{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:43:07Z","timestamp":1776444187258,"version":"3.51.2"},"reference-count":160,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100006754","name":"U.S. Army Research Laboratory","doi-asserted-by":"publisher","award":["W911NF-20-2-0277"],"award-info":[{"award-number":["W911NF-20-2-0277"]}],"id":[{"id":"10.13039\/100006754","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Artif. Intell."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1109\/tai.2024.3444746","type":"journal-article","created":{"date-parts":[[2024,8,19]],"date-time":"2024-08-19T13:40:13Z","timestamp":1724074813000},"page":"6012-6026","source":"Crossref","is-referenced-by-count":12,"title":["Neuro-Symbolic AI for Military Applications"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2014-2749","authenticated-orcid":false,"given":"Desta Haileselassie","family":"Hagos","sequence":"first","affiliation":[{"name":"DoD Center of Excellence in Artificial Intelligence &#x0026; Machine Learning (CoE-AIML), Department of Electrical Engineering and Computer Science, College of Engineering and Architecture (CEA), Howard University, Washington, DC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3638-3464","authenticated-orcid":false,"given":"Danda B.","family":"Rawat","sequence":"additional","affiliation":[{"name":"DoD Center of Excellence in Artificial Intelligence &#x0026; Machine Learning (CoE-AIML), Department of Electrical Engineering and Computer Science, College of Engineering and Architecture (CEA), Howard University, Washington, DC, USA"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Artificial intelligence and national security","volume":"45178","author":"Sayler","year":"2019","journal-title":"Congressional Res. Service"},{"key":"ref2","article-title":"Artif. Intell. and Nat. Secur.","author":"Hoadley","year":"2018"},{"key":"ref3","volume-title":"The Global Expansion of AI Surveillance","volume":"17","author":"Feldstein","year":"2019"},{"key":"ref4","article-title":"The MQ-9 Reaper remotely piloted aircraft: Humans and machines in action","author":"Cullen","year":"2011"},{"issue":"1","key":"ref5","first-page":"103","article-title":"Artificial intelligence in cybersecurity","volume":"1","author":"Wirkuttis","year":"2017","journal-title":"Cyber, Intell., Secur."},{"key":"ref6","article-title":"The national artificial intelligence research and development strategic plan","author":"Plan","year":"2016"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16761-4_19"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.1997.635328"},{"key":"ref9","article-title":"Fusing AI and simulation in military modeling","author":"Jr","year":"1985"},{"key":"ref10","volume-title":"Army of None: Autonomous Weapons and the Future of War","author":"Scharre","year":"2018"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1080\/02684527.2015.1115238"},{"key":"ref12","article-title":"Cyber war: The next threat to national security and what to do about it? by Richard A. Clarke and Robert K. Knake","author":"Borah","year":"2010"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1080\/14751798.2021.1959141"},{"issue":"1","key":"ref14","first-page":"93","article-title":"Cyber war: The challenge to national security","volume":"4","author":"Caplan","year":"2013","journal-title":"Global Security Studies"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.4324\/9781315807058"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v42i4.15111"},{"key":"ref17","volume-title":"Artificial Intelligence a Modern Approach","author":"Russell","year":"2010"},{"issue":"3","key":"ref18","first-page":"1","article-title":"Artificial intelligence: Structures and strategies for complex problem solving","volume":"9","author":"Khorasani","year":"2008","journal-title":"Scalable Comput.: Pract. Experience"},{"key":"ref19","volume-title":"Neural Networks: A Comprehensive Foundation","author":"Haykin","year":"1998"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-7566-5"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1038\/nature14539"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-2236(99)01439-3"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/BF00130011"},{"key":"ref24","volume-title":"Deep Learning","author":"Goodfellow","year":"2016"},{"key":"ref25","article-title":"ImageNet classification with deep convolutional neural networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"25","author":"Krizhevsky","year":"2012"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-demos.6"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2023.3268724"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1002\/aaai.12149"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01035"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1093\/nsr\/nwac035"},{"key":"ref31","article-title":"Assured Neuro Symbolic Learning and Reasoning (ANSR)","author":"Velasquez","year":"2022"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10070871"},{"key":"ref33","first-page":"279","article-title":"Neuro-symbolic