{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T05:20:36Z","timestamp":1768281636354,"version":"3.49.0"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62331009"],"award-info":[{"award-number":["62331009"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cogn. Commun. Netw."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/tccn.2025.3635651","type":"journal-article","created":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T18:44:40Z","timestamp":1763750680000},"page":"4433-4447","source":"Crossref","is-referenced-by-count":0,"title":["Toward Communication\u2013Computation Integrated Architectures for AI-Agent Communication Networks"],"prefix":"10.1109","volume":"12","author":[{"given":"Shuting","family":"Liu","sequence":"first","affiliation":[{"name":"National Key Laboratory of Science and Technology on Communications, University of Electronic Science and Technology of China, Chengdu, China"}]},{"given":"Peizhi","family":"Lei","sequence":"additional","affiliation":[{"name":"National Key Laboratory of Science and Technology on Communications, University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1465-6708","authenticated-orcid":false,"given":"Luping","family":"Xiang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Novel Software Technology, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-1979-4420","authenticated-orcid":false,"given":"Kun","family":"Yang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Novel Software Technology, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1265-0775","authenticated-orcid":false,"given":"Jienan","family":"Chen","sequence":"additional","affiliation":[{"name":"National Key Laboratory of Science and Technology on Communications, University of Electronic Science and Technology of China, Chengdu, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1900271"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.008.2200510"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2300550"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2300364"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.015.2300404"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.011.2200356"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.016.2300600"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900292"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.002.2100972"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2300724"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2022.3186404"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2021.3085965"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1706.03762"},{"key":"ref14","first-page":"27730","article-title":"Training language models to follow instructions with human feedback","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NIPS)","author":"Ouyang"},{"key":"ref15","article-title":"An image is worth 16\u00d716 words: Transformers for image recognition at scale","author":"Dosovitskiy","year":"2020","journal-title":"arXiv:2010.11929"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8462506"},{"key":"ref17","article-title":"Generating long sequences with sparse transformers","author":"Child","year":"2019","journal-title":"arXiv:1904.10509"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D18-1317"},{"key":"ref19","first-page":"10524","article-title":"On layer normalization in the transformer architecture","volume-title":"Proc. Int. Conf. Mach. Learn. (ICML)","author":"Xiong"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2023.127063"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.243"},{"key":"ref23","article-title":"Inception-ResNet and the impact of residual connections on learning","author":"Szegedy","year":"2016","journal-title":"arXiv:1602.07261"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.5244\/C.30.87"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.5555\/3045118.3045167"},{"key":"ref26","article-title":"MobileNets: Efficient convolutional neural networks for mobile vision applications","author":"Howard","year":"2017","journal-title":"arXiv:1704.04861"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00474"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00293"},{"key":"ref29","first-page":"6105","article-title":"EfficientNet: Rethinking model scaling for convolutional neural networks","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Tan"},{"key":"ref30","article-title":"Scaling laws for neural language models","author":"Kaplan","year":"2020","journal-title":"arXiv:2001.08361"},{"key":"ref31","first-page":"331","article-title":"Markov decision processes","volume-title":"Handbooks in Operations Research and Management Science","author":"Puterman","year":"1990"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TCPMT.2024.3477973"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1214\/ss\/1177011137"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2754552"},{"key":"ref35","article-title":"Proximal policy optimization algorithms","author":"Schulman","year":"2017","journal-title":"arXiv:1707.06347"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2019.2918242"},{"key":"ref37","article-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2022.3182483"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2024.3350661"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2019.2959402"}],"container-title":["IEEE Transactions on Cognitive Communications and Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6687307\/11304002\/11263891.pdf?arnumber=11263891","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T22:03:47Z","timestamp":1768255427000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11263891\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/tccn.2025.3635651","relation":{},"ISSN":["2332-7731","2372-2045"],"issn-type":[{"value":"2332-7731","type":"electronic"},{"value":"2372-2045","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}