{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,30]],"date-time":"2025-11-30T09:18:26Z","timestamp":1764494306797,"version":"3.37.3"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2024,6,15]],"date-time":"2024-06-15T00:00:00Z","timestamp":1718409600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,6,15]],"date-time":"2024-06-15T00:00:00Z","timestamp":1718409600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,15]],"date-time":"2024-06-15T00:00:00Z","timestamp":1718409600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62371266","62071264","U1809203"],"award-info":[{"award-number":["62371266","62071264","U1809203"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2024,6,15]]},"DOI":"10.1109\/jiot.2024.3382102","type":"journal-article","created":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T20:31:42Z","timestamp":1711485102000},"page":"22616-22627","source":"Crossref","is-referenced-by-count":6,"title":["Leaky Cable Perimeter Intrusion Detection Based on Deep Reinforcement Learning"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-6306-311X","authenticated-orcid":false,"given":"Jiacheng","family":"Ye","sequence":"first","affiliation":[{"name":"Institute for Future Wireless Research, Ningbo University, Ningbo, Zhejiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1287-6881","authenticated-orcid":false,"given":"Junshi","family":"Lv","sequence":"additional","affiliation":[{"name":"Institute for Future Wireless Research, Ningbo University, Ningbo, Zhejiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5466-8215","authenticated-orcid":false,"given":"Gaoming","family":"Xu","sequence":"additional","affiliation":[{"name":"Institute for Future Wireless Research, Ningbo University, Ningbo, Zhejiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2582-5290","authenticated-orcid":false,"given":"Taijun","family":"Liu","sequence":"additional","affiliation":[{"name":"Institute for Future Wireless Research, Ningbo University, Ningbo, Zhejiang, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MWSYM.2014.6848298"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1117\/12.868594"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAS.2007.4406975"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.1980.1142426"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2011.6083650"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP46576.2022.9897472"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.anucene.2017.11.026"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3120804"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.13140\/RG.2.2.18893.74727"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.1986.310777"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2007.370023"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SICE.2006.315652"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.2991\/asei-15.2015.20"},{"key":"ref14","article-title":"Asynchronous methods for deep reinforcement learning","author":"Mnih","year":"2016","journal-title":"arXiv:1602.01783"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2000.891160"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2009.5335532"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MAES.2002.1028080"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2002.1049250"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2009.5450156"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2013.6698987"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CIEEC50170.2021.9510405"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICEDME52809.2021.00059"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IFEEA51475.2020.00023"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICSIDP47821.2019.9172928"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3187026"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/en14041164"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2019.2906086"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.105290"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.05.013"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2019.106460"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.dib.2020.106631"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2019.100977"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.112963"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.1989.132518"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2004.1405387"},{"key":"ref36","article-title":"Playing Atari with deep reinforcement learning","author":"Mnih","year":"2013","journal-title":"arXiv:1312.5602"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10295"},{"key":"ref38","first-page":"1995","article-title":"Dueling network architectures for deep reinforcement learning","volume-title":"Proc. 33rd Int. Conf. Mach. Learn. (ICML)","author":"Wang"},{"key":"ref39","article-title":"Empirical evaluation of gated recurrent neural networks on sequence modeling","author":"Chung","year":"2014","journal-title":"arXiv:1412.3555"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/10551641\/10479509.pdf?arnumber=10479509","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T05:27:47Z","timestamp":1725341267000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10479509\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,15]]},"references-count":40,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2024.3382102","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2024,6,15]]}}}