visual reasoning: Disentangling","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Amizadeh","year":"2020"},{"key":"ref34","article-title":"Neuro-symbolic modelling for operational decision support","author":"Voogd","year":"2018"},{"key":"ref35","first-page":"18","article-title":"Artificial intelligence for decision support in command and control systems","volume-title":"Proc. 23rd Int. Command Control Res. & Technol. Symp.","author":"Schubert","year":"2018"},{"key":"ref36","first-page":"623","article-title":"The deep green concept","volume-title":"Proc. Spring Simulation Multiconference","author":"Surdu","year":"2008"},{"key":"ref37","article-title":"Dimensions of neural-symbolic integration-a structured survey","author":"Bader","year":"2005"},{"key":"ref38","first-page":"1","article-title":"Tools for real-time anticipation of enemy actions in tactical ground operations","volume-title":"Proc. 10th Int. Command Control Res. Technol. Symp.","author":"Kott","year":"2005"},{"key":"ref39","volume-title":"Deep Learning","volume":"1","author":"Bengio","year":"2017"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/3905.001.0001"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01389"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v38i4.2745"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-023-06221-2"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v43i1.19122"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.50"},{"key":"ref46","volume-title":"Neural-Symbolic Cognitive Reasoning","author":"Garcez","year":"2008"},{"issue":"1","key":"ref47","article-title":"Neural-symbolic learning and reasoning: A survey and interpretation","volume":"342","author":"Garcez","year":"2022","journal-title":"Neuro-Symbolic Artif. Intell.: State Art"},{"key":"ref48","article-title":"What does explainable AI really mean? A new conceptualization of perspectives","author":"Doran","year":"2017"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488425"},{"issue":"1","key":"ref50","first-page":"17","article-title":"What is a knowledge representation?","volume":"14","author":"Davis","year":"1993","journal-title":"AI Mag."},{"key":"ref51","first-page":"9459","article-title":"Retrieval-augmented generation for knowledge-intensive NLP tasks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Lewis","year":"2020"},{"key":"ref52","article-title":"G-Retriever: Retrieval-augmented generation for textual graph understanding and question answering","author":"He","year":"2024"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2022.3182349"},{"key":"ref54","article-title":"LOCALINTEL: Generating organizational threat intelligence from global local cyber knowledge","author":"Mitra","year":"2024"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2023.3299435"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1982.4308852"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0211-3"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2021.09.022"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-023-10448-w"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.12007"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i05.6264"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i6.16623"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i14.17490"},{"key":"ref64","first-page":"1801","article-title":"Interpretable neural-symbolic concept reasoning","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Barbiero","year":"2023"},{"key":"ref65","article-title":"A Neuro-symbolic approach to argument comparison in structured argumentation","volume-title":"Proc. CEUR Workshop Proc.","volume":"3546","author":"Furman","year":"2023"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.00189"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV48922.2021.01464"},{"key":"ref68","article-title":"Neuro-symbolic AI for scene understanding","author":"Cory","year":"2024"},{"key":"ref69","first-page":"301","article-title":"Doctor AI: Predicting clinical events via recurrent neural networks","volume-title":"Proc. Mach. Learn. Healthcare Conf.","author":"Choi","year":"2016"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.5220\/0010714100003064"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1038\/nrd1468"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1038\/s41746-018-0029-1"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.artmed.2019.101772"},{"key":"ref74","article-title":"Survey on applications of neurosymbolic artificial intelligence","author":"Bouneffouf","year":"2022"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23960-1_10"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2023.3311428"},{"key":"ref77","first-page":"531","article-title":"Active exploration in dynamic