{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T18:23:28Z","timestamp":1775327008498,"version":"3.50.1"},"reference-count":27,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"General Research Funds","award":["14200417"],"award-info":[{"award-number":["14200417"]}]},{"name":"University Grant Committee of the Hong Kong Special Administrative Region"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2022,10,1]]},"DOI":"10.1109\/tmc.2021.3057826","type":"journal-article","created":{"date-parts":[[2021,2,10]],"date-time":"2021-02-10T10:04:53Z","timestamp":1612951493000},"page":"3718-3730","source":"Crossref","is-referenced-by-count":48,"title":["Multi-Agent Deep Reinforcement Learning Multiple Access for Heterogeneous Wireless Networks With Imperfect Channels"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3538-576X","authenticated-orcid":false,"given":"Yiding","family":"Yu","sequence":"first","affiliation":[{"name":"Department of Information Engineering, The Chinese University of Hong Kong, Shatin, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7055-6483","authenticated-orcid":false,"given":"Soung Chang","family":"Liew","sequence":"additional","affiliation":[{"name":"Department of Information Engineering, The Chinese University of Hong Kong, Shatin, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9454-4997","authenticated-orcid":false,"given":"Taotao","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Electronics and Information Engineering, Shenzhen University, Shenzhen, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2019.8727143"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2904329"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.2990399"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.060869"},{"key":"ref5","volume-title":"Reinforcement Learning: An Introduction","author":"Sutton","year":"2018"},{"key":"ref6","volume-title":"Deep Learning","author":"Goodfellow","year":"2016"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1038\/nature14236"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1038\/nature16961"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2017.7989385"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2916583"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2924243"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013908"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/90.879343"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-60990-0_12"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/656"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.6086"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2018.2879433"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2018.2809722"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2872441"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2018.8646405"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599723"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761566"},{"issue":"3\/4","key":"ref23","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1023\/A:1022676722315","article-title":"Q-learning","volume":"8","author":"Watkins","year":"1992","journal-title":"Mach. Learn."},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-3618-5_5"},{"key":"ref25","volume-title":"Data Networks","volume":"2","author":"Bertsekas","year":"1992"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref27","article-title":"Multi-agent deep reinforcement learning multiple access for heterogeneous wireless networks with imperfect channels","volume-title":"Benchmark","author":"Yu"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7755\/9872067\/09351684.pdf?arnumber=9351684","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T22:58:54Z","timestamp":1704841134000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9351684\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,1]]},"references-count":27,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2021.3057826","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"value":"1536-1233","type":"print"},{"value":"1558-0660","type":"electronic"},{"value":"2161-9875","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,1]]}}}