{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T06:45:59Z","timestamp":1751093159317,"version":"3.38.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,16]],"date-time":"2024-12-16T00:00:00Z","timestamp":1734307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,16]],"date-time":"2024-12-16T00:00:00Z","timestamp":1734307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100006190","name":"Research and Development","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006190","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100018693","name":"Horizon Europe","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100018693","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,16]]},"DOI":"10.1109\/cdc56724.2024.10885839","type":"proceedings-article","created":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T18:43:32Z","timestamp":1740595412000},"page":"4574-4581","source":"Crossref","is-referenced-by-count":1,"title":["Approximated Explicit NMPC via Reinforcement Learning for Homomorphically Encrypted Process Control"],"prefix":"10.1109","author":[{"given":"Diana","family":"Dzurkov\u00e1","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Automation, and Mathematics Slovak University of Technology in Bratislava,Bratislava,Slovakia"}]},{"given":"Patrik","family":"Val\u00e1bek","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Automation, and Mathematics Slovak University of Technology in Bratislava,Bratislava,Slovakia"}]},{"given":"Oliv\u00e9r","family":"M\u00e9sz\u00e1ros","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Automation, and Mathematics Slovak University of Technology in Bratislava,Bratislava,Slovakia"}]},{"given":"Martin","family":"Kal\u00faz","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Automation, and Mathematics Slovak University of Technology in Bratislava,Bratislava,Slovakia"}]},{"given":"Martin","family":"Klau\u010do","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Automation, and Mathematics Slovak University of Technology in Bratislava,Bratislava,Slovakia"}]}],"member":"263","reference":[{"key":"ref1","first-page":"41","article-title":"Chapter 3-industrial cyber security history and trends","volume-title":"Industrial Network Security (Second Edition)","author":"Knapp"},{"key":"ref2","first-page":"391","article-title":"Chapter 8-cyber-physical systems","volume-title":"High-Performance Embedded Computing","author":"Wolf"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2987688"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2021.3062956"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3322035"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/rnc.5003"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/PC52310.2021.9447536"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CDC42340.2020.9304078"},{"key":"ref9","article-title":"Continuous control with deep reinforcement learning","author":"Lillicrap","year":"2015","journal-title":"arXiv preprint arXiv:1509.02971"},{"issue":"37","key":"ref10","first-page":"593","article-title":"Secure teleoperation control using somewhat homomorphic encryption","volume-title":"IFAC-PapersOnLine","volume":"55","author":"Kosieradzki"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CDC45484.2021.9683540"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref13","article-title":"Actor-critic algorithms","volume":"12","author":"Konda","year":"1999","journal-title":"Advances in neural information processing systems"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2020.3012947"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/tnn.1998.712192"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1134\/S0040579512060036"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/PC58330.2023.10217518"},{"article-title":"Tenseal: A library for encrypted tensor operations using homomorphic encryption","year":"2021","author":"Benaissa","key":"ref18"},{"volume-title":"Microsoft Research","key":"ref19","article-title":"Microsoft SEAL (release 4.1)"}],"event":{"name":"2024 IEEE 63rd Conference on Decision and Control (CDC)","start":{"date-parts":[[2024,12,16]]},"location":"Milan, Italy","end":{"date-parts":[[2024,12,19]]}},"container-title":["2024 IEEE 63rd Conference on Decision and Control (CDC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10885784\/10885785\/10885839.pdf?arnumber=10885839","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,27]],"date-time":"2025-02-27T08:38:34Z","timestamp":1740645514000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10885839\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,16]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/cdc56724.2024.10885839","relation":{},"subject":[],"published":{"date-parts":[[2024,12,16]]}}}