{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:42:20Z","timestamp":1767339740038,"version":"3.37.3"},"reference-count":35,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61401380"],"award-info":[{"award-number":["61401380"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Key Project of Fujian Province","award":["2021HZ021004","2019HZ020009"],"award-info":[{"award-number":["2021HZ021004","2019HZ020009"]}]},{"name":"Open Project of Key Laboratory of Wireless Sensor Network &amp; Communication"},{"name":"Shanghai Institute of Microsystem and Information Technology, CAS"},{"name":"Xiamen Special Fund for Marine and Fishery Development","award":["21CZB011HJ02"],"award-info":[{"award-number":["21CZB011HJ02"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Systems Journal"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/jsyst.2023.3283254","type":"journal-article","created":{"date-parts":[[2023,6,20]],"date-time":"2023-06-20T17:29:15Z","timestamp":1687282155000},"page":"1-12","source":"Crossref","is-referenced-by-count":5,"title":["Learning-Assisted Energy Minimization for MEC Systems With Noncompletely Overlapping NOMA"],"prefix":"10.1109","author":[{"given":"Siping","family":"Han","sequence":"first","affiliation":[{"name":"Department of Informatics and Communication Engineering, Xiamen University, Xiamen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3438-0510","authenticated-orcid":false,"given":"Baoshan","family":"Lu","sequence":"additional","affiliation":[{"name":"Department of Informatics and Communication Engineering, Xiamen University, Xiamen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8545-0016","authenticated-orcid":false,"given":"Shijun","family":"Lin","sequence":"additional","affiliation":[{"name":"Department of Informatics and Communication Engineering, Xiamen University, Xiamen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6537-5653","authenticated-orcid":false,"given":"Xuemin","family":"Hong","sequence":"additional","affiliation":[{"name":"Department of Informatics and Communication Engineering, Xiamen University, Xiamen, China"}]},{"given":"Jianghong","family":"Shi","sequence":"additional","affiliation":[{"name":"Department of Informatics and Communication Engineering, Xiamen University, Xiamen, China"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/COMST.2017.2745201"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/tcomm.2017.2699660"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/COMST.2016.2621116"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/MCOM.2017.1500657CM"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TCOMM.2018.2870894"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/TCOMM.2018.2881725"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TVT.2018.2875337"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/TCOMM.2020.3020068"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/TCOMM.2019.2935717"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TII.2019.2944839"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/TVT.2020.2997673"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/LSP.2018.2876019"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/TVT.2019.2907253"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/GLOBECOM38437.2019.9013239"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/TWC.2020.2988532"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/LWC.2019.2934453"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/TSUSC.2021.3103476"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/GLOBECOM38437.2019.9013826"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/TWC.2020.2968426"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/LCOMM.2020.3012601"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/ICNC47757.2020.9049805"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/TWC.2021.3139932"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/TCOMM.2021.3059444"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/twc.2022.3224291"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/TII.2020.3001355"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/TCCN.2021.3093436"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/JIOT.2021.3064995"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/TWC.2020.3033843"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/TII.2021.3117968"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/TWC.2020.3032991"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/JIOT.2021.3123406"},{"year":"2018","author":"Haarnoja","article-title":"Soft actor-critic: Off-policy maximum entropy deep reinforcement learning with a stochastic actor","key":"ref32"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/tnse.2021.3076795"},{"year":"2018","author":"Fujimoto","article-title":"Addressing function approximation error in actor-critic methods","key":"ref34"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/TVT.2020.3041929"}],"container-title":["IEEE Systems Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4267003\/4357939\/10158329.pdf?arnumber=10158329","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,19]],"date-time":"2023-12-19T22:32:49Z","timestamp":1703025169000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10158329\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/jsyst.2023.3283254","relation":{},"ISSN":["1932-8184","1937-9234","2373-7816"],"issn-type":[{"type":"print","value":"1932-8184"},{"type":"electronic","value":"1937-9234"},{"type":"electronic","value":"2373-7816"}],"subject":[],"published":{"date-parts":[[2023]]}}}