{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T09:42:26Z","timestamp":1766137346280,"version":"3.37.3"},"reference-count":51,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund","doi-asserted-by":"publisher","award":["TIN2016-75850-P"],"award-info":[{"award-number":["TIN2016-75850-P"]}],"id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100018647","name":"RUDN University Program","doi-asserted-by":"publisher","award":["5-100"],"award-info":[{"award-number":["5-100"]}],"id":[{"id":"10.13039\/501100018647","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cybern."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1109\/tcyb.2019.2958616","type":"journal-article","created":{"date-parts":[[2020,1,7]],"date-time":"2020-01-07T18:35:24Z","timestamp":1578422124000},"page":"5706-5716","source":"Crossref","is-referenced-by-count":4,"title":["Game-Theoretic Learning for Sensor Reliability Evaluation Without Knowledge of the Ground Truth"],"prefix":"10.1109","volume":"51","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7591-1659","authenticated-orcid":false,"given":"Anis","family":"Yazidi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9429-7148","authenticated-orcid":false,"given":"Hugo L.","family":"Hammer","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6368-9680","authenticated-orcid":false,"given":"Konstantin","family":"Samouylov","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7922-4984","authenticated-orcid":false,"given":"Enrique Enrique","family":"Herrera-Viedma","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1007\/978-94-010-0324-7_25"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1016\/S1389-1286(00)00090-6"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/3477.931507"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/HPDC.1993.263840"},{"year":"1973","author":"tsetlin","journal-title":"Automaton Theory and the Modeling of Biological Systems","key":"ref31"},{"year":"2003","author":"thathachar","journal-title":"Networks of Learning Automata Techniques for Online Stochastic Optimization","key":"ref30"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/12.862220"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1002\/dac.684"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/TAC.1973.1100406"},{"key":"ref34","first-page":"24","article-title":"Discretized reward-inaction learning automata","volume":"2","author":"thathachar","year":"1979","journal-title":"J Cybern Inf Sci"},{"year":"1989","author":"narendra","journal-title":"Learning Automata An Introduction","key":"ref28"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/TSMCB.2005.863379"},{"year":"1997","author":"poznyak","journal-title":"Learning Automata and Stochastic Optimization","key":"ref29"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1016\/j.inffus.2017.03.006"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1016\/j.inffus.2016.09.005"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1016\/j.knosys.2017.09.001"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/TVT.2017.2715328"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/TSMCB.2002.1049608"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/TVT.2017.2740724"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/TVT.2018.2789344"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.3390\/s17040922"},{"key":"ref25","article-title":"A distributed learning&#x2013;based user association for heterogeneous networks","volume":"28","author":"arani","year":"2017","journal-title":"Trans Emerg Telecommun Technol"},{"doi-asserted-by":"publisher","key":"ref50","DOI":"10.1109\/TC.2009.189"},{"doi-asserted-by":"publisher","key":"ref51","DOI":"10.1109\/21.293490"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TSMC.2013.2259155"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/TFUZZ.2017.2718484"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/TSMCC.2003.817354"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1201\/9781420053098"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1016\/j.ces.2015.03.038"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/TCYB.2016.2552979"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/TSMCB.2006.872269"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1016\/j.dss.2004.04.015"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/TCYB.2015.2462352"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1016\/S0167-9236(99)00084-6"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.2307\/2348873"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1016\/j.knosys.2017.03.011"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1016\/j.knosys.2016.01.023"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/19.982977"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.9781\/ijimai.2017.435"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1007\/978-1-4419-9326-7_1"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1016\/j.inffus.2015.06.001"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1109\/TSMCB.2002.1049615"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1002\/int.21954"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1109\/TSMC.2015.2406764"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1007\/s11277-011-0387-3"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1109\/MWC.2011.5751299"},{"doi-asserted-by":"publisher","key":"ref47","DOI":"10.1109\/TCOMM.2003.809788"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1145\/7529.8927"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1109\/34.506793"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1109\/TNSM.2014.011614.130429"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1007\/s10489-011-0280-5"}],"container-title":["IEEE Transactions on Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221036\/9660196\/08950083.pdf?arnumber=8950083","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:53:30Z","timestamp":1652194410000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8950083\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":51,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tcyb.2019.2958616","relation":{},"ISSN":["2168-2267","2168-2275"],"issn-type":[{"type":"print","value":"2168-2267"},{"type":"electronic","value":"2168-2275"}],"subject":[],"published":{"date-parts":[[2021,12]]}}}