{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T20:35:49Z","timestamp":1774643749578,"version":"3.50.1"},"reference-count":29,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Advanced Power and Energy Center","award":["RCII-006-2018"],"award-info":[{"award-number":["RCII-006-2018"]}]},{"DOI":"10.13039\/501100004070","name":"Khalifa University of Science, Technology and Research","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004070","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Systems Journal"],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1109\/jsyst.2023.3281524","type":"journal-article","created":{"date-parts":[[2023,6,15]],"date-time":"2023-06-15T17:23:29Z","timestamp":1686849809000},"page":"4452-4463","source":"Crossref","is-referenced-by-count":13,"title":["Management of Congestion in Distribution Networks Utilizing Demand Side Management and Reinforcement Learning"],"prefix":"10.1109","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4118-3590","authenticated-orcid":false,"given":"Omniyah Gul M","family":"Khan","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4284-8646","authenticated-orcid":false,"given":"Amr","family":"Youssef","sequence":"additional","affiliation":[{"name":"Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3970-4844","authenticated-orcid":false,"given":"Magdy","family":"Salama","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0172-0686","authenticated-orcid":false,"given":"Ehab Fahmy","family":"El-Saadany","sequence":"additional","affiliation":[{"name":"Advanced Power and Energy Center, Department of Electrical Engineering and Computer Sciences, Khalifa University, Abu Dhabi, UAE"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2377020"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ECCE44975.2020.9236353"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/en13020318"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2016.06.014"},{"key":"ref5","article-title":"Efficient privacy-preserving computation based on additive secret sharing","author":"Xiong","year":"2021"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2013.2278952"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2014.2359977"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2735998"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2018.2790638"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2607720"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2375067"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1049\/oap-cired.2021.0297"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICEPE50861.2021.9404380"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/EEEIC.2019.8783624"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/PTC.2017.7981022"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2021.1004287"},{"key":"ref17","volume-title":"Reinforcement Learning: An Introduction","author":"Sutton","year":"2014"},{"key":"ref18","article-title":"Continuous control with deep reinforcement learning","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Lillicrap","year":"2016"},{"key":"ref19","first-page":"615","volume-title":"General Cryptographic Protocols","volume":"2","author":"Goldreich","year":"2009"},{"key":"ref20","article-title":"Private data aggregation on a budget","author":"Dahl","year":"2017","journal-title":"Cryptol. ePrint Arch."},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO.2019.8902577"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2022.3200838"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2177103"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.07.014"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/61.25627"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2336093"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2349357"},{"key":"ref28","article-title":"General algebraic modeling system (GAMS) release 24.2.1","year":"2013"},{"key":"ref29","article-title":"ADAM: A method for stochastic optimization","volume-title":"Proc. 3rd Int. Conf. Learn. Representations","author":"Kingma","year":"2017"}],"container-title":["IEEE Systems Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4267003\/10235272\/10153958.pdf?arnumber=10153958","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T02:28:16Z","timestamp":1705026496000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10153958\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9]]},"references-count":29,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/jsyst.2023.3281524","relation":{},"ISSN":["1932-8184","1937-9234","2373-7816"],"issn-type":[{"value":"1932-8184","type":"print"},{"value":"1937-9234","type":"electronic"},{"value":"2373-7816","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9]]}}}