{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T17:18:10Z","timestamp":1758820690379,"version":"3.37.3"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,17]],"date-time":"2023-05-17T00:00:00Z","timestamp":1684281600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,17]],"date-time":"2023-05-17T00:00:00Z","timestamp":1684281600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100003090","name":"EWE","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003090","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,17]]},"DOI":"10.1109\/infocom53939.2023.10228969","type":"proceedings-article","created":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T17:40:43Z","timestamp":1693330843000},"page":"1-10","source":"Crossref","is-referenced-by-count":7,"title":["Safehaul: Risk-Averse Learning for Reliable mmWave Self-Backhauling in 6G Networks"],"prefix":"10.1109","author":[{"given":"Amir Ashtari","family":"Gargari","sequence":"first","affiliation":[{"name":"University of Padova,Department of Information Engineering,Italy"}]},{"given":"Andrea","family":"Ortiz","sequence":"additional","affiliation":[{"name":"TU Darmstadt,Communications Engineering Lab,Germany"}]},{"given":"Matteo","family":"Pagin","sequence":"additional","affiliation":[{"name":"University of Padova,Department of Information Engineering,Italy"}]},{"given":"Anja","family":"Klein","sequence":"additional","affiliation":[{"name":"TU Darmstadt,Communications Engineering Lab,Germany"}]},{"given":"Matthias","family":"Hollick","sequence":"additional","affiliation":[{"name":"TU Darmstadt,Secure Mobile Networking Lab (SEEMOO),Germany"}]},{"given":"Michele","family":"Zorzi","sequence":"additional","affiliation":[{"name":"University of Padova,Department of Information Engineering,Italy"}]},{"given":"Arash","family":"Asadi","sequence":"additional","affiliation":[{"name":"TU Darmstadt,Wireless Communications and Sensing Lab (WISE),Germany"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108248"},{"year":"2022","key":"ref35","article-title":"NR; Backhaul Adaptation Protocol (BAP) specification"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2020.2992628"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2020.3022529"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2018.8377239"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8485929"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWorkshops50388.2021.9473755"},{"year":"2018","key":"ref36","article-title":"Study on channel model for frequencies from 0.5 to 100 GHz"},{"year":"2018","key":"ref31","article-title":"NR; Study on integrated access and backhaul"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2828880"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2022.3191744"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.2014.2365209"},{"article-title":"Max-min rates in self-backhauled millimeter wave cellular networks","year":"2018","author":"kulkarni","key":"ref10"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2869411"},{"year":"2022","key":"ref2","article-title":"NR; Integrated Access and Backhaul (IAB) radio transmission and reception"},{"year":"2022","key":"ref1","article-title":"NR; Overall description; Stage-2"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2021.3098967"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7511065"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2947925"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2013.090513.120848"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2840-8"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.21314\/JOR.2000.038"},{"key":"ref24","first-page":"272","author":"pflug","year":"2000","journal-title":"Some Remarks on the Value-at-Risk and the Conditional Value-at-Risk"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-4266(02)00271-6"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1093\/jjfinec\/nbm019"},{"journal-title":"Reinforcement Learning An Introduction","year":"2018","author":"sutton","key":"ref25"},{"article-title":"Sionna: An Open-Source Library for Next-Generation Physical Layer Research","year":"2022","author":"hoydis","key":"ref20"},{"year":"2019","key":"ref22","article-title":"NR; Study on integrated access and backhaul"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647977"},{"key":"ref28","first-page":"245","article-title":"Exploration vs exploitation vs safety: Risk-aware multi-armed bandits","volume":"29","author":"galichet","year":"2013","journal-title":"Proc 5th Asian Conference on Machine Learning"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013689704352"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CAMAD.2018.8514996"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2947926"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2015.7557347"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.23919\/WIOPT.2017.7959888"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2906196"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2671358"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2020.2964250"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2464278"}],"event":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications","start":{"date-parts":[[2023,5,17]]},"location":"New York City, NY, USA","end":{"date-parts":[[2023,5,20]]}},"container-title":["IEEE INFOCOM 2023 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10228851\/10228852\/10228969.pdf?arnumber=10228969","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T17:44:03Z","timestamp":1695059043000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10228969\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,17]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/infocom53939.2023.10228969","relation":{},"subject":[],"published":{"date-parts":[[2023,5,17]]}}}