{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:14:56Z","timestamp":1774023296326,"version":"3.50.1"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"24","license":[{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272028"],"award-info":[{"award-number":["62272028"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science and Engineering Research Council (NSERC) of Canada"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2024,12,15]]},"DOI":"10.1109\/jiot.2024.3448537","type":"journal-article","created":{"date-parts":[[2024,8,23]],"date-time":"2024-08-23T17:59:40Z","timestamp":1724435980000},"page":"39971-39983","source":"Crossref","is-referenced-by-count":9,"title":["Energy-Constrained Safe Path Planning for UAV-Assisted Data Collection of Mobile IoT Devices"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0617-8101","authenticated-orcid":false,"given":"Junchao","family":"Fan","sequence":"first","affiliation":[{"name":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2975-8857","authenticated-orcid":false,"given":"Xiaolin","family":"Chang","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1251-3730","authenticated-orcid":false,"given":"Jelena","family":"Mi\u0161i\u0107","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Toronto Metropolitan University, Toronto, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7760-9920","authenticated-orcid":false,"given":"Vojislav B.","family":"Mi\u0161i\u0107","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Toronto Metropolitan University, Toronto, ON, Canada"}]},{"given":"Tong","family":"Yang","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-3359-5352","authenticated-orcid":false,"given":"Yanwei","family":"Gong","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.123082"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2023.3345280"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2024.3394593"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/lra.2023.3254445"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2022.3176903"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2024.3373931"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.apm.2024.03.001"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2022.3153585"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ast.2022.108064"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2024.120329"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3323321"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2023.100594"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3280848"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2023.3255240"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3285942"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.106331"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2023.3335037"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2023.3260204"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3084972"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS57453.2023.10226065"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2018.8406980"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103670"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2022.3148364"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC49053.2021.9417292"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3184804"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162896"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13081592"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3300927"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2024.3379417"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP49357.2023.10094618"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3283502"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3320796"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2943608"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.2989302"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488791"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC49053.2021.9417318"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9686015"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3361394"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2902559"},{"key":"ref40","article-title":"Proximal policy optimization algorithms","author":"Schulman","year":"2017","journal-title":"arXiv.1707.06347"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP48485.2024.10445833"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/10786863\/10644086.pdf?arnumber=10644086","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T20:22:47Z","timestamp":1733948567000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10644086\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,15]]},"references-count":41,"journal-issue":{"issue":"24"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2024.3448537","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,15]]}}}