environments","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"4","author":"Thrun","year":"1991"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2016.07.002"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-28678-0_6"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2018.2795119"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1017\/S1816383112000768"},{"key":"ref82","article-title":"Meaningful human control in weapon systems","author":"Horowitz","year":"2015"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1038\/nature14542"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1093\/wentk\/9780190235345.001.0001"},{"key":"ref85","article-title":"An introduction to autonomy in weapon systems","author":"Scharre","year":"2015","journal-title":"Center a New Amer. Secur. Work. Paper"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.3389\/frai.2023.1154184"},{"key":"ref87","article-title":"Debating autonomous weapon systems, their ethics, and their regulation under international law","author":"Anderson","year":"2017"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/MRA.2017.2787267"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1163\/15718107-08502001"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/1349822.1349839"},{"key":"ref91","volume-title":"Lethal Autonomous Weapons: Re-examining the Law and Ethics of Robotic Warfare","author":"Galliott","year":"2020"},{"key":"ref92","first-page":"87","article-title":"Non-lethal weaponry: From tactical to strategic applications","volume":"21","author":"Herbert","year":"1999","journal-title":"Joint Forces Quart."},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.37559\/sectec\/20\/ai1"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.21236\/ADA459166"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2024.106292"},{"key":"ref96","volume-title":"Military Applications of Artificial Intelligence","author":"Morgan","year":"2020"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2905565"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1007\/s43681-021-00132-6"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2020.106889"},{"key":"ref100","volume-title":"Moving Target Defense II: Application of Game Theory and Adversarial Modeling","volume":"100","author":"Jajodia","year":"2012"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-06234-7_27"},{"key":"ref102","volume-title":"Artificial Intelligence and the Future of Warfare","author":"Cummings","year":"2017"},{"key":"ref103","article-title":"TAC II: An Expert Knowledge Based System for Tactical Decision Making","author":"Geschke","year":"1983"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2005.1605756"},{"issue":"6","key":"ref105","first-page":"74","article-title":"Enhancing situational understanding through integration of artificial intelligence in tactical headquarters","volume":"102","author":"Scott","year":"2022","journal-title":"Mil. Rev."},{"key":"ref106","first-page":"11","article-title":"Developments in artificial intelligence: Opportunities and challenges for Military modeling and simulation","volume-title":"Proc. NATO M & S Symp.","author":"Fawkes","year":"2017"},{"key":"ref107","article-title":"Artificial intelligence and operational-level planning: An emergent convergence","volume-title":"Monograf\u00eda del la Escuela de Estudios Avanzados Militares, Universidad de Comando y Staff General del Ej\u00e9rcito","author":"Branch","year":"2018"},{"issue":"1","key":"ref108","first-page":"48","article-title":"Autonomous weapon systems and international crises","volume":"12","author":"Leys","year":"2018","journal-title":"Strategic Stud. Quart."},{"key":"ref109","first-page":"1","article-title":"Autonomous weapon systems: A brief survey of developmental, operational, legal, and ethical issues","author":"Caton","year":"2015"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2250126"},{"issue":"2","key":"ref111","first-page":"70","article-title":"Artificial intelligence and ethics: An exercise in the moral imagination","volume":"7","author":"LaChat","year":"1986","journal-title":"AI Mag."},{"issue":"1","key":"ref112","article-title":"The future of wars: Artificial intelligence (AI) and lethal autonomous weapon systems (LAWS) autonomous weapon systems (LAWS)","volume":"2","author":"Pedron","year":"2020","journal-title":"Int. J. Secur. Stud."},{"issue":"1","key":"ref113","article-title":"Command and control: A moral framework for the development of artificial intelligence","volume":"15","author":"Montgomery","year":"2017","journal-title":"ESSAI"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2609777"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-28285-1_6"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1080\/03071847.2020.1752026"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81907-1_3"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-019-0088-2"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287596"},{"key":"ref120","first-page":"1347","article-title":"War torts: Accountability for autonomous weapons","author":"Crootof","year":"2016","journal-title":"Univ. Pennsylvania Law Rev."