{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:01:01Z","timestamp":1775228461096,"version":"3.50.1"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T00:00:00Z","timestamp":1696118400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T00:00:00Z","timestamp":1696118400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,1]],"date-time":"2023-10-01T00:00:00Z","timestamp":1696118400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Science Fund for Outstanding Young Scholars","award":["62122093"],"award-info":[{"award-number":["62122093"]}]},{"DOI":"10.13039\/501100007085","name":"Scientific Key Research Project of National University of Defense Technology","doi-asserted-by":"publisher","award":["ZZKY-ZX-11-04"],"award-info":[{"award-number":["ZZKY-ZX-11-04"]}],"id":[{"id":"10.13039\/501100007085","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["72071205"],"award-info":[{"award-number":["72071205"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Evol. Computat."],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1109\/tevc.2022.3199045","type":"journal-article","created":{"date-parts":[[2022,8,15]],"date-time":"2022-08-15T15:58:05Z","timestamp":1660579085000},"page":"1260-1274","source":"Crossref","is-referenced-by-count":50,"title":["Hybridization of Evolutionary Algorithm and Deep Reinforcement Learning for Multiobjective Orienteering Optimization"],"prefix":"10.1109","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6526-6526","authenticated-orcid":false,"given":"Wei","family":"Liu","sequence":"first","affiliation":[{"name":"College of System Engineering and the Hunan Key Laboratory of Multi-Energy System Intelligent Interconnection Technology, National University of Defense Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9048-2979","authenticated-orcid":false,"given":"Rui","family":"Wang","sequence":"additional","affiliation":[{"name":"College of System Engineering and the Hunan Key Laboratory of Multi-Energy System Intelligent Interconnection Technology, National University of Defense Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0432-2942","authenticated-orcid":false,"given":"Tao","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of System Engineering and the Hunan Key Laboratory of Multi-Energy System Intelligent Interconnection Technology, National University of Defense Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1550-5987","authenticated-orcid":false,"given":"Kaiwen","family":"Li","sequence":"additional","affiliation":[{"name":"College of System Engineering and the Hunan Key Laboratory of Multi-Energy System Intelligent Interconnection Technology, National University of Defense Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5657-7384","authenticated-orcid":false,"given":"Wenhua","family":"Li","sequence":"additional","affiliation":[{"name":"College of System Engineering and the Hunan Key Laboratory of Multi-Energy System Intelligent Interconnection Technology, National University of Defense Technology, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9186-6472","authenticated-orcid":false,"given":"Hisao","family":"Ishibuchi","sequence":"additional","affiliation":[{"name":"Guangdong Provincial Key Laboratory of Brain-Inspired Intelligent Computation and the Department of Computer Science and Engineering, Southern University of Science and Technology, Shenzhen, China"}]},{"given":"Xiangke","family":"Liao","sequence":"additional","affiliation":[{"name":"Collaborative Innovation Center of High Performance Computing, National University of Defense Technology, Changsha, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.trb.2019.03.005"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2022.105882"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SSRR.2014.7017670"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2013.6496959"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/1520-6750(198706)34:3<307::AID-NAV3220340302>3.0.CO;2-D"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/0166-218X(90)90100-Q"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1287\/ijoc.4.2.155"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/0377-2217(94)90247-X"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2010.03.045"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2016.04.059"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/4235.996017"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2007.892759"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11721-009-0029-5"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2014.06.042"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2017.01.009"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2018.05.005"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3205455.3205548"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2016.03.053"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2016.2600642"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12598-1_14"},{"issue":"11","key":"ref21","first-page":"2521","article-title":"Research reviews of combinatorial optimization methods based on deep reinforcement learning","volume":"47","author":"Kai-Wen","year":"2021","journal-title":"Acta Automatica Sinica"},{"key":"ref22","article-title":"Neural combinatorial optimization with reinforcement learning","author":"Bello","year":"2016","journal-title":"arXiv:1611.09940"},{"key":"ref23","article-title":"Pointer networks","author":"Vinyals","year":"2015","journal-title":"arXiv:1506.03134"},{"key":"ref24","article-title":"Reinforcement learning for solving the vehicle routing problem","author":"Nazari","year":"2018","journal-title":"arXiv:1802.04240"},{"key":"ref25","article-title":"Attention, learn to solve routing problems!","author":"Kool","year":"2018","journal-title":"arXiv:1803.08475"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2020.2977661"},{"key":"ref27","article-title":"Pareto set learning for neural multi-objective combinatorial optimization","author":"Lin","year":"2022","journal-title":"arXiv:2203.15386"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2021.3098354"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.23919\/CSMS.2021.0027"},{"key":"ref30","volume-title":"Gurobi Optimizer Reference Manual","year":"2018"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44719-9_6"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2014.2373386"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2013.2281535"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2006.1688440"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2018.2791283"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2021.105357"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/4235.797969"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1179"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/BF00992696"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CoDIT.2017.8102710"},{"key":"ref41","article-title":"Adam: A method for stochastic optimization","author":"Kingma","year":"2014","journal-title":"arXiv:1412.6980"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2020.106808"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2014.2378512"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2022.101081"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2022.101119"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3105937"}],"container-title":["IEEE Transactions on Evolutionary Computation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4235\/10269088\/09858094.pdf?arnumber=9858094","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T18:28:01Z","timestamp":1762885681000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9858094\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10]]},"references-count":46,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tevc.2022.3199045","relation":{},"ISSN":["1089-778X","1089-778X","1941-0026"],"issn-type":[{"value":"1089-778X","type":"print"},{"value":"1089-778X","type":"print"},{"value":"1941-0026","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10]]}}}