{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:35:14Z","timestamp":1763202914852,"version":"3.28.0"},"reference-count":45,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T00:00:00Z","timestamp":1719705600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T00:00:00Z","timestamp":1719705600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,30]]},"DOI":"10.1109\/ijcnn60899.2024.10651491","type":"proceedings-article","created":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:35:05Z","timestamp":1725903305000},"page":"1-8","source":"Crossref","is-referenced-by-count":5,"title":["Cardinality and Bounding Constrained Portfolio Optimization Using Safe Reinforcement Learning"],"prefix":"10.1109","author":[{"given":"Yiran","family":"Li","sequence":"first","affiliation":[{"name":"University of Nottingham Ningbo China,School of Computer Science,Ningbo,China"}]},{"given":"Nanjiang","family":"Du","sequence":"additional","affiliation":[{"name":"University of Nottingham Ningbo China,School of Computer Science,Ningbo,China"}]},{"given":"Xingke","family":"Song","sequence":"additional","affiliation":[{"name":"University of Nottingham Ningbo China,School of Computer Science,Ningbo,China"}]},{"given":"Xiaoying","family":"Yang","sequence":"additional","affiliation":[{"name":"University of Nottingham Ningbo China,School of Computer Science,Ningbo,China"}]},{"given":"Tianxiang","family":"Cui","sequence":"additional","affiliation":[{"name":"University of Nottingham Ningbo China,School of Computer Science,Ningbo,China"}]},{"given":"Ning","family":"Xue","sequence":"additional","affiliation":[{"name":"University of Nottingham Ningbo China,School of Computer Science,Ningbo,China"}]},{"given":"Amin","family":"Farjudian","sequence":"additional","affiliation":[{"name":"University of Birmingham,School of Mathematics,Birmingham,UK"}]},{"given":"Jianfeng","family":"Ren","sequence":"additional","affiliation":[{"name":"University of Nottingham Ningbo China,School of Computer Science,Ningbo,China"}]},{"given":"Wooi Ping","family":"Cheah","sequence":"additional","affiliation":[{"name":"University of Nottingham Ningbo China,School of Computer Science,Ningbo,China"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1016\/j.irfa.2022.102255"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1016\/j.irfa.2023.102851"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.3390\/math12050701"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.2307\/2975974.JSTOR2975974"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/CEC.2014.6900357"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/CEC.2015.7257198"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1007\/s00500-019-04517-y"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1609\/aaai.v37i2.25325"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1016\/j.ejor.2023.11.038"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TII.2023.3345457"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1016\/j.adapen.2023.100151"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1016\/j.eswa.2019.112891"},{"year":"2017","author":"Jiang","article-title":"A deep reinforcement learning framework for the financial portfolio management problem","key":"ref13"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1609\/aaai.v34i01.5462"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1016\/j.econmod.2022.106078"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1016\/j.techfore.2023.122944"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1287\/moor.15.4.676"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1016\/j.ejor.2012.04.023"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1016\/S0305-0548(99)00074-X"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1016\/j.automatica.2015.01.040"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1016\/j.ejor.2011.03.030"},{"volume-title":"Constrained Markov decision processes.","year":"1999","author":"Altman","key":"ref22"},{"volume-title":"8th International Conference on Learning Representations, ICLR 2020","author":"Yang","article-title":"Projection-based constrained policy optimization","key":"ref23"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1609\/aaai.v34i04.5932"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1016\/j.resourpol.2023.104161"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1371\/journal.pone.0259308"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1016\/j.najef.2019.101103"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1016\/j.ribaf.2022.101690"},{"year":"2023","author":"Xiong","article-title":"Market Misconduct in Decentralized Finance (DeFi): Analysis, Regulatory Challenges and Policy Implications","key":"ref29"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1016\/j.eneco.2023.106828"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1016\/j.iref.2024.02.077"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1186\/s13705-021-00318-0"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/SSCI52147.2023.10371912"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/SSCI52147.2023.10371885"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/EAIS.2013.6604116"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1109\/IJCNN52387.2021.9534463"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1016\/j.tranpol.2022.11.010"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.3390\/sym14051027"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.3390\/s22145424"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.3390\/sym14071301"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1016\/j.eswa.2024.123515"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1109\/TNNLS.2016.2522401"},{"year":"2017","author":"Schulman","article-title":"Proximal policy optimization algorithms","key":"ref43"},{"issue":"35","key":"ref44","first-page":"1","article-title":"Olps: A toolbox for on-line portfolio selection","volume":"17","author":"Li","year":"2016","journal-title":"Journal of Machine Learning Research"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.3905\/jpm.1994.409501"}],"event":{"name":"2024 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2024,6,30]]},"location":"Yokohama, Japan","end":{"date-parts":[[2024,7,5]]}},"container-title":["2024 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10649807\/10649898\/10651491.pdf?arnumber=10651491","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T06:50:29Z","timestamp":1725951029000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10651491\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,30]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/ijcnn60899.2024.10651491","relation":{},"subject":[],"published":{"date-parts":[[2024,6,30]]}}}