{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T04:50:06Z","timestamp":1769316606228,"version":"3.49.0"},"reference-count":132,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100009122","name":"Ministry of Higher Education through the Fundamental Research Grant Scheme","doi-asserted-by":"publisher","award":["FRGS\/1\/2021\/ICT09\/UTM\/02\/1"],"award-info":[{"award-number":["FRGS\/1\/2021\/ICT09\/UTM\/02\/1"]}],"id":[{"id":"10.13039\/100009122","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Huawei-Telkom University (TelU) Beyond 5.5G Laboratory, TelU, Bandung, Indonesia"},{"DOI":"10.13039\/501100012389","name":"National Institute of Information and Communications Technology (NICT) through ICT Virtual Organization of ASEAN Institutes and NICT (ASEAN IVO) Project 2022","doi-asserted-by":"publisher","award":["S.K130000.7656.4X796"],"award-info":[{"award-number":["S.K130000.7656.4X796"]}],"id":[{"id":"10.13039\/501100012389","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3412192","type":"journal-article","created":{"date-parts":[[2024,6,11]],"date-time":"2024-06-11T18:38:04Z","timestamp":1718131084000},"page":"89002-89025","source":"Crossref","is-referenced-by-count":18,"title":["A Review on Machine Learning for Channel Coding"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-3762-4099","authenticated-orcid":false,"given":"Heimrih","family":"Lim Meng Kee","sequence":"first","affiliation":[{"name":"Ubiquitous Broadband Access Network Research Group, Faculty of Artificial Intelligence, Universiti Teknologi Malaysia, Kuala Lumpur, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9991-343X","authenticated-orcid":false,"given":"Norulhusna","family":"Ahmad","sequence":"additional","affiliation":[{"name":"Ubiquitous Broadband Access Network Research Group, Faculty of Artificial Intelligence, Universiti Teknologi Malaysia, Kuala Lumpur, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3761-0630","authenticated-orcid":false,"given":"Mohd","family":"Azri Mohd Izhar","sequence":"additional","affiliation":[{"name":"Ubiquitous Broadband Access Network Research Group, Faculty of Artificial Intelligence, Universiti Teknologi Malaysia, Kuala Lumpur, Malaysia"}]},{"given":"Khoirul","family":"Anwar","sequence":"additional","affiliation":[{"name":"The University Center of Excellence for Advanced Intelligent Communications (AICOMS), Telkom University, Bandung, Indonesia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0930-7194","authenticated-orcid":false,"given":"Soon Xin","family":"Ng","sequence":"additional","affiliation":[{"name":"School of Electronics and Computer Science, University of Southampton, Southampton, U.K."}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.0001.2200001"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.23919\/ETR.2021.9904665"},{"key":"ref3","volume-title":"Turing: Pioneer of the Information Age","author":"Copeland","year":"2012"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1147\/rd.116.0601"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1053964"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-46466-9_18"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/BF01050427"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3233\/ICG-1995-18207"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/40.755469"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/bf00994018"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref12","volume-title":"The MNIST Database of Handwritten Digits","author":"LeCun","year":"1998"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1162\/neco.2006.18.7.1527"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2016.7471613"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.1600317WC"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3005745.3005750"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800386"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2647868.2654982"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2916648"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-019-02805-w"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.28"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2345663"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2546555"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2017.2757490"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.04.003"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ISWCS.2019.8877221"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2017.2758370"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.831841"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900287"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2019.2921398"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900411"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2942390"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2000397"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2020.09.009"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3010896"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3015289"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3051557"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-019-00630-3"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1002\/9781119562306.ch14"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2021.3058353"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/JETCAS.2020.2999944"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC47524.2020.9031117"},{"key":"ref45","volume":"2","author":"Lin","year":"2001","journal-title":"Error Control Coding"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1002\/9780470035726"},{"key":"ref47","volume":"16","author":"MacWilliams","year":"1977","journal-title":"The Theory of Error Correcting Codes"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1950.tb00463.x"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/tit.1954.1057465"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1967.1054010"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.1993.397441"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.874390"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2002.1181950"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2013.070213.120789"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2832207"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/0-306-47794-7_8"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-33380-5"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-33380-5"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSP48568.2020.9182213"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2008.923968"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2007.895188"},{"key":"ref62","doi-asserted-by":"crossref","first-page":"623","DOI":"10.1002\/j.1538-7305.1948.tb00917.x","article-title":"A mathematical theory of architecture","volume":"27","author":"Shannon","year":"1948","journal-title":"Bell Syst. Tech. J."},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ChinaSIP.2015.7230505"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1049\/ip-com:20050237"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2021379"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2967127"},{"issue":"154","key":"ref67","first-page":"42","article-title":"Low-density parity-check (LDPC) codes constructed from protographs","volume-title":"IPN Prog. Rep.","volume":"42","author":"Thorpe","year":"2003"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.jart.2016.04.001"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2895322"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ICSIGSYS.2019.8811082"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1613\/jair.301"},{"issue":"3","key":"ref72","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1561\/2200000071","article-title":"An introduction to deep reinforcement learning","volume":"11","author":"Fran\u00e7ois-Lavet","year":"2018","journal-title":"Found. Trends Mach. Learn."},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2020.2977374"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.3390\/e23020171"},{"key":"ref75","first-page":"22396","article-title":"Learning to decode: Reinforcement learning for decoding of sparse graph-based channel codes","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Habib"},{"key":"ref76","volume-title":"Reinforcement Learning","author":"Winder","year":"2020"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1002\/9781119562306.ch20"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-444-63623-2.00007-4"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3084827"},{"key":"ref80","article-title":"Reinforcement learning for physical layer communications","author":"Mary","year":"2021","journal-title":"arXiv:2106.11595"},{"key":"ref81","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. Artif. Intell. Statist.","author":"McMahan"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2015.7447103"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2904348"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2986024"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2021.3125282"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254811"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2018.2794062"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422289"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2019.8919799"},{"key":"ref91","article-title":"MIST: A novel training strategy for low-latency scalable neural net decoders","author":"Yashashwi","year":"2019","journal-title":"arXiv:1905.08990"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.4310\/CIS.2018.v18.n1.a2"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2017.2788405"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683778"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1871\/1\/012054"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/ICEICT51264.2020.9334237"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155479"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2022.3218821"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3246986"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2023.3296621"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2017.7926071"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2018.8555891"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIIC.2019.8669025"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps56602.2022.10008601"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3155545"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12132973"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2018.8555714"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2019.2951403"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2019.8928071"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2019.8919804"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.23919\/WiOPT47501.2019.9144089"},{"key":"ref112","volume-title":"Reinforcement Learning: An Introduction","author":"Sutton","year":"2018"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/JSAIT.2020.2988577"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685654"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2022.3208035"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2023-Fall60731.2023.10333645"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2022.3208331"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2023.3273413"},{"key":"ref119","article-title":"A brief survey of deep reinforcement learning","author":"Arulkumaran","year":"2017","journal-title":"arXiv:1708.05866"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2017.2787979"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.07.014"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2988367"},{"key":"ref123","article-title":"Reinforcement learning in practice: Opportunities and challenges","author":"Li","year":"2022","journal-title":"arXiv:2202.11296"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1002\/9781119562306.ch15"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-020-2955-6"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1145\/3408127.3408173"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2021.104234"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2916583"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1002\/9781119562306"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3090430"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9054168"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/ICICV50876.2021.9388463"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10552757.pdf?arnumber=10552757","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,8]],"date-time":"2024-10-08T17:53:17Z","timestamp":1728409997000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10552757\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":132,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3412192","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}