{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T04:55:27Z","timestamp":1773377727575,"version":"3.50.1"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,26]],"date-time":"2022-06-26T00:00:00Z","timestamp":1656201600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,26]],"date-time":"2022-06-26T00:00:00Z","timestamp":1656201600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100003452","name":"Innovation and Technology Commission","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003452","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,26]]},"DOI":"10.1109\/isit50566.2022.9834581","type":"proceedings-article","created":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T15:34:22Z","timestamp":1659540862000},"page":"37-42","source":"Crossref","is-referenced-by-count":7,"title":["Enhancing the Decoding Rates of BATS Codes by Learning With Guided Information"],"prefix":"10.1109","author":[{"given":"Jiaxin","family":"Qing","sequence":"first","affiliation":[{"name":"The Chinese University of Hong Kong,Department of Information Engineering,Hong Kong SAR"}]},{"given":"Hoover H. F.","family":"Yin","sequence":"additional","affiliation":[{"name":"n-hop Technologies Limited"}]},{"given":"Raymond W.","family":"Yeung","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong,Department of Information Engineering,Hong Kong SAR"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2019.8849519"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2005.1404595"},{"key":"ref33","first-page":"1928","article-title":"Asynchronous methods for deep reinforcement learning","author":"mnih","year":"2016","journal-title":"Proc ICML&#x2019;16"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1038\/323533a0"},{"key":"ref31","article-title":"Systems and processes for decoding chain reaction codes through inactivation","author":"shokrollahi","year":"2005","journal-title":"US patent 6 856 263"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2014.7028592"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2008.4594875"},{"key":"ref36","author":"sutton","year":"2018","journal-title":"Reinforcement Learning An Introduction"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1137\/16M1080173"},{"key":"ref34","article-title":"Generative adversarial nets","volume":"27","author":"goodfellow","year":"2014","journal-title":"Proc NeurIPS&#x2019;14"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/NETCOD.2012.6261896"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT44484.2020.9174517"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2002.1181950"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2594051"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/18.910578"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1038\/s41598-021-02583-7","article-title":"Self-controlling photonic-on-chip networks with deep reinforcement learning","volume":"11","author":"do","year":"2021","journal-title":"Scientific Reports"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-020-05635-7"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2018.8555714"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JSAIT.2021.3073834"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10295"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-79278-6","author":"yang","year":"2017","journal-title":"BATS Codes Theory and Practice"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JSAIT.2021.3126634"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/777412.777464"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2017.2765641"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.807285"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.864424"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ITW48936.2021.9611427"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2008.01.006"},{"key":"ref8","first-page":"40","article-title":"Practical network coding","volume":"41","author":"chou","year":"2003","journal-title":"Proc Allerton Conf on Comm Control and Comp"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2334315"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/18.850663"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ITWKSPS.2010.5503153"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.881746"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT50566.2022.9834338"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/e22070790"},{"key":"ref21","first-page":"72","article-title":"On the impact of zero-padding in network coding efficiency with internet traffic and video traces","author":"taghouti","year":"2016","journal-title":"European Wireless 2016"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2016.7541719"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT45174.2021.9517910"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.21828"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2019.8849280"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2435792"}],"event":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","location":"Espoo, Finland","start":{"date-parts":[[2022,6,26]]},"end":{"date-parts":[[2022,7,1]]}},"container-title":["2022 IEEE International Symposium on Information Theory (ISIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9834325\/9834269\/09834581.pdf?arnumber=9834581","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T20:34:59Z","timestamp":1773347699000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9834581\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,26]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/isit50566.2022.9834581","relation":{},"subject":[],"published":{"date-parts":[[2022,6,26]]}}}