.1016\/j.comnet.2026.112101_bib0016","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1109\/TCCN.2023.3326302","article-title":"DeepMA: End-to-end deep multiple access for wireless image transmission in semantic communication","volume":"10","author":"Zhang","year":"2024","journal-title":"IEEE Trans. Cognit. Commun. Netw."},{"issue":"1","key":"10.1016\/j.comnet.2026.112101_bib0017","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1109\/MWC.013.2100642","article-title":"Rethinking modern communication from semantic coding to semantic communication","volume":"30","author":"Lu","year":"2022","journal-title":"IEEE Wireless Commun."},{"issue":"1","key":"10.1016\/j.comnet.2026.112101_bib0018","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/JSAC.2022.3221999","article-title":"Toward semantic communications: deep learning-based image semantic coding","volume":"41","author":"Huang","year":"2022","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"10.1016\/j.comnet.2026.112101_bib0019","series-title":"2025 34th International Conference on Computer Communications and Networks (ICCCN)","first-page":"1","article-title":"Lightweight semantic segmentation network for end-to-end learning-based communication","author":"Dai","year":"2025"},{"issue":"8","key":"10.1016\/j.comnet.2026.112101_bib0020","doi-asserted-by":"crossref","first-page":"2391","DOI":"10.1109\/LWC.2025.3570499","article-title":"Deep learning-based semantic communication system for wireless image transmission","volume":"14","author":"Hu","year":"2025","journal-title":"IEEE Wireless Commun. Lett."},{"key":"10.1016\/j.comnet.2026.112101_bib0021","doi-asserted-by":"crossref","unstructured":"X. Song, L. Yuan, Z. Qu, F. Zhou, Q. Wu, T.Q.S. Quek, R.Q. Hu, Knowledge Graph Driven UAV Cognitive Semantic Communication Systems for Efficient Object Detection, arXiv: 2401.13995(2024).","DOI":"10.1109\/ICC51166.2024.10622874"},{"key":"10.1016\/j.comnet.2026.112101_bib0022","series-title":"2025 34th International Conference on Computer Communications and Networks (ICCCN)","first-page":"1","article-title":"DRL-based UAV trajectory and bandwidth optimization for emergency semantic communication","author":"Jin","year":"2025"},{"key":"10.1016\/j.comnet.2026.112101_bib0023","series-title":"GLOBECOM 2023-2023 IEEE Global Communications Conference","first-page":"3801","article-title":"UAV-assisted semantic communication with hybrid action reinforcement learning","author":"Si","year":"2023"},{"issue":"20","key":"10.1016\/j.comnet.2026.112101_bib0024","doi-asserted-by":"crossref","first-page":"5438","DOI":"10.1109\/TSP.2018.2866382","article-title":"Learning to optimize: training deep neural networks for interference management","volume":"66","author":"Sun","year":"2018","journal-title":"IEEE Trans. Signal Process."},{"issue":"6","key":"10.1016\/j.comnet.2026.112101_bib0025","doi-asserted-by":"crossref","first-page":"1276","DOI":"10.1109\/LCOMM.2018.2825444","article-title":"Deep power control: transmit power control scheme based on convolutional neural network","volume":"22","author":"Lee","year":"2018","journal-title":"IEEE Commun. Lett."},{"issue":"7","key":"10.1016\/j.comnet.2026.112101_bib0026","doi-asserted-by":"crossref","first-page":"5235","DOI":"10.1109\/TWC.2021.3138733","article-title":"Deep learning-based resource allocation for device-to-device communication","volume":"21","author":"Lee","year":"2022","journal-title":"IEEE Trans. Wireless Commun."},{"key":"10.1016\/j.comnet.2026.112101_bib0027","series-title":"2024 International Wireless Communications and Mobile Computing (IWCMC)","first-page":"780","article-title":"Graph neural network based resource allocation for full-duplex device-to-device communication","author":"Zhang","year":"2024"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128626001131?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128626001131?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T18:16:19Z","timestamp":1774030579000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128626001131"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4]]},"references-count":27,"alternative-id":["S1389128626001131"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2026.112101","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2026,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Resource allocation in device-to-device (D2D) communication based on semantic communication","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comnet.2026.112101","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"112101"}}