{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:50:34Z","timestamp":1776113434750,"version":"3.50.1"},"reference-count":178,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Neural Netw. Learning Syst."],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1109\/tnnls.2023.3280161","type":"journal-article","created":{"date-parts":[[2023,6,7]],"date-time":"2023-06-07T02:51:30Z","timestamp":1686106290000},"page":"13164-13184","source":"Crossref","is-referenced-by-count":50,"title":["A Survey on Reinforcement Learning for Recommender Systems"],"prefix":"10.1109","volume":"35","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6717-0950","authenticated-orcid":false,"given":"Yuanguo","family":"Lin","sequence":"first","affiliation":[{"name":"School of Computer Engineering, Jimei University, Xiamen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9031-9696","authenticated-orcid":false,"given":"Yong","family":"Liu","sequence":"additional","affiliation":[{"name":"Joint NTU-UBC Research Centre of Excellence in Active Living for the Elderly (LILY), Nanyang Technological University, Nanyang Ave, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2530-859X","authenticated-orcid":false,"given":"Fan","family":"Lin","sequence":"additional","affiliation":[{"name":"School of Informatics, Xiamen University, Xiamen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6755-871X","authenticated-orcid":false,"given":"Lixin","family":"Zou","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]},{"given":"Pengcheng","family":"Wu","sequence":"additional","affiliation":[{"name":"Joint NTU-UBC Research Centre of Excellence in Active Living for the Elderly (LILY), Nanyang Technological University, Nanyang Ave, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5581-0989","authenticated-orcid":false,"given":"Wenhua","family":"Zeng","sequence":"additional","affiliation":[{"name":"School of Informatics, Xiamen University, Xiamen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3918-384X","authenticated-orcid":false,"given":"Huanhuan","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, University of Science and Technology of China, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0300-3448","authenticated-orcid":false,"given":"Chunyan","family":"Miao","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Nanyang Technological University, Nanyang Ave, Singapore"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2016.2514368"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2013.03.012"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2019.2955567"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.99"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2556270"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3285029"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2019.2896766"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313616"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106706"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482292"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401170"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2018.00074"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401196"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-019-0025-4"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2017.2650943"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2743240"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3185994"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539034"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1126\/science.aau6249"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1177\/0278364913495721"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401181"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330922"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106302"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3477495.3531869"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i5.16569"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3331184.3331203"},{"key":"ref27","first-page":"1","article-title":"Continuous control with deep reinforcement learning","volume-title":"Proc. ICLR","author":"Lillicrap"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401171"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186175"},{"key":"ref30","first-page":"452","article-title":"BPR: Bayesian personalized ranking from implicit feedback","volume-title":"Proc. UAI","author":"Rendle"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3271739"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/tnnls.2022.3146443"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313609"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3487047"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449985"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-47426-3_8"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2974848"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3383313.3412233"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.107213"},{"issue":"15","key":"ref40","doi-asserted-by":"crossref","first-page":"2121","DOI":"10.1016\/j.ins.2005.10.009","article-title":"Adaptive stock trading with dynamic asset allocation using reinforcement learning","volume":"176","author":"Jangmin","year":"2006","journal-title":"Inf. Sci."},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.3301435"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.108546"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219961"},{"issue":"1","key":"ref44","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3511020","article-title":"Interaction-aware drug package recommendation via policy gradient","volume":"41","author":"Zheng","year":"2022","journal-title":"ACM Trans. Inf. Syst."},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-010-5229-0"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3543846"},{"key":"ref47","article-title":"A survey of deep reinforcement learning in recommender systems: A systematic review and future directions","author":"Chen","year":"2021","journal-title":"arXiv:2109.03540"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2017.2773458"},{"key":"ref49","volume-title":"Reinforcement Learning: An Introduction","author":"Sutton","year":"2018"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022676722315"},{"key":"ref51","article-title":"Playing Atari with deep reinforcement learning","author":"Mnih","year":"2013","journal-title":"arXiv:1312.5602"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/BF00992696"},{"key":"ref53","first-page":"1057","article-title":"Policy gradient methods for reinforcement learning with function approximation","volume-title":"Proc. NIPS","author":"Sutton"},{"key":"ref54","article-title":"Proximal policy optimization algorithms","author":"Schulman","year":"2017","journal-title":"arXiv:1707.06347"},{"key":"ref55","first-page":"1889","article-title":"Trust region policy optimization","volume-title":"Proc. ICML","author":"Schulman"},{"key":"ref56","first-page":"1","article-title":"Guided policy search","volume-title":"Proc. ICML","author":"Levine"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1137\/s0363012901385691"},{"key":"ref58","first-page":"1928","article-title":"Asynchronous methods for deep reinforcement learning","volume-title":"Proc. ICML","author":"Mnih"},{"key":"ref59","first-page":"1856","article-title":"Soft actor-critic: Off-policy maximum entropy deep reinforcement learning with a stochastic actor","volume-title":"Proc. ICML","author":"Haarnoja"},{"key":"ref60","first-page":"387","article-title":"Deterministic policy gradient algorithms","volume-title":"Proc. ICML","author":"Silver"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2011.2106494"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401147"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371858"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/1297231.1297250"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3109859.3109914"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/1282100.1282114"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2019.00122"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/3359554"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330668"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371801"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401174"},{"key":"ref72","first-page":"15214","article-title":"Text-based interactive recommendation via constraint-augmented reinforcement learning","volume-title":"Proc. NIPS","author":"Zhang"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33013312"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-47426-3_13"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i5.16579"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/3343031.3350935"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106170"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.116"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/1557914.1557930"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/3460231.3474256"},{"key":"ref81","first-page":"51","article-title":"Dialogue