{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T19:27:22Z","timestamp":1775503642339,"version":"3.50.1"},"reference-count":57,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Key R&D Program of Zhejiang","award":["2022C01018"],"award-info":[{"award-number":["2022C01018"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U21B2001"],"award-info":[{"award-number":["U21B2001"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61973273"],"award-info":[{"award-number":["61973273"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004731","name":"Zhejiang Provincial Natural Science Foundation of China","doi-asserted-by":"publisher","award":["LR19F030001"],"award-info":[{"award-number":["LR19F030001"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Major Key Project of PCL","award":["PCL2022A03"],"award-info":[{"award-number":["PCL2022A03"]}]},{"name":"Major Key Project of PCL","award":["PCL2021A02"],"award-info":[{"award-number":["PCL2021A02"]}]},{"name":"Major Key Project of PCL","award":["PCL2021A09"],"award-info":[{"award-number":["PCL2021A09"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cogn. Commun. Netw."],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1109\/tccn.2023.3329000","type":"journal-article","created":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T18:27:08Z","timestamp":1698863228000},"page":"442-453","source":"Crossref","is-referenced-by-count":26,"title":["Channel Pruning Method for Signal Modulation Recognition Deep Learning Models"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8736-8814","authenticated-orcid":false,"given":"Zhuangzhi","family":"Chen","sequence":"first","affiliation":[{"name":"Institute of Cyberspace Security and the College of Computer Science and Engineering, Zhejiang University of Technology, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-1901-6289","authenticated-orcid":false,"given":"Zhangwei","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Cyberspace Security, Zhejiang University of Technology, Hangzhou, China"}]},{"given":"Xuzhang","family":"Gao","sequence":"additional","affiliation":[{"name":"Institute of Cyberspace Security, Zhejiang University of Technology, Hangzhou, China"}]},{"given":"Jinchao","family":"Zhou","sequence":"additional","affiliation":[{"name":"Institute of Cyberspace Security, Zhejiang University of Technology, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2693-922X","authenticated-orcid":false,"given":"Dongwei","family":"Xu","sequence":"additional","affiliation":[{"name":"Institute of Cyberspace Security, Zhejiang University of Technology, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3089-4346","authenticated-orcid":false,"given":"Shilian","family":"Zheng","sequence":"additional","affiliation":[{"name":"Science and Technology on Communication Information Security Control Laboratory, Jiaxing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1042-470X","authenticated-orcid":false,"given":"Qi","family":"Xuan","sequence":"additional","affiliation":[{"name":"Institute of Cyberspace Security, College of Information Engineering, Zhejiang University of Technology, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3117-2211","authenticated-orcid":false,"given":"Xiaoniu","family":"Yang","sequence":"additional","affiliation":[{"name":"Science and Technology on Communication Information Security Control Laboratory, Jiaxing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1089\/brain.2017.0561"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2925569"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2900460"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1515\/bpasts-2016-0028"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2018.12.019"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/DySPAN.2017.7920749"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2017.01.005"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2016.08.001"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2018.2885684"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2017.2784394"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2016.2602884"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2018.2797022"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44188-7_16"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2021.3120997"},{"key":"ref15","article-title":"Deep learning for cooperative radio signal classification","author":"Zheng","year":"2019","journal-title":"arXiv:1909.06031"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2020.3018736"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/3897.001.0001"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1996.10484565"},{"key":"ref19","article-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009"},{"key":"ref20","article-title":"Very deep convolutional networks for large-scale image recognition","author":"Simonyan","year":"2014","journal-title":"arXiv:1409.1556"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.07.045"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11060945"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-021-01453-z"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/72.248452"},{"key":"ref26","first-page":"129","article-title":"What is the state of neural network pruning?","volume-title":"Proc. Mach. Learn. Syst.","volume":"2","author":"Blalock"},{"key":"ref27","article-title":"Emerging paradigms of neural network pruning","author":"Wang","year":"2021","journal-title":"arXiv:2103.06460"},{"key":"ref28","first-page":"1135","article-title":"Learning both weights and connections for efficient neural network","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"28","author":"Han"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00890"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.l803.03635"},{"key":"ref31","first-page":"3592","article-title":"Deconstructing lottery tickets: Zeros, signs, and the supermask","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"32","author":"Zhou"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.541"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00915"},{"key":"ref34","first-page":"7021","article-title":"Group Fisher pruning for practical network compression","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Liu"},{"key":"ref35","article-title":"Rethinking the value of network pruning","author":"Liu","year":"2018","journal-title":"arXiv:1810.05270"},{"key":"ref36","article-title":"Pruning filters for efficient CONVNETs","author":"Li","year":"2016","journal-title":"arXiv:1608.08710"},{"key":"ref37","article-title":"Pruning convolutional neural networks for resource efficient inference","author":"Molchanov","year":"2016","journal-title":"arXiv:1611.06440"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00160"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/309"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01270-0_19"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00290"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00447"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.298"},{"key":"ref44","first-page":"9865","article-title":"Neuron-level structured pruning using polarization regularizer","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Zhuang"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2020\/94"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.03.082"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92310-5_37"},{"key":"ref48","article-title":"Apprentice: Using knowledge distillation techniques to improve low-precision network accuracy","author":"Mishra","year":"2017","journal-title":"arXiv:1711.05852"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i9.16950"},{"key":"ref50","first-page":"6","article-title":"Radio machine learning dataset generation with GNU radio","volume-title":"Proc. GNU Radio Conf.","volume":"1","author":"O\u2019shea"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.3390\/s21196601"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2017.2758370"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2017.8335483"},{"key":"ref54","article-title":"Comparing rewinding and fine-tuning in neural network pruning","author":"Renda","year":"2020","journal-title":"arXiv:2003.02389"},{"key":"ref55","article-title":"Network pruning that matters: A case study on retraining variants","author":"Le","year":"2021","journal-title":"arXiv:2105.03193"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3084206"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3156047"}],"container-title":["IEEE Transactions on Cognitive Communications and Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6687307\/10494818\/10304321.pdf?arnumber=10304321","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T04:37:00Z","timestamp":1725165420000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10304321\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4]]},"references-count":57,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tccn.2023.3329000","relation":{},"ISSN":["2332-7731","2372-2045"],"issn-type":[{"value":"2332-7731","type":"electronic"},{"value":"2372-2045","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4]]}}}