{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T12:07:47Z","timestamp":1771330067847,"version":"3.50.1"},"reference-count":67,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Advanced Connectivity & System Integration Research Group, Digital Aviation Research and Technology Centre (DARTeC), Cranfield University"},{"name":"U.K. Department of Transport (DfT) and Home Office and Contributions from the NCC Group under the Programme of Future Aviation Security Solutions Industrial Ph.D. Partnerships"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Intell. Transport. Syst."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1109\/tits.2024.3463189","type":"journal-article","created":{"date-parts":[[2024,10,4]],"date-time":"2024-10-04T13:38:41Z","timestamp":1728049121000},"page":"17304-17320","source":"Crossref","is-referenced-by-count":5,"title":["Federated Deep Reinforcement Learning-Based Intelligent Surface Configuration in 6G Secure Airport Networks"],"prefix":"10.1109","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-0515-0239","authenticated-orcid":false,"given":"Yang","family":"Chen","sequence":"first","affiliation":[{"name":"School of Aerospace, Transport, and Manufacturing (SATM), Cranfield University, Milton Keynes, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3293-904X","authenticated-orcid":false,"given":"Saba","family":"Al-Rubaye","sequence":"additional","affiliation":[{"name":"School of Aerospace, Transport, and Manufacturing (SATM), Cranfield University, Milton Keynes, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3966-7633","authenticated-orcid":false,"given":"Antonios","family":"Tsourdos","sequence":"additional","affiliation":[{"name":"School of Aerospace, Transport, and Manufacturing (SATM), Cranfield University, Milton Keynes, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4138-0268","authenticated-orcid":false,"given":"Kai-Fung","family":"Chu","sequence":"additional","affiliation":[{"name":"Department of Engineering, University of Cambridge, Cambridge, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8073-7859","authenticated-orcid":false,"given":"Zhuangkun","family":"Wei","sequence":"additional","affiliation":[{"name":"Department of Computing, Imperial College London, London, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-3292-8134","authenticated-orcid":false,"given":"Lawrence","family":"Baker","sequence":"additional","affiliation":[{"name":"NCC Group, Manchester, U.K."}]},{"given":"Colin","family":"Gillingham","sequence":"additional","affiliation":[{"name":"NCC Group, Manchester, U.K."}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/tcomm.2021.3051897"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2021.3133272"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2022.3196097"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2023.3288248"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/tcomm.2021.3063236"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2022.3180787"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2020.3000835"},{"key":"ref8","volume-title":"Reinforcement Learning: An Introduction","author":"Sutton","year":"2018"},{"key":"ref9","first-page":"3482","article-title":"Gradient temporal-difference learning with regularized corrections","volume-title":"Proc. 37th Int. Conf. Mach. Learn.","author":"Ghiassian"},{"key":"ref10","first-page":"1","article-title":"A generalized projected Bellman error for off-policy value estimation in reinforcement learning","volume":"23","author":"Patterson","year":"2021","journal-title":"J. Mach. Learn. Res."},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2022.3213503"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.001.2200204"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2022.3218772"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1561\/2200000083"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.001.1900506"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2023.3301710"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2023.3263631"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"ref19","first-page":"17455","article-title":"Differentially private learning with adaptive clipping","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"21","author":"Andrew"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr52688.2022.00988"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2022.3189361"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr52729.2023.02352"},{"key":"ref23","first-page":"113","article-title":"Truly proximal policy optimization","volume-title":"Proc. Uncertainty Artif. Intell.","author":"Wang"},{"key":"ref24","first-page":"1046","article-title":"Optimal algorithms for mean estimation under local differential privacy","volume-title":"Proc. Int. Conf. Mach. Learn.","volume":"162","author":"Asi"},{"key":"ref25","first-page":"8787","article-title":"Decoupling value and policy for generalization in reinforcement learning","volume-title":"Proc. Int. Conf. Mach. Learn.","volume":"139","author":"Raileanu"},{"key":"ref26","first-page":"26048","article-title":"Understanding clipping for federated learning: Convergence and client-level differential privacy","volume-title":"Proc. Int. Conf. Mach. Learn.","volume":"162","author":"Zhang"},{"key":"ref27","article-title":"Learning differentially private recurrent language models","volume-title":"Proc. 6th Int. Conf. Learn. Represeny.","author":"McMahan"},{"key":"ref28","first-page":"1","article-title":"Empirical risk minimization in the non-interactive local model of differential privacy","volume":"21","author":"Wang","year":"2020","journal-title":"J. Mach. Learn. Res."},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553501"},{"key":"ref30","first-page":"1809","article-title":"SBEED: Convergent reinforcement learning with nonlinear function approximation","volume-title":"Proc. 35th Int. Conf. Mach. Learn.","volume":"3","author":"Dai"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1137\/s0363012997331639"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/tsp.2021.3075146"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/bigdata50022.2020.9378171"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2020.2988575"},{"key":"ref36","first-page":"6277","article-title":"Privacy amplification by subsampling: Tight analyses via couplings and divergences","volume-title":"Proc. Neural Inf. Process. Syst. (NIPS)","author":"Balle"},{"key":"ref37","first-page":"5088","article-title":"SCAFFOLD: Stochastic controlled averaging for federated learning","volume-title":"Proc. 37th Int. Conf. Mach. Learn.","author":"Karimireddy"},{"key":"ref38","article-title":"On the convergence of FedAvg on non-IID data","volume-title":"Proc. 8th Int. Conf. Learn. Represent.","author":"Li"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2021.3131595"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/tcomm.2022.3182369"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2022.3204571"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/tsp.2023.3297049"},{"key":"ref43","first-page":"429","article-title":"Federated optimization in heterogeneous networks","volume-title":"Proc. Conf. Mach. Learn. Syst.","author":"Sahu"},{"key":"ref44","first-page":"2022","article-title":"Practical challenges in differentially-private federated survival analysis of medical data","volume-title":"Proc. Conf. Health, Inference, Learn.","volume":"174","author":"Rahimian"},{"key":"ref45","first-page":"534","volume-title":"Convex Analysis and Optimization","author":"Bertsekas","year":"2003"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.23919\/jcc.ea.2021-0740.202302"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/mvt.2020.3017181"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/icc45041.2023.10279722"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2023.3320611"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2023.3241057"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2022.3209397"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/itsc55140.2022.9922383"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2021.3067057"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2021.08.014"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2021.3106378"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/iceca58529.2023.10394746"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/tccn.2020.3000509"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/tcomm.2021.3059300"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/tcomm.2023.3280219"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2023.3288072"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2022.3195779"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/globecom46510.2021.9685599"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2021.3126079"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2023.3334250"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2022.3178445"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2022.3198881"}],"container-title":["IEEE Transactions on Intelligent Transportation Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6979\/11220917\/10705423.pdf?arnumber=10705423","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T18:05:50Z","timestamp":1761847550000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10705423\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10]]},"references-count":67,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tits.2024.3463189","relation":{},"ISSN":["1524-9050","1558-0016"],"issn-type":[{"value":"1524-9050","type":"print"},{"value":"1558-0016","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10]]}}}