{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T22:13:10Z","timestamp":1774390390028,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T00:00:00Z","timestamp":1729209600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T00:00:00Z","timestamp":1729209600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100020487","name":"Nature","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100020487","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,18]]},"DOI":"10.1109\/icct62411.2024.10946514","type":"proceedings-article","created":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T17:06:09Z","timestamp":1744131969000},"page":"278-285","source":"Crossref","is-referenced-by-count":1,"title":["Optimizing Wireless Resource Allocation for Enhanced Semantic Communication System Reliability with Mismatched Background Knowledge Bases"],"prefix":"10.1109","author":[{"given":"Tianhang","family":"Sun","sequence":"first","affiliation":[{"name":"Beijing University of Posts and Telecommunications,The State Key Laboratory of Networking and Switching Technology,Beijing,China"}]},{"given":"Yu","family":"Zhou","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications,The State Key Laboratory of Networking and Switching Technology,Beijing,China"}]},{"given":"Lei","family":"Feng","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications,The State Key Laboratory of Networking and Switching Technology,Beijing,China"}]},{"given":"Fanqin","family":"Zhou","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications,The State Key Laboratory of Networking and Switching Technology,Beijing,China"}]},{"given":"Kunpeng","family":"Xu","sequence":"additional","affiliation":[{"name":"Beijing Smart-Chip Microelectronics Technology Company Ltd,Beijing,China"}]},{"given":"Xianhui","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing Smart-Chip Microelectronics Technology Company Ltd,Beijing,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900287"},{"issue":"2","key":"ref2","first-page":"26","article-title":"Semantic communication networking for the intelligence of everything","volume":"5","author":"Shi","year":"2021","journal-title":"Chinese Journal on Internet of Things"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107930"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2001239"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT56141.2022.10072458"},{"key":"ref6","article-title":"A new communication paradigm: From bit accuracy to semantic fidelity","author":"Shi","year":"2021"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2022-Fall57202.2022.10012843"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10000901"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2021.3071210"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8461983"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2010.579"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3087240"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2022.3170849"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2023.3274145"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3070843"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-1360"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2023.3282906"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2023.3346481"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3318510"},{"key":"ref20","volume-title":"6g typical scenarios and key capabilities","year":"2022"},{"key":"ref21","first-page":"2284","article-title":"Text generation from knowledge graphs with graph transformers","volume-title":"2019 Annual Conference of the North American Chapter of the Association for Computational Linguistics","author":"Koncel-Kedziorski"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2022.3191112"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2016.2539758"}],"event":{"name":"2024 IEEE 24th International Conference on Communication Technology (ICCT)","location":"Chengdu, China","start":{"date-parts":[[2024,10,18]]},"end":{"date-parts":[[2024,10,20]]}},"container-title":["2024 IEEE 24th International Conference on Communication Technology (ICCT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10946276\/10946277\/10946514.pdf?arnumber=10946514","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T05:55:02Z","timestamp":1744178102000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10946514\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,18]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icct62411.2024.10946514","relation":{},"subject":[],"published":{"date-parts":[[2024,10,18]]}}}