{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T21:36:36Z","timestamp":1773092196066,"version":"3.50.1"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research, Air Force Materiel Command, USAF","doi-asserted-by":"publisher","award":["FA9550-15-1-0025"],"award-info":[{"award-number":["FA9550-15-1-0025"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research, Air Force Materiel Command, USAF","doi-asserted-by":"publisher","award":["FA9550-19-1-7002"],"award-info":[{"award-number":["FA9550-19-1-7002"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cybern."],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1109\/tcyb.2020.3002892","type":"journal-article","created":{"date-parts":[[2020,7,8]],"date-time":"2020-07-08T20:22:29Z","timestamp":1594239749000},"page":"1947-1959","source":"Crossref","is-referenced-by-count":31,"title":["A Developmental Cognitive Architecture for Trust and Theory of Mind in Humanoid Robots"],"prefix":"10.1109","volume":"52","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9500-6899","authenticated-orcid":false,"given":"Massimiliano","family":"Patacchiola","sequence":"first","affiliation":[{"name":"School of Informatics, University of Edinburgh, Edinburgh, U.K."}]},{"given":"Angelo","family":"Cangelosi","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Manchester, Manchester, U.K."}]}],"member":"263","reference":[{"key":"ref1","first-page":"17","article-title":"Automation, algorithms, and politics| talking to bots: Symbiotic agency and the case of tay","volume":"10","author":"Neff","year":"2016","journal-title":"Int. J. Commun."},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1037\/14646-000","volume-title":"APA Dictionary of Psychology","author":"VandenBos","year":"2015"},{"key":"ref3","volume-title":"Childhood and Society: 1963","author":"Erikson","year":"1950"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-6494.1967.tb01454.x"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-017-3614-5_3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jecp.2011.06.008"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1111\/cogs.12471"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1017\/s0140525x00076512"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TAMD.2010.2087020"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DEVLRN.2016.7846801"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/9320.001.0001","volume-title":"Developmental Robotics, From Babies to Robots","author":"Cangelosi","year":"2015"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1774674.1774683"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/HRI.2016.7451847"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s12369-019-00549-4"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0225028"},{"key":"ref16","first-page":"449","article-title":"Do humans imitate robots? An investigation of strategic social learning in human\u2013robot interaction","volume-title":"Proc. ACM\/IEEE Int. Conf. Human\u2013Robot Interact.","author":"Zanatto"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-011-9277-z"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-004-0041-5"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1080\/08839510050127579"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1006\/game.1995.1027"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2016.2634027"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1177\/0018720811417254"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3389\/neuro.07.011.2007"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuroimage.2004.10.002"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1126\/science.1108062"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.neuro.29.051605.112903"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1038\/nn1575"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1126\/science.1115270"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1038\/nn1954"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.conb.2006.03.001"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1038\/nrn1884"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1126\/science.1169694"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.7554\/elife.20944.012"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8624.2005.00849.x"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8624.2011.01629.x"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/7289.001.0001"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1037\/0012-1649.37.5.620"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1207\/s15516709cog2803_1"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-7687.2012.01135.x"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s12369-008-0003-1"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1613\/jair.301"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.21236\/ada440280"},{"key":"ref43","volume-title":"Reinforcement Learning: An Introduction","author":"Sutton","year":"2011"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/BF00337288"},{"key":"ref45","first-page":"2450","article-title":"Recurrent world models facilitate policy evolution","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Ha"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/IROS40897.2019.8967834"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.111.1.3"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1177\/0956797610376652"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.06.009"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1098\/rstb.2018.0032"}],"container-title":["IEEE Transactions on Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221036\/9733099\/09136927.pdf?arnumber=9136927","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T22:34:26Z","timestamp":1704839666000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9136927\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3]]},"references-count":50,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tcyb.2020.3002892","relation":{},"ISSN":["2168-2267","2168-2275"],"issn-type":[{"value":"2168-2267","type":"print"},{"value":"2168-2275","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3]]}}}