based recommender system that flexibly mixes utterances and recommendations","volume-title":"Proc. IEEE\/WIC\/ACM Int. Conf. Web Intell. (WI)","author":"Tsumita"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403258"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/3404835.3462913"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/3209978.3210002"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/3336191.3371769"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/3394592"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539471"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219886"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401225"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/2365952.2365971"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401134"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.107085"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3412044"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1145\/3460231.3478864"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/3240323.3240365"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.107217"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/3488560.3498515"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467315"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10295"},{"key":"ref100","first-page":"1995","article-title":"Dueling network architectures for deep reinforcement learning","volume-title":"Proc. ICML","author":"Wang"},{"key":"ref101","first-page":"2672","article-title":"Generative adversarial nets","volume-title":"Proc. NIPS","author":"Goodfellow"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1016\/j.aiopen.2021.06.002"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/3477495.3531844"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2010.127"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-307-3.50045-9"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512083"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1561\/1500000066"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330933"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1145\/3298689.3346981"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380098"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1145\/3488560.3498494"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/309"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.02.045"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.3012346"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36711-4_53"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1145\/1015330.1015430"},{"key":"ref117","first-page":"663","article-title":"Algorithms for inverse reinforcement learning","volume-title":"Proc. ICML","author":"Ng"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1145\/3240323.3240392"},{"key":"ref119","first-page":"897","article-title":"Apprenticeship learning about multiple intentions","volume-title":"Proc. ICML","author":"Babes"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.2998695"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330832"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2018\/687"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1145\/3477495.3531796"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/WI.2005.115"},{"key":"ref125","first-page":"1052","article-title":"Generative adversarial user model for reinforcement learning based recommendation system","volume-title":"Proc. ICML","author":"Chen"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482347"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313404"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i1.16156"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-18579-4_7"},{"key":"ref130","first-page":"417","article-title":"Off-policy temporal difference learning with function approximation","volume-title":"Proc. ICML","author":"Precup"},{"key":"ref131","first-page":"1054","article-title":"Safe and efficient off-policy reinforcement learning","volume-title":"Proc. NIPS","author":"Munos"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1145\/3289600.3290999"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380130"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1952.10483446"},{"key":"ref135","first-page":"10735","article-title":"A model-based reinforcement learning with adversarial training for online recommendation","volume-title":"Proc. NIPS","author":"Bai"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1145\/3488560.3498476"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2007.913919"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2022.3144292"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.200"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3178819"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449934"},{"key":"ref142","first-page":"1043","article-title":"Reinforcement learning with hierarchies of machines","volume-title":"Proc. NIPS","author":"Parr"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1613\/jair.639"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i5.16580"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(99)00052-1"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1145\/3488560.3498535"},{"key":"ref147","first-page":"1806","article-title":"Personalized ad recommendation systems for life-time value optimization with guarantees","volume-title":"Proc. IJCAI","author":"Theocharous"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2741998"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.07.057"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.07.064"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1145\/3437963.3441764"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/557"},{"key":"ref153","first-page":"4936","article-title":"Importance weighted transfer of samples in reinforcement learning","volume-title":"Proc. ICML","author":"Tirinzoni"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11694"},{"key":"ref155","article-title":"Learning index selection with structured action spaces","author":"Welborn","year":"2019","journal-title":"arXiv:1909.07440"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00232"},{"key":"ref157","first-page":"1089","article-title":"New criteria and a new algorithm for learning in multi-agent systems","volume-title":"Proc. NIPS","author":"Powers"},{"key":"ref158","first-page":"1","article-title":"Meta-Q-learning","volume-title":"Proc. 8th Int. Conf. Learn. Represent.","author":"Fakoor"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539040"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3481917"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2021.3089941"},{"key":"ref162","first-page":"1","article-title":"Noisy networks for exploration","volume-title":"Proc. ICLR","author":"Fortunato"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.02.009"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1145\/3488560.3498487"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1007\/s10589-014-9644-1"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449846"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1145\/3488560.3498471"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450039"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1145\/3437963.3441824"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401238"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-57321-8_5"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/787"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1145\/3404835.3462847"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3027586"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE51399.2021.00140"},{"issue":"1","key":"ref176","first-page":"1437","article-title":"A comprehensive survey on safe reinforcement learning","volume":"16","author":"Garc\u00eda","year":"2015","journal-title":"J. Mach. Learn. Res."},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.2975749"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3130265"}],"container-title":["IEEE Transactions on Neural Networks and Learning Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5962385\/10707065\/10144689.pdf?arnumber=10144689","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T01:49:56Z","timestamp":1733881796000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10144689\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10]]},"references-count":178,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tnnls.2023.3280161","relation":{},"ISSN":["2162-237X","2162-2388"],"issn-type":[{"value":"2162-237X","type":"print"},{"value":"2162-2388","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10]]}}}