{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:43:53Z","timestamp":1767339833921,"version":"3.37.3"},"reference-count":19,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"National Key Research and Development Plan","award":["2020YFB1804803"],"award-info":[{"award-number":["2020YFB1804803"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Fund of China","doi-asserted-by":"publisher","award":["61521003","62002019"],"award-info":[{"award-number":["61521003","62002019"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012236","name":"Beijing Institute of Technology Research Fund Program for Young Scholars, and PCL Future Greater-Bay Area Network Facilities for Large-scale Experiments and Applications","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012236","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Lett."],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1109\/lcomm.2020.3022064","type":"journal-article","created":{"date-parts":[[2020,9,7]],"date-time":"2020-09-07T21:11:11Z","timestamp":1599513071000},"page":"171-175","source":"Crossref","is-referenced-by-count":12,"title":["A Scalable Deep Reinforcement Learning Approach for Traffic Engineering Based on Link Control"],"prefix":"10.1109","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8606-9337","authenticated-orcid":false,"given":"Penghao","family":"Sun","sequence":"first","affiliation":[]},{"given":"Julong","family":"Lan","sequence":"additional","affiliation":[]},{"given":"Junfei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jianpeng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yuxiang","family":"Hu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7314-410X","authenticated-orcid":false,"given":"Zehua","family":"Guo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3405671.3405809"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1038\/nature10011"},{"key":"ref12","first-page":"5279","article-title":"Scalable trust-region method for deep reinforcement learning using kronecker-factored approximation","author":"wu","year":"2017","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref13","first-page":"1008","article-title":"Actor-critic algorithms","author":"konda","year":"2000","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref14","first-page":"1928","article-title":"Asynchronous methods for deep reinforcement learning","author":"mnih","year":"2016","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref15","article-title":"Noisy networks for exploration","author":"fortunato","year":"2017","journal-title":"arXiv 1706 10295"},{"journal-title":"The national science foundation network","year":"2019","key":"ref16"},{"journal-title":"Os3e","year":"2019","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOT.2001.948886"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1005686.1005697"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.05.036"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.09.043"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8485853"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.04.014"},{"key":"ref8","first-page":"1","author":"chen","year":"2016","journal-title":"Curse of Dimensionality"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2016.12"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2904897"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3000371"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2921589"}],"container-title":["IEEE Communications Letters"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4234\/9317001\/09187430.pdf?arnumber=9187430","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:03:38Z","timestamp":1642003418000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9187430\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":19,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/lcomm.2020.3022064","relation":{},"ISSN":["1089-7798","1558-2558","2373-7891"],"issn-type":[{"type":"print","value":"1089-7798"},{"type":"electronic","value":"1558-2558"},{"type":"electronic","value":"2373-7891"}],"subject":[],"published":{"date-parts":[[2021,1]]}}}