{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:22:51Z","timestamp":1740100971643,"version":"3.37.3"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China (NSFC)","doi-asserted-by":"publisher","award":["62002238,61836005,62172283"],"award-info":[{"award-number":["62002238,61836005,62172283"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,18]]},"DOI":"10.1109\/ijcnn55064.2022.9892041","type":"proceedings-article","created":{"date-parts":[[2022,9,30]],"date-time":"2022-09-30T19:56:04Z","timestamp":1664567764000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["$Q_{C}-DQN$: A Novel Constrained Reinforcement Learning Method for Computation Offloading in Multi-access Edge Computing"],"prefix":"10.1109","author":[{"given":"Shen","family":"Zhuang","sequence":"first","affiliation":[{"name":"College of Computer Science and Software Engineering, Shenzhen University,Shenzhen,China"}]},{"given":"Chengxi","family":"Gao","sequence":"additional","affiliation":[{"name":"Shenzhen Institute of Advanced Technology, Chinese Academy of Sciences,Shenzhen,China"}]},{"given":"Ying","family":"He","sequence":"additional","affiliation":[{"name":"College of Computer Science and Software Engineering, Shenzhen University,Shenzhen,China"}]},{"given":"F. Richard","family":"Yu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Software Engineering, Shenzhen University,Shenzhen,China"}]},{"given":"Yuhang","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Software Engineering, Shenzhen University,Shenzhen,China"}]},{"given":"Weike","family":"Pan","sequence":"additional","affiliation":[{"name":"College of Computer Science and Software Engineering, Shenzhen University,Shenzhen,China"}]},{"given":"Zhong","family":"Ming","sequence":"additional","affiliation":[{"name":"College of Computer Science and Software Engineering, Shenzhen University,Shenzhen,China"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Intelligent reflecting surface meets mobile edge computing: Enhancing wireless communications for computation offloading","author":"liu","year":"2020","journal-title":"ArXiv Preprint"},{"journal-title":"Reinforcement Learning An Introduction","year":"2018","author":"sutton","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctvjsf522"},{"journal-title":"A Course in Game Theory","year":"1994","author":"osborne","key":"ref13"},{"journal-title":"An Introduction to Game Theory","year":"2004","author":"osborne","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2965898"},{"key":"ref16","first-page":"1995","article-title":"Dueling network architectures for deep reinforcement learning","author":"wang","year":"2016","journal-title":"Proceedings of 33rd International Conference on Machine Learning"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/9.739144"},{"key":"ref18","first-page":"9133","article-title":"Responsive safety in reinforcement learning by PID Lagrangian methods","author":"stooke","year":"2020","journal-title":"Proceedings of 37th International Conference on Machine Learning"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2935450"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3007035"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.2334709"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2020.3040607"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2954944"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/MCOM.001.1900107","article-title":"Towards smart and reconfigurable environment: Intelligent reflecting surface aided wireless network","volume":"58","author":"wu","year":"2019","journal-title":"IEEE Communications Magazine"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2021.3051897"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-019-00783-7"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-019-02121-4"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3024186"}],"event":{"name":"2022 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2022,7,18]]},"location":"Padua, Italy","end":{"date-parts":[[2022,7,23]]}},"container-title":["2022 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9891857\/9889787\/09892041.pdf?arnumber=9892041","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,3]],"date-time":"2022-11-03T22:58:34Z","timestamp":1667516314000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9892041\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/ijcnn55064.2022.9892041","relation":{},"subject":[],"published":{"date-parts":[[2022,7,18]]}}}