{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T14:41:40Z","timestamp":1770734500314,"version":"3.49.0"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2026,2,15]],"date-time":"2026-02-15T00:00:00Z","timestamp":1771113600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,2,15]],"date-time":"2026-02-15T00:00:00Z","timestamp":1771113600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,2,15]],"date-time":"2026-02-15T00:00:00Z","timestamp":1771113600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"European Union\u2019s Horizon Europe Framework Program through Project SecQDevOps","award":["101225776"],"award-info":[{"award-number":["101225776"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2026,2,15]]},"DOI":"10.1109\/jiot.2025.3637911","type":"journal-article","created":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T18:59:22Z","timestamp":1764269962000},"page":"6575-6586","source":"Crossref","is-referenced-by-count":0,"title":["Quantum-Inspired Reinforcement Learning for Secure and Sustainable AIoT-Driven Supply Chain Systems"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2990-4604","authenticated-orcid":false,"given":"Muhammad Bilal Akram","family":"Dastagir","sequence":"first","affiliation":[{"name":"Qatar Center for Quantum Computing, College of Science and Engineering, Hamad Bin Khalifa University, Doha, Qatar"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1771-6166","authenticated-orcid":false,"given":"Omer","family":"Tariq","sequence":"additional","affiliation":[{"name":"School of Computing, Korea Advanced Institute of Science and Technology, Daejeon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6364-6149","authenticated-orcid":false,"given":"Shahid","family":"Mumtaz","sequence":"additional","affiliation":[{"name":"Engineering Department, Nottingham Trent University, Nottingham, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4402-7710","authenticated-orcid":false,"given":"Saif","family":"Al-Kuwari","sequence":"additional","affiliation":[{"name":"Qatar Center for Quantum Computing, College of Science and Engineering, Hamad Bin Khalifa University, Doha, Qatar"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8702-7342","authenticated-orcid":false,"given":"Ahmed","family":"Farouk","sequence":"additional","affiliation":[{"name":"Qatar Center for Quantum Computing, College of Science and Engineering, Hamad Bin Khalifa University, Doha, Qatar"}]}],"member":"263","reference":[{"issue":"2","key":"ref1","first-page":"123","article-title":"Green supply chain management with iot: A systematic approach","volume":"45","author":"Chang","year":"2019","journal-title":"J. Ind. Tech."},{"issue":"2","key":"ref2","first-page":"1","article-title":"CT-GAN: Malicious tampering of 3D medical imagery using deep learning","volume":"63","author":"Mirsky","year":"2019","journal-title":"IBM J. Res. Develop."},{"key":"ref3","volume-title":"IBM Quantum Experience","year":"2020"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevApplied.15.014023"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s41745-022-00311-2"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11467-022-1249-z"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1080\/24725854.2023.2219281"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1038\/s41534-019-0201-8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2022.128054"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevResearch.5.043002"},{"key":"ref11","volume-title":"Deep Learning","author":"Goodfellow","year":"2016"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.110975"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2008.926603"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i8.20820"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1287\/moor.2022.1259"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3054909"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3153502"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i9.28805"},{"key":"ref19","first-page":"629","article-title":"Dynamic ensemble selection with reinforcement learning","author":"Li-hua","year":"2023","journal-title":"Advanced Intelligent Computing Technology and Applications"},{"key":"ref20","first-page":"1646","article-title":"Growing Q-networks: Solving continuous control tasks with adaptive control resolution","volume-title":"Proc. 6th Annu. Learn. Dyn. Control Conf.","author":"Seyde"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3551232"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2024.111987"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11424-023-2266-x"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-4095-0_4"},{"key":"ref25","article-title":"Prioritized experience replay","author":"Schaul","year":"2015","journal-title":"arXiv:1511.0595"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/buildings12020131"},{"key":"ref27","article-title":"Proximal policy optimization algorithms","author":"Schulman","year":"2017","journal-title":"arXiv:1707.06347"},{"key":"ref28","article-title":"Revisiting design choices in proximal policy optimization","author":"Hsu","year":"2020","journal-title":"arXiv:2009.10897"},{"key":"ref29","article-title":"You may not need ratio clipping in PPO","author":"Sun","year":"2022","journal-title":"arXiv:2202.00079"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.97.052333"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2022.3225256"},{"key":"ref32","article-title":"Cavity-heisenberg spin-j chain quantum battery and reinforcement learning optimization","author":"Sun","year":"2024","journal-title":"arxiv: 2412.01442"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2020.103915"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.2307\/1967124"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRev.75.1736"},{"key":"ref36","volume-title":"Dynamic Programming","author":"Bellman","year":"1957"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10295"},{"key":"ref38","first-page":"4900","article-title":"Scalable trust-region method for deep reinforcement learning using kronecker-factored approximation","volume-title":"Proc. 34th Int. Conf. Mach. Learn. (ICML)","author":"Wu"},{"key":"ref39","article-title":"Continuous control with deep reinforcement learning","author":"Lillicrap","year":"2015","journal-title":"arXiv:1509.02971"},{"key":"ref40","first-page":"1","article-title":"Sample efficient actor-critic with experience replay","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Wang"},{"key":"ref41","first-page":"4026","article-title":"Deep exploration via bootstrapped DQN","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Osband"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmr.2004.11.004"},{"key":"ref43","volume-title":"Model Predictive Control: Theory and Design","author":"Rawlings","year":"2009"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11372629\/11270982.pdf?arnumber=11270982","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T21:09:10Z","timestamp":1770671350000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11270982\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,15]]},"references-count":43,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3637911","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,15]]}}}