{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T07:16:05Z","timestamp":1760426165720,"version":"3.37.3"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,17]],"date-time":"2023-05-17T00:00:00Z","timestamp":1684281600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,17]],"date-time":"2023-05-17T00:00:00Z","timestamp":1684281600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,17]]},"DOI":"10.1109\/infocom53939.2023.10228952","type":"proceedings-article","created":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T17:40:43Z","timestamp":1693330843000},"page":"1-10","source":"Crossref","is-referenced-by-count":7,"title":["Marten: A Built-in Security DRL-Based Congestion Control Framework by Polishing the Expert"],"prefix":"10.1109","author":[{"given":"Zhiyuan","family":"Pan","sequence":"first","affiliation":[{"name":"Southern University of Science and Technology,China"}]},{"given":"Jianer","family":"Zhou","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology,China"}]},{"given":"Xinyi","family":"Qiu","sequence":"additional","affiliation":[{"name":"Peng Cheng Laboratory,China"}]},{"given":"Weichao","family":"Li","sequence":"additional","affiliation":[{"name":"Peng Cheng Laboratory,China"}]},{"given":"Heng","family":"Pan","sequence":"additional","affiliation":[{"name":"ICT, CAS,China"}]},{"given":"Wei","family":"Zhang","sequence":"additional","affiliation":[{"name":"ICT, CAS,China"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/INFOCOM41043.2020.9155250"},{"year":"0","author":"govil","article-title":"MIMIQ: Masking IPs with migration in QUIC","key":"ref35"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/JSAC.2020.3036958"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1145\/3341302.3342078"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/3485983.3494840"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/3387514.3405892"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1145\/3405796.3405827"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/ICRA.2018.8461203"},{"key":"ref30","first-page":"1928","article-title":"Asynchronous methods for deep reinforcement learning","author":"mnih","year":"2016","journal-title":"International Conference on Machine Learning"},{"key":"ref11","first-page":"611","article-title":"AUTO: Adaptive congestion control based on Multi-Objective reinforcement learning for the Satellite-Ground integrated network","author":"li","year":"0"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1145\/3452296.3472893"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/3492321.3519593"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/ICMA49215.2020.9233522"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/3012426.3022184"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1145\/1400097.1400105","article-title":"Cubic: a new tcp-friendly high-speed tcp variant","volume":"42","author":"ha","year":"2008","journal-title":"ACM SIGOPS Operating Systems Review"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/3098822.3098842"},{"year":"2016","author":"brockman","article-title":"Openai gym","key":"ref16"},{"year":"2018","author":"sutton","journal-title":"Reinforcement Learning An Introduction","key":"ref19"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.17487\/RFC9114"},{"key":"ref24","first-page":"417","article-title":"Mahimahi: Accurate {Record-and-Replay} for {HTTP}","author":"netravali","year":"2015","journal-title":"2015 USENIX Annual Technical Conference (USENIX ATC 15)"},{"key":"ref23","first-page":"387","article-title":"Deterministic policy gradient algorithms","author":"silver","year":"2014","journal-title":"International Conference on Machine Learning"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1145\/2534169.2486020"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1609\/aaai.v32i1.11797"},{"key":"ref20","first-page":"1889","article-title":"Trust region policy optimization","author":"schulman","year":"2015","journal-title":"International Conference on Machine Learning"},{"year":"2015","author":"lillicrap","article-title":"Continuous control with deep reinforcement learning","key":"ref22"},{"key":"ref21","first-page":"1587","article-title":"Addressing function approximation error in actor-critic methods","author":"fujimoto","year":"2018","journal-title":"International Conference on Machine Learning"},{"key":"ref28","first-page":"343","article-title":"{PCC} vivace: Online-learning congestion control","author":"dong","year":"2018","journal-title":"15th USENIX Symposium on Networked Systems Design and Implementation ( NSDI 18)"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1007\/978-3-642-27645-3_15"},{"key":"ref29","article-title":"Towards safe online reinforcement learning in computer systems","author":"mao","year":"2019","journal-title":"33rd Conference on Neural Information Processing Systems (NeurIPS 2019)"},{"key":"ref8","first-page":"459","article-title":"Stochastic forecasts achieve high throughput and low delay over cellular networks","author":"winstein","year":"2013","journal-title":"USENIX Symposium on Networked Systems Design and Implementation (NSDI)"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/2534169.2486031"},{"key":"ref9","first-page":"3050","article-title":"A deep reinforcement learning perspective on internet congestion control","author":"jay","year":"2019","journal-title":"International Conference on Machine Learning"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/1851182.1851192"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/JSAC.2019.2898758"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/2829988.2787510"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/3232755.3232783"}],"event":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications","start":{"date-parts":[[2023,5,17]]},"location":"New York City, NY, USA","end":{"date-parts":[[2023,5,20]]}},"container-title":["IEEE INFOCOM 2023 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10228851\/10228852\/10228952.pdf?arnumber=10228952","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T17:44:20Z","timestamp":1695059060000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10228952\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,17]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/infocom53939.2023.10228952","relation":{},"subject":[],"published":{"date-parts":[[2023,5,17]]}}}