{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T22:29:40Z","timestamp":1777501780036,"version":"3.51.4"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,8,21]],"date-time":"2022-08-21T00:00:00Z","timestamp":1661040000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,8,21]],"date-time":"2022-08-21T00:00:00Z","timestamp":1661040000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,8,21]]},"DOI":"10.1109\/cog51982.2022.9893662","type":"proceedings-article","created":{"date-parts":[[2022,9,20]],"date-time":"2022-09-20T19:33:31Z","timestamp":1663702411000},"page":"315-321","source":"Crossref","is-referenced-by-count":1,"title":["Memory-Augmented Episodic Value Network"],"prefix":"10.1109","author":[{"given":"Fanyu","family":"Zeng","sequence":"first","affiliation":[{"name":"Nanjing University of Posts and Telecommunications,Fanyu Zeng and Guang Han are with the Engineering Research Center of Wideband Wireless Communication Technology, Ministry of Education,Nanjing,China"}]},{"given":"Guangyu","family":"Xing","sequence":"additional","affiliation":[{"name":"Nanjing University of Posts and Telecommunications,Fanyu Zeng and Guang Han are with the Engineering Research Center of Wideband Wireless Communication Technology, Ministry of Education,Nanjing,China"}]},{"given":"Guang","family":"Han","sequence":"additional","affiliation":[{"name":"Sichuan University,Guangyu Xing is with the College of Computer Science,Chengdu,China"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1301199110"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref31","first-page":"2672","article-title":"Generative adversarial nets","author":"goodfellow","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref30","first-page":"6848","article-title":"Shufflenet: An extremely efficient convolutional neural network for mobile devices","author":"zhang","year":"2018","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition"},{"key":"ref34","article-title":"Adrien Turiot. gym-pathfinding","year":"2018"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1038\/323533a0","article-title":"Learning representations by back-propagating errors","volume":"323","author":"rumelhart","year":"1986","journal-title":"Nature"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1126\/science.3086978"},{"key":"ref12","article-title":"Generalization of reinforcement learners with working and episodic memory","author":"fortunato","year":"2019","journal-title":"arXiv preprint arXiv 1910 13406"},{"key":"ref13","article-title":"Memory networks","author":"weston","year":"2014","journal-title":"arXiv preprint arXiv 1410 3916"},{"key":"ref14","first-page":"2440","article-title":"End-to-end memory networks","author":"sukhbaatar","year":"2015","journal-title":"Advances in neural information processing systems"},{"key":"ref15","first-page":"2827","article-title":"Neural episodic control","author":"pritzel","year":"2017","journal-title":"Proceedings of the 34th International Conference on Machine Learning-Volume 70"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1038\/nature20101"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-psych-122414-033625"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11531"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2014.09.003"},{"key":"ref28","first-page":"4700","article-title":"Densely connected convolutional networks","author":"huang","year":"2017","journal-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCDS.2016.2614675"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref3","article-title":"Tutor-guided interior navigation with deep reinforcement learning","author":"zeng","year":"2020","journal-title":"IEEE Transactions on Cognitive and Developmental Systems"},{"key":"ref6","first-page":"1928","article-title":"Asynchronous methods for deep reinforcement learning","author":"mnih","year":"2016","journal-title":"International Conference on Machine Learning"},{"key":"ref29","article-title":"Mobilenets: Efficient convolutional neural networks for mobile vision applications","author":"howard","year":"2017","journal-title":"arXiv preprint arXiv 1704 04861"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1038\/nature14236","article-title":"Human-level control through deep reinforcement learning","volume":"518","author":"mnih","year":"2015","journal-title":"Nature"},{"key":"ref8","first-page":"2154","article-title":"Value iteration networks","author":"tamar","year":"2016","journal-title":"Advances in neural information processing systems"},{"key":"ref7","article-title":"Learning to navigate in complex environments","author":"mirowski","year":"2017","journal-title":"International Conference on Learning Representations"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2743240"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"lecun","year":"2015","journal-title":"Nature"},{"key":"ref1","author":"sutton","year":"2018","journal-title":"Reinforcement Learning An Introduction"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1126\/science.aaa8415","article-title":"Machine learning: Trends, perspectives, and prospects","volume":"349","author":"jordan","year":"2015","journal-title":"Science"},{"key":"ref22","article-title":"Privacy-preserving in-home fall detection using visual shielding sensing and private information-embedding","author":"liu","year":"2020","journal-title":"IEEE Transactions on Multimedia"},{"key":"ref21","article-title":"Adaptive deep convolutional neural networks for scene-specific object detection","author":"li","year":"2017","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"ref24","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Advances in neural information processing systems"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2018.8461251"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298594"},{"key":"ref25","article-title":"Very deep convolutional networks for large-scale image recognition","author":"simonyan","year":"2015","journal-title":"International Conference on Learning Representations"}],"event":{"name":"2022 IEEE Conference on Games (CoG)","location":"Beijing, China","start":{"date-parts":[[2022,8,21]]},"end":{"date-parts":[[2022,8,24]]}},"container-title":["2022 IEEE Conference on Games (CoG)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9893561\/9893544\/09893662.pdf?arnumber=9893662","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,10]],"date-time":"2022-10-10T20:25:39Z","timestamp":1665433539000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9893662\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,21]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/cog51982.2022.9893662","relation":{},"subject":[],"published":{"date-parts":[[2022,8,21]]}}}