{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T06:28:57Z","timestamp":1759991337124},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,30]]},"DOI":"10.1109\/iwcmc55113.2022.9824956","type":"proceedings-article","created":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T19:32:34Z","timestamp":1658259154000},"page":"760-765","source":"Crossref","is-referenced-by-count":3,"title":["Optimization-driven Deep Reinforcement Learning for Sniffer Patrolling in Wireless Networks"],"prefix":"10.1109","author":[{"given":"Xiaoling","family":"Luo","sequence":"first","affiliation":[{"name":"School of Information Engineering, Wuhan University of Technology,China"}]},{"given":"Meng","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Intelligent Systems Engineering, Sun Yat-sen University,China"}]},{"given":"Chunnian","family":"Zeng","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Wuhan University of Technology,China"}]},{"given":"Chengtao","family":"Li","sequence":"additional","affiliation":[{"name":"China Three Gorges Corporation,China"}]},{"given":"Jing","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Electronic Information and Communications, Huazhong University of Science and Technology,China"}]},{"given":"Shimin","family":"Gong","sequence":"additional","affiliation":[{"name":"School of Intelligent Systems Engineering, Sun Yat-sen University,China"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2478458"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2916583"},{"journal-title":"Reinforcement Learning An Introduction","year":"2018","author":"sutton","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2494218"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2018.8645508"},{"key":"ref15","article-title":"UAVs using bayesian optimization to locate WiFi devices","author":"carpin","year":"2015","journal-title":"ArXiv"},{"key":"ref16","first-page":"1","article-title":"Model-aided deep rein-forcement learning for sample-efficient UAV trajectory design in loT networks","author":"esrafilian","year":"0","journal-title":"Proc Globecom"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS51098.2021.9352923"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2019.2937487"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS53615.2022.9668420"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2959610"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TELFOR51502.2020.9306544"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3008533"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155431"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2306328"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2013.23"}],"event":{"name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","start":{"date-parts":[[2022,5,30]]},"location":"Dubrovnik, Croatia","end":{"date-parts":[[2022,6,3]]}},"container-title":["2022 International Wireless Communications and Mobile Computing (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9823957\/9824097\/09824956.pdf?arnumber=9824956","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,8]],"date-time":"2022-08-08T20:00:44Z","timestamp":1659988844000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9824956\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,30]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/iwcmc55113.2022.9824956","relation":{},"subject":[],"published":{"date-parts":[[2022,5,30]]}}}