{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,14]],"date-time":"2024-09-14T00:23:58Z","timestamp":1726273438972},"reference-count":5,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T00:00:00Z","timestamp":1722902400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T00:00:00Z","timestamp":1722902400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,8,6]]},"DOI":"10.1109\/ccece59415.2024.10667311","type":"proceedings-article","created":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T17:42:46Z","timestamp":1726162966000},"page":"137-138","source":"Crossref","is-referenced-by-count":0,"title":["Developing Trustworthy Reinforcement Learning Applications for Next-Generation Open Radio Access Networks"],"prefix":"10.1109","author":[{"given":"Ahmad M.","family":"Nagib","sequence":"first","affiliation":[{"name":"Queen&#x2019;s University,School of Computing,Canada"}]},{"given":"Hatem","family":"Abou-zeid","sequence":"additional","affiliation":[{"name":"University of Calgary,Department of Electrical and Software Engineering,Canada"}]},{"given":"Hossam S.","family":"Hassanein","sequence":"additional","affiliation":[{"name":"Queen&#x2019;s University,School of Computing,Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM54140.2023.10437367"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2023.3336191"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM54140.2023.10437780"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.007.2300144"},{"article-title":"Trustworthy reinforcement learning against intrinsic vulnerabilities: Robustness, safety, and generalizability","year":"2022","author":"Xu","key":"ref5"}],"event":{"name":"2024 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)","start":{"date-parts":[[2024,8,6]]},"location":"Kingston, ON, Canada","end":{"date-parts":[[2024,8,9]]}},"container-title":["2024 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10667055\/10667056\/10667311.pdf?arnumber=10667311","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T05:20:54Z","timestamp":1726204854000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10667311\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,6]]},"references-count":5,"URL":"https:\/\/doi.org\/10.1109\/ccece59415.2024.10667311","relation":{},"subject":[],"published":{"date-parts":[[2024,8,6]]}}}