{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T16:09:04Z","timestamp":1770739744279,"version":"3.49.0"},"reference-count":54,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Major Science and Technology Project for Intelligent Manufacturing Systems and Robotics of China","award":["2025ZD1602400"],"award-info":[{"award-number":["2025ZD1602400"]}]},{"DOI":"10.13039\/501100013076","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020YFB1711200"],"award-info":[{"award-number":["2020YFB1711200"]}],"id":[{"id":"10.13039\/501100013076","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010002","name":"China Scholarship Council Program","doi-asserted-by":"publisher","award":["202406230244"],"award-info":[{"award-number":["202406230244"]}],"id":[{"id":"10.13039\/100010002","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Ministry of Education Grant, Singapore","award":["RG62\/22"],"award-info":[{"award-number":["RG62\/22"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Green Commun. Netw."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/tgcn.2026.3657723","type":"journal-article","created":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T21:01:02Z","timestamp":1769634062000},"page":"1967-1979","source":"Crossref","is-referenced-by-count":0,"title":["Learning Decomposition Optimization for WAN Traffic Engineering With Graph Attention Networks"],"prefix":"10.1109","volume":"10","author":[{"given":"Pengcheng","family":"Luo","sequence":"first","affiliation":[{"name":"Ningbo Artificial Intelligence Institute, Shanghai Jiao Tong University, Ningbo, China"}]},{"given":"Yufeng","family":"Tian","sequence":"additional","affiliation":[{"name":"Ningbo Artificial Intelligence Institute, Shanghai Jiao Tong University, Ningbo, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3253-9137","authenticated-orcid":false,"given":"Mingfeng","family":"Xie","sequence":"additional","affiliation":[{"name":"College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3492-0211","authenticated-orcid":false,"given":"Genke","family":"Yang","sequence":"additional","affiliation":[{"name":"Ningbo Artificial Intelligence Institute, Shanghai Jiao Tong University, Ningbo, China"}]},{"given":"Jian","family":"Chu","sequence":"additional","affiliation":[{"name":"Ningbo Artificial Intelligence Institute, Shanghai Jiao Tong University, Ningbo, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8998-4637","authenticated-orcid":false,"given":"Boon-Hee","family":"Soong","sequence":"additional","affiliation":[{"name":"School of Electrical and Electronic Engineering, Nanyang Technological University, Jurong West, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9307-2120","authenticated-orcid":false,"given":"Chau","family":"Yuen","sequence":"additional","affiliation":[{"name":"School of Electrical and Electronic Engineering, Nanyang Technological University, Jurong West, Singapore"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2023.3295341"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2400428"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2022.3175901"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2018.2832658"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110600"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2018.2837618"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3528955"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3603269.3604857"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110509"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.1609.02907"},{"key":"ref11","article-title":"Graph attention networks","author":"Veli\u010dkovi\u0107","year":"2017","journal-title":"arXiv:1710.10903"},{"key":"ref12","article-title":"How attentive are graph attention networks?","author":"Brody","year":"2021","journal-title":"arXiv:2105.14491"},{"key":"ref13","first-page":"1024","article-title":"Inductive representation learning on large graphs","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Hamilton"},{"key":"ref14","first-page":"11960","article-title":"Graph transformer networks","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"32","author":"Yun"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2022.3193849"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2025.3568248"},{"key":"ref17","volume-title":"Gurobi Optimizer Reference Manual","year":"2023"},{"key":"ref18","first-page":"1","article-title":"The CP-SAT-LP solver","volume-title":"Proc. 29th Int. Conf. Princ. Pract. Constraint Program.","volume":"280","author":"Perron"},{"key":"ref19","volume-title":"Optimization Modeling With LINGO","author":"Schrage","year":"2006"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1137\/S0895480199355754"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539704446232"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1328911.1328924"},{"key":"ref23","volume-title":"Potential Function Methods for Approximately Solving Linear Programming Problems: Theory and Practice","volume":"53","author":"Bienstock","year":"2006"},{"key":"ref24","first-page":"175","article-title":"Contracting wide-area network topologies to solve flow problems quickly","volume-title":"Proc. 18th USENIX Symp. Networked Syst. Design Implement.","author":"Abuzaid"},{"key":"ref25","volume-title":"Introduction to Linear Optimization","volume":"6","author":"Bertsimas","year":"1997"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.70.066111"},{"key":"ref29","first-page":"849","article-title":"On spectral clustering: Analysis and an algorithm","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"14","author":"Ng"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483588"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1561\/9781601984616"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3000371"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/BF00992696"},{"key":"ref34","first-page":"1057","article-title":"Policy gradient methods for reinforcement learning with function approximation","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"12","author":"Sutton"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486012"},{"key":"ref36","first-page":"325","article-title":"Decentralized cloud wide-area network traffic engineering with BLASTSHIELD","volume-title":"Proc. 19th USENIX Symp. Networked Syst. Design Implement.","author":"Krishnaswamy"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i8.26120"},{"key":"ref38","article-title":"Empirical evaluation of rectified activations in convolutional network","author":"Xu","year":"2015","journal-title":"arXiv:1505.00853"},{"issue":"1","key":"ref39","first-page":"1929","article-title":"Dropout: A simple way to prevent neural networks from overfitting","volume":"15","author":"Srivastava","year":"2014","journal-title":"J. Mach. Learn. Res."},{"key":"ref40","article-title":"Fast and accurate deep network learning by exponential linear units (ELUs)","author":"Clevert","year":"2015","journal-title":"arXiv:1511.07289"},{"key":"ref41","article-title":"Proximal policy optimization algorithms","author":"Schulman","year":"2017","journal-title":"arXiv:1707.06347"},{"key":"ref42","article-title":"Continuous control with deep reinforcement learning","author":"Lillicrap","year":"2015","journal-title":"arXiv:1509.02971"},{"key":"ref43","first-page":"1928","article-title":"Asynchronous methods for deep reinforcement learning","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Mnih"},{"key":"ref44","article-title":"Dota 2 with large scale deep reinforcement learning","author":"Berner","year":"2019","journal-title":"arXiv:1912.06680"},{"key":"ref45","first-page":"27730","article-title":"Training language models to follow instructions with human feedback","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Ouyang"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2021.1975057"},{"key":"ref47","article-title":"Unity: A general platform for intelligent agents","author":"Juliani","year":"2018","journal-title":"arXiv:1809.02627"},{"key":"ref48","volume-title":"The CAIDA As Relationships Dataset","year":"2022"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.111002"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787471"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1039866"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.110071"},{"issue":"268","key":"ref53","first-page":"1","article-title":"Stable-baselines3: Reliable reinforcement learning implementations","volume":"22","author":"Raffin","year":"2021","journal-title":"J. Mach. Learn. Res."},{"issue":"86","key":"ref54","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"Maaten","year":"2008","journal-title":"J. Mach. Learn. Res."}],"container-title":["IEEE Transactions on Green Communications and Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/7511293\/11306373\/11363613.pdf?arnumber=11363613","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T21:09:42Z","timestamp":1770671382000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11363613\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":54,"URL":"https:\/\/doi.org\/10.1109\/tgcn.2026.3657723","relation":{},"ISSN":["2473-2400"],"issn-type":[{"value":"2473-2400","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}