},{"key":"ref121","article-title":"Autonomous weapons and human responsibilities","volume":"45","author":"Beard","year":"2013","journal-title":"Geo. J. Int\u2019l L."},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1017\/9781009090001"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-019-00146-8"},{"key":"ref124","article-title":"An exploration of maintaining human control in AI enabled systems and the challenges of achieving it","volume-title":"Proc. Workshop Big Data Challenge-Situation Awareness Decis. Support","author":"Boardman","year":"2019"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1007\/s43154-020-00024-3"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287598"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2021.3056293"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1145\/3514094.3534131"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1016\/j.futures.2015.07.009"},{"key":"ref130","volume-title":"Superintelligence: Paths, Dangers, Strategies","author":"Bostrom","year":"2014"},{"key":"ref131","article-title":"The case for regulating fully autonomous weapons","volume":"124","author":"Lewis","year":"2014","journal-title":"Yale LJ"},{"key":"ref132","article-title":"Toward trustworthy AI development: Mechanisms for supporting verifiable claims","author":"Brundage","year":"2020"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1017\/S000305541900073X"},{"key":"ref134","volume-title":"Robots on the Battlefield: Contemporary Perspectives and Implications for the Future","author":"Doar\u00e9","year":"2014"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-020-09528-0"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/654"},{"issue":"3","key":"ref137","first-page":"86","article-title":"Autonomous weapons systems safety","volume":"86","author":"Hall","year":"2017","journal-title":"Joint Force Quart."},{"key":"ref138","first-page":"1","article-title":"Possibilities and challenges for artificial intelligence in military applications","volume-title":"Proc. NATO Big Data Artif. Intell. Mil. Decis. Making Specialists\u2019 Meeting","author":"Svenmarck","year":"2018"},{"key":"ref139","article-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014"},{"key":"ref140","article-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1145\/3302504.3311802"},{"key":"ref142","article-title":"Ensemble adversarial training: Attacks and defenses","author":"Tram\u00e8r","year":"2017"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1080\/15027570.2018.1481907"},{"key":"ref144","first-page":"77","article-title":"Gender shades: Intersectional accuracy disparities in commercial gender classification","volume-title":"Proc. Conf. Fairness, Accountability Transparency","author":"Buolamwini","year":"2018"},{"key":"ref145","volume-title":"Autonomous Weapons Systems: Law, Ethics, Policy","author":"Bhuta","year":"2016"},{"key":"ref146","volume-title":"Reinforcement Learning: An Introduction","author":"Sutton","year":"2018"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2831228"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1038\/nature14236"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1145\/3236386.3241340"},{"key":"ref151","article-title":"Human-AI collaboration in decision-making: beyond learning to defer","author":"Leit\u223cao","year":"2022"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00679"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-98464-9_1"},{"key":"ref154","article-title":"Air force research laboratory test and evaluation, verification and validation of autonomous systems challenge exploration","author":"Clark","year":"2014"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.2024.3351798"},{"key":"ref156","first-page":"1","article-title":"Human-AI cooperation to benefit military decision making","volume-title":"Proc. NATO IST-160 Specialist\u2019 meeting on Big Data and Artificial Intell. for Military Decision Making","author":"Bosch","year":"2018"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1145\/3514257"},{"key":"ref158","article-title":"Regulating explainable AI in the European Union. An Overview of the current legal framework (s)","author":"Ebers","year":"2020","journal-title":"in Nordic Yearbook of Law and Informatics 2020: Law in the Era of Artificial Intelligence"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1093\/law\/9780198744627.001.0001"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1002\/rcs.1968"}],"container-title":["IEEE Transactions on Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/9078688\/10794552\/10638797.pdf?arnumber=10638797","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T01:09:31Z","timestamp":1755911371000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10638797\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":160,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tai.2024.3444746","relation":{},"ISSN":["2691-4581"],"issn-type":[{"value":"2691-4581","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]}}}