{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T06:36:58Z","timestamp":1778049418973,"version":"3.51.4"},"reference-count":162,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2019YFB1802503"],"award-info":[{"award-number":["2019YFB1802503"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004826","name":"Natural Science Foundation of Beijing","doi-asserted-by":"publisher","award":["4212010"],"award-info":[{"award-number":["4212010"]}],"id":[{"id":"10.13039\/501100004826","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005090","name":"Beijing Nova Program","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100005090","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100018919","name":"Major Key Project of Peng Cheng Laboratory","doi-asserted-by":"publisher","award":["PCL2022Y04"],"award-info":[{"award-number":["PCL2022Y04"]}],"id":[{"id":"10.13039\/100018919","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/comst.2022.3217613","type":"journal-article","created":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T00:41:29Z","timestamp":1667522489000},"page":"762-790","source":"Crossref","is-referenced-by-count":26,"title":["AI-Driven Packet Forwarding With Programmable Data Plane: A Survey"],"prefix":"10.1109","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7454-0905","authenticated-orcid":false,"given":"Wei","family":"Quan","sequence":"first","affiliation":[{"name":"School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6303-5823","authenticated-orcid":false,"given":"Ziheng","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3611-6593","authenticated-orcid":false,"given":"Mingyuan","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7907-2071","authenticated-orcid":false,"given":"Nan","family":"Cheng","sequence":"additional","affiliation":[{"name":"Key State Laboratory of ISN, School of Telecommunications Engineering, Xidian University, Xi&#x2019;an, China"}]},{"given":"Gang","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Fundamental Network Technology, China Telecom Research Institute, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8641-4057","authenticated-orcid":false,"given":"Deyun","family":"Gao","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8906-813X","authenticated-orcid":false,"given":"Hongke","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4140-287X","authenticated-orcid":false,"given":"Xuemin","family":"Shen","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0488-511X","authenticated-orcid":false,"given":"Weihua","family":"Zhuang","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-33-4572-0_185"},{"key":"ref2","first-page":"81","article-title":"BASTION: A security enforcement network stack for container networks","volume-title":"Proc. USENIX Annu. Technol. Conf. (USENIX ATC)","author":"Nam"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3034350"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3386367.3431315"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2906788"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2899124"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2923230"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2866942"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/OJVT.2020.2965100"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3135829"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2933761"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2018.00013"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.09.001"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-019-1607-x"},{"key":"ref15","volume-title":"pForest: In-Network Inference With Random Forests.","author":"Busse-Grawitz","year":"2019"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2883147"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.inffus.2018.09.013","article-title":"Machine learning algorithms for wireless sensor networks: A survey","volume":"49","author":"Donta","year":"2019","journal-title":"Inf. Fusion"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s42045-018-0009-7"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/HPSR.2018.8850761"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2910140"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2020.2990182"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3086704"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7389832"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2975911"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000788"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2859480"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3151750"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3431832.3431842"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/BCWSP50066.2020.9336026"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM46954.2019.9012678"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CompComm.2017.8322748"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3365609.3365864"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9348063"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3743"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2931136"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-018-1141-2"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3041656"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2019.2912365"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2018.8502456"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3038918"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE47787.2020.9255800"},{"issue":"62","key":"ref42","first-page":"46","article-title":"SOPA: Source routing based packet-level multi-path routing in data center networks","volume":"16","author":"Dan","year":"2018","journal-title":"ZTE Commun."},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2021.08.005"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524530"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3101447"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2988652"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ANCS.2019.8901896"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3326285.3329040"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN49398.2020.9209716"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1089\/big.2020.0090"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2790393"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2642194"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/WCNCW.2018.8368988"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2878231"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2781716"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3013770"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2431684"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2868932"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3281032"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.3001904"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2018.8538450"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.3014231"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.23919\/INM.2017.7987352"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2702670"},{"key":"ref65","first-page":"599","article-title":"Differentiated transmission based on traffic classification with deep learning in DataCenter","volume-title":"Proc. IFIP Netw. Conf. (Netw.)","author":"Zhu"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/3360468.3368189"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN.2018.8725736"},{"key":"ref68","first-page":"59","article-title":"SP-PIFO: Approximating push-in first-out Behaviors using strict-priority queues","volume-title":"Proc. 17th USENIX Symp. Netw. Syst. Design Implement. (NSDI)","author":"Alcoz"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.3390\/s19061449"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3302"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148954"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.082511.00013"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592803"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2842058"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.05.015"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098841"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWorkshops49005.2020.9145422"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162975"},{"key":"ref79","first-page":"407","article-title":"Let it flow: Resilient asymmetric load balancing with Flowlet switching","volume-title":"Proc. 14th USENIX Symp. Netw. Syst. Design Implement. (NSDI)","author":"Vanini"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2753398"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/2890955.2890968"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/NCC.2017.8077095"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM.2017.8256059"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2019.8888090"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.3390\/s20226573"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/3386367.3433030"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC45663.2020.9120463"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405894"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2755768"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC47284.2019.8969579"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2021.08.005"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM50824.2020.9269072"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2020.02.013"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057009"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/BigComp.2018.00044"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP.2017.7946998"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.4108\/eai.28-12-2017.153515"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254023"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0069"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5402"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3019330"},{"key":"ref102","first-page":"19","article-title":"Offloading realtime DDoS attack detection to programmable data planes","volume-title":"Proc. IFIP\/IEEE Symp. Integr. Netw. Service Manag. (IM)","author":"Lapolli"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN48450.2020.9059327"},{"key":"ref104","doi-asserted-by":"crossref","first-page":"A84","DOI":"10.1364\/JOCN.11.000A84","article-title":"P4 edge node enabling stateful traffic engineering and cyber security","volume":"11","author":"Paolucci","year":"2019","journal-title":"IEEE\/OSA J. Opt. Commun. Netw."},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3040011"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/ANTS47819.2019.9118071"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9149043"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1145\/3360468.3368188"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.11.008"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/SSCI.2018.8628743"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.07.052"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-73951-9_5"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2018.8328219"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1145\/3180465.3180467"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1145\/3371676.3371705"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2933165"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.23919\/ITC.2017.8065806"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2017.8215418"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/PDCAT.2017.00054"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2017.8038436"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2017.8024623"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/WINCOM.2016.7777224"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.12.004"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2019.8756996"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1145\/3341216.3342208"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1145\/3386367.3431290"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1145\/3426744.3431323"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/ICPS48405.2020.9274765"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761197"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-05440-2"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102803"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2904236"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2019.2945022"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2019.2930247"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2956805"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162923"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet47604.2019.9064137"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1145\/3386367.3431298"},{"key":"ref139","first-page":"161","article-title":"BLINK: Fast connectivity recovery entirely in the data plane","volume-title":"Proc. 16th USENIX Symp. Netw. Syst. Design Implement. (NSDI)","author":"Holterbach"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1145\/3155921.3155922"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2946562"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2020-Fall49728.2020.9348823"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1364\/JOCN.424654"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN48710.2020.00006"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2018.8406169"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2016.7818437"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/VLSI-DAT.2019.8742060"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1145\/3375235.3375238"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC49849.2020.9238802"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.23919\/APNOMS50412.2020.9236989"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230582"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230548"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1145\/3185467.3185499"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8056994"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2017.8117548"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2017.42"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1145\/3341216.3342206"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7474343"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1016\/j.eng.2021.06.019"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3178970"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1145\/3472716.3472866"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.004.2100542"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/10051138\/09931326.pdf?arnumber=9931326","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:31:58Z","timestamp":1729618318000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9931326\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":162,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/comst.2022.3217613","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}