{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T04:09:42Z","timestamp":1744258182308,"version":"3.40.4"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T00:00:00Z","timestamp":1729209600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T00:00:00Z","timestamp":1729209600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,18]]},"DOI":"10.1109\/icct62411.2024.10946508","type":"proceedings-article","created":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T17:06:09Z","timestamp":1744131969000},"page":"827-833","source":"Crossref","is-referenced-by-count":0,"title":["Knowledge-Enabled Intent-Driven Network Configuration Generation for 5G Core Networks"],"prefix":"10.1109","author":[{"given":"Qiuying","family":"Li","sequence":"first","affiliation":[{"name":"Beijing University of Posts and Telecommunications,Key Laboratory of Trustworthy Distributed Computing and Service, MOE,Beijing,China"}]},{"given":"Jiajun","family":"Cai","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications,Key Laboratory of Trustworthy Distributed Computing and Service, MOE,Beijing,China"}]},{"given":"Ji\u2019ang","family":"Xu","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications,School of Artificial Intelligence,Beijing,China"}]},{"given":"Ruosi","family":"Liu","sequence":"additional","affiliation":[{"name":"Bantian Industrial Base,Huawei Technoligies,Shenzhen,China"}]},{"given":"Caixia","family":"Yuan","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications,School of Artificial Intelligence,Beijing,China"}]},{"given":"Hui","family":"Gao","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications,Key Laboratory of Trustworthy Distributed Computing and Service, MOE,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2020.07.001"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.47672\/ejt.1547"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/DRCN60692.2024.10539172"},{"issue":"1","key":"ref5","first-page":"141","article-title":"Technology prospect of 6G mobile communications","volume":"40","author":"Zhang","year":"2019","journal-title":"J. Commun."},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3215919"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN51074.2021.9385553"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/NoF47743.2019.9015048"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2018.8644457"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2019.8806662"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2016.7502837"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900476"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.04.020"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3391812.3396269"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.04.018"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-15028-0"},{"article-title":"BERT: Pre-training of deep bidirectional transformers for language understanding","year":"2018","author":"Devlin","key":"ref17"},{"article-title":"Roberta: A robustly optimized bert pretraining approach","year":"2019","author":"Liu","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.naacl-main.427"},{"issue":"11","key":"ref20","article-title":"Visualizing data using t-SNE","volume":"9","author":"der Maaten","year":"2008","journal-title":"J. Mach. Learn. Res."},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.naacl-main.427"},{"key":"ref22","first-page":"478","article-title":"Unsupervised deep embedding for clustering analysis","volume-title":"Proc. Int. Conf. Mach. Learn","author":"Xie"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.5555\/3524938.3525087"},{"key":"ref24","article-title":"Inductive representation learning on large graphs","volume":"30","author":"Hamilton","year":"2017","journal-title":"Adv. Neural Inf. Process. Syst."}],"event":{"name":"2024 IEEE 24th International Conference on Communication Technology (ICCT)","start":{"date-parts":[[2024,10,18]]},"location":"Chengdu, China","end":{"date-parts":[[2024,10,20]]}},"container-title":["2024 IEEE 24th International Conference on Communication Technology (ICCT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10946276\/10946277\/10946508.pdf?arnumber=10946508","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T05:54:52Z","timestamp":1744178092000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10946508\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,18]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icct62411.2024.10946508","relation":{},"subject":[],"published":{"date-parts":[[2024,10,18]